Analysis
-
max time kernel
56s -
max time network
58s -
platform
windows10-ltsc 2021_x64 -
resource
win10ltsc2021-20250113-en -
resource tags
arch:x64arch:x86image:win10ltsc2021-20250113-enlocale:en-usos:windows10-ltsc 2021-x64system -
submitted
28-01-2025 02:32
Static task
static1
Behavioral task
behavioral1
Sample
2025-01-25_cafff9fcf64d3db867bf6c0bb6917e5e_wannacry.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
2025-01-25_cafff9fcf64d3db867bf6c0bb6917e5e_wannacry.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
2025-01-25_cafff9fcf64d3db867bf6c0bb6917e5e_wannacry.exe
Resource
win10ltsc2021-20250113-en
Behavioral task
behavioral4
Sample
2025-01-25_cafff9fcf64d3db867bf6c0bb6917e5e_wannacry.exe
Resource
win11-20241007-en
General
-
Target
2025-01-25_cafff9fcf64d3db867bf6c0bb6917e5e_wannacry.exe
-
Size
5.0MB
-
MD5
cafff9fcf64d3db867bf6c0bb6917e5e
-
SHA1
327e9782b0bf99fa6060f3a971c97c1a7c41dece
-
SHA256
6aaf7f2665f77ae5b9ab560abcab5fdeb95bbfabba1922daa9509547dec78931
-
SHA512
46f5fbcd316eae7129f6650887eb6d38866f7616b6ecc96b4ba379a83ef75b8bda60cf74ebf0a7ee431d021d9ab9303e5c71e0f915d62c5bb828031c1e8c42b3
-
SSDEEP
49152:XnAQqMSPbcBVQej/1Wx+TSqTdXHVKzT6SAARdh:XDqPoBhz1WxcSUjKzT6SAEdh
Malware Config
Signatures
-
Wannacry
WannaCry is a ransomware cryptoworm.
-
Wannacry family
-
Contacts a large (735) amount of remote hosts 1 TTPs
This may indicate a network scan to discover remotely running services.
-
Executes dropped EXE 1 IoCs
pid Process 2072 tasksche.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\WINDOWS\tasksche.exe 2025-01-25_cafff9fcf64d3db867bf6c0bb6917e5e_wannacry.exe -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2025-01-25_cafff9fcf64d3db867bf6c0bb6917e5e_wannacry.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2025-01-25_cafff9fcf64d3db867bf6c0bb6917e5e_wannacry.exe -
Modifies data under HKEY_USERS 5 IoCs
description ioc Process Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ 2025-01-25_cafff9fcf64d3db867bf6c0bb6917e5e_wannacry.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ProxyBypass = "1" 2025-01-25_cafff9fcf64d3db867bf6c0bb6917e5e_wannacry.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\IntranetName = "1" 2025-01-25_cafff9fcf64d3db867bf6c0bb6917e5e_wannacry.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\UNCAsIntranet = "1" 2025-01-25_cafff9fcf64d3db867bf6c0bb6917e5e_wannacry.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\AutoDetect = "0" 2025-01-25_cafff9fcf64d3db867bf6c0bb6917e5e_wannacry.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\2025-01-25_cafff9fcf64d3db867bf6c0bb6917e5e_wannacry.exe"C:\Users\Admin\AppData\Local\Temp\2025-01-25_cafff9fcf64d3db867bf6c0bb6917e5e_wannacry.exe"1⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:5084 -
C:\WINDOWS\tasksche.exeC:\WINDOWS\tasksche.exe /i2⤵
- Executes dropped EXE
PID:2072
-
-
C:\Users\Admin\AppData\Local\Temp\2025-01-25_cafff9fcf64d3db867bf6c0bb6917e5e_wannacry.exeC:\Users\Admin\AppData\Local\Temp\2025-01-25_cafff9fcf64d3db867bf6c0bb6917e5e_wannacry.exe -m security1⤵
- System Location Discovery: System Language Discovery
- Modifies data under HKEY_USERS
PID:536
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3.4MB
MD5a56fed8a8a3fed1c79209334f1c2e67b
SHA10d81e451ba2486307d258354f681b008d93a60af
SHA256641a44c7a3b811376afef0489492bc3bb5f333dd70b767b9d28dd31e44b17e57
SHA512509ddfb636beb5a2d27b7e87e5be4b9a9fe09c691627516ea54d3e79d5a1cc23d429c5553c51984941a0e744f41e1937b2215c136664ab12438c9f01f626eecb