Resubmissions

28-01-2025 02:32

250128-c1nlpstrbw 10

25-01-2025 23:18

250125-3ase3stmgw 10

Analysis

  • max time kernel
    50s
  • max time network
    52s
  • platform
    windows11-21h2_x64
  • resource
    win11-20241007-en
  • resource tags

    arch:x64arch:x86image:win11-20241007-enlocale:en-usos:windows11-21h2-x64system
  • submitted
    28-01-2025 02:32

General

  • Target

    2025-01-25_cafff9fcf64d3db867bf6c0bb6917e5e_wannacry.exe

  • Size

    5.0MB

  • MD5

    cafff9fcf64d3db867bf6c0bb6917e5e

  • SHA1

    327e9782b0bf99fa6060f3a971c97c1a7c41dece

  • SHA256

    6aaf7f2665f77ae5b9ab560abcab5fdeb95bbfabba1922daa9509547dec78931

  • SHA512

    46f5fbcd316eae7129f6650887eb6d38866f7616b6ecc96b4ba379a83ef75b8bda60cf74ebf0a7ee431d021d9ab9303e5c71e0f915d62c5bb828031c1e8c42b3

  • SSDEEP

    49152:XnAQqMSPbcBVQej/1Wx+TSqTdXHVKzT6SAARdh:XDqPoBhz1WxcSUjKzT6SAEdh

Malware Config

Signatures

  • Wannacry

    WannaCry is a ransomware cryptoworm.

  • Wannacry family
  • Contacts a large (578) amount of remote hosts 1 TTPs

    This may indicate a network scan to discover remotely running services.

  • Executes dropped EXE 1 IoCs
  • Enumerates connected drives 3 TTPs 48 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Drops file in Windows directory 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies data under HKEY_USERS 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2025-01-25_cafff9fcf64d3db867bf6c0bb6917e5e_wannacry.exe
    "C:\Users\Admin\AppData\Local\Temp\2025-01-25_cafff9fcf64d3db867bf6c0bb6917e5e_wannacry.exe"
    1⤵
    • Drops file in Windows directory
    • System Location Discovery: System Language Discovery
    PID:4304
    • C:\WINDOWS\tasksche.exe
      C:\WINDOWS\tasksche.exe /i
      2⤵
      • Executes dropped EXE
      PID:1704
  • C:\Users\Admin\AppData\Local\Temp\2025-01-25_cafff9fcf64d3db867bf6c0bb6917e5e_wannacry.exe
    C:\Users\Admin\AppData\Local\Temp\2025-01-25_cafff9fcf64d3db867bf6c0bb6917e5e_wannacry.exe -m security
    1⤵
    • System Location Discovery: System Language Discovery
    • Modifies data under HKEY_USERS
    PID:2532
  • C:\Windows\system32\SearchIndexer.exe
    C:\Windows\system32\SearchIndexer.exe /Embedding
    1⤵
    • Enumerates connected drives
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2260
    • C:\Windows\System32\SearchProtocolHost.exe
      "C:\Windows\System32\SearchProtocolHost.exe" Global\UsGthrFltPipeMssGthrPipe1_ Global\UsGthrCtrlFltPipeMssGthrPipe1 1 -2147483646 "Software\Microsoft\Windows Search" "Mozilla/4.0 (compatible; MSIE 6.0; Windows NT; MS Search 4.0 Robot)" "C:\ProgramData\Microsoft\Search\Data\Temp\usgthrsvc" "DownLevelDaemon"
      2⤵
      • Modifies data under HKEY_USERS
      PID:3452
    • C:\Windows\system32\SearchFilterHost.exe
      "C:\Windows\system32\SearchFilterHost.exe" 828 2792 2780 812 {0E5DCEC5-7795-4E38-9621-94DFD9F9A421}
      2⤵
      • Modifies data under HKEY_USERS
      PID:4560
    • C:\Windows\system32\SearchFilterHost.exe
      "C:\Windows\system32\SearchFilterHost.exe" 828 2784 2756 812 {85EE815A-7738-4808-A14A-3AD87E32A3BF}
      2⤵
        PID:2276

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Windows\tasksche.exe

      Filesize

      3.4MB

      MD5

      a56fed8a8a3fed1c79209334f1c2e67b

      SHA1

      0d81e451ba2486307d258354f681b008d93a60af

      SHA256

      641a44c7a3b811376afef0489492bc3bb5f333dd70b767b9d28dd31e44b17e57

      SHA512

      509ddfb636beb5a2d27b7e87e5be4b9a9fe09c691627516ea54d3e79d5a1cc23d429c5553c51984941a0e744f41e1937b2215c136664ab12438c9f01f626eecb

    • memory/2260-3-0x000002529CF50000-0x000002529CF60000-memory.dmp

      Filesize

      64KB

    • memory/2260-19-0x000002529D180000-0x000002529D190000-memory.dmp

      Filesize

      64KB

    • memory/2260-35-0x00000252A1740000-0x00000252A1748000-memory.dmp

      Filesize

      32KB

    • memory/4560-39-0x000001966FF10000-0x000001966FF20000-memory.dmp

      Filesize

      64KB

    • memory/4560-40-0x000001966FF10000-0x000001966FF20000-memory.dmp

      Filesize

      64KB

    • memory/4560-41-0x000001966FF10000-0x000001966FF20000-memory.dmp

      Filesize

      64KB

    • memory/4560-42-0x000001966FF10000-0x000001966FF20000-memory.dmp

      Filesize

      64KB

    • memory/4560-44-0x000001966FF10000-0x000001966FF20000-memory.dmp

      Filesize

      64KB

    • memory/4560-43-0x000001966FF10000-0x000001966FF20000-memory.dmp

      Filesize

      64KB

    • memory/4560-45-0x000001966FF10000-0x000001966FF20000-memory.dmp

      Filesize

      64KB

    • memory/4560-48-0x000001966FF10000-0x000001966FF20000-memory.dmp

      Filesize

      64KB

    • memory/4560-50-0x000001966FF10000-0x000001966FF20000-memory.dmp

      Filesize

      64KB

    • memory/4560-49-0x000001966FF10000-0x000001966FF20000-memory.dmp

      Filesize

      64KB

    • memory/4560-52-0x000001966FF10000-0x000001966FF20000-memory.dmp

      Filesize

      64KB

    • memory/4560-54-0x000001966FF10000-0x000001966FF20000-memory.dmp

      Filesize

      64KB

    • memory/4560-53-0x000001966FF10000-0x000001966FF20000-memory.dmp

      Filesize

      64KB

    • memory/4560-51-0x000001966FF10000-0x000001966FF20000-memory.dmp

      Filesize

      64KB

    • memory/4560-47-0x000001966FF10000-0x000001966FF20000-memory.dmp

      Filesize

      64KB

    • memory/4560-46-0x000001966FF10000-0x000001966FF20000-memory.dmp

      Filesize

      64KB

    • memory/4560-55-0x000001966FF10000-0x000001966FF20000-memory.dmp

      Filesize

      64KB

    • memory/4560-56-0x000001966FF10000-0x000001966FF20000-memory.dmp

      Filesize

      64KB

    • memory/4560-57-0x000001966FF10000-0x000001966FF20000-memory.dmp

      Filesize

      64KB

    • memory/4560-58-0x000001966FF10000-0x000001966FF20000-memory.dmp

      Filesize

      64KB

    • memory/4560-60-0x000001966FF10000-0x000001966FF20000-memory.dmp

      Filesize

      64KB

    • memory/4560-59-0x000001966FF10000-0x000001966FF20000-memory.dmp

      Filesize

      64KB

    • memory/4560-61-0x000001966FF10000-0x000001966FF20000-memory.dmp

      Filesize

      64KB

    • memory/4560-64-0x000001966FF10000-0x000001966FF20000-memory.dmp

      Filesize

      64KB

    • memory/4560-67-0x000001966FF10000-0x000001966FF20000-memory.dmp

      Filesize

      64KB

    • memory/4560-66-0x000001966FF10000-0x000001966FF20000-memory.dmp

      Filesize

      64KB

    • memory/4560-69-0x000001966FF10000-0x000001966FF20000-memory.dmp

      Filesize

      64KB

    • memory/4560-68-0x000001966FF10000-0x000001966FF20000-memory.dmp

      Filesize

      64KB

    • memory/4560-65-0x000001966FF10000-0x000001966FF20000-memory.dmp

      Filesize

      64KB

    • memory/4560-63-0x000001966FF10000-0x000001966FF20000-memory.dmp

      Filesize

      64KB

    • memory/4560-62-0x000001966FF10000-0x000001966FF20000-memory.dmp

      Filesize

      64KB