Analysis

  • max time kernel
    150s
  • max time network
    153s
  • platform
    windows7_x64
  • resource
    win7-20240729-en
  • resource tags

    arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system
  • submitted
    30-01-2025 22:54

General

  • Target

    2025-01-30_bcad73cb6776fa8ea72152020dd1974d_wannacry.exe

  • Size

    5.0MB

  • MD5

    bcad73cb6776fa8ea72152020dd1974d

  • SHA1

    797abb122dc504bdbe164ad7dcabda86b290faa0

  • SHA256

    373ec52e5d8a0276b68c43970057f413ccd26fe65cea5772b28afad524337f5b

  • SHA512

    080119cb63ec311f36f53c0e6ad84cfe805e1c8b4986b9264df1aeb7dadc5594175bf35cb285ac59fa2c1c5df3db7416a7d19362e754c11be8b9d7e144a9bf03

  • SSDEEP

    49152:2nAQqMSPbcBVQej/1INRx+TSqTdX1HkQo6SAA4hnvxJM0H9PAMEcaEaur:yDqPoBhz1aRxcSUDk36SABhvxWa9P59r

Malware Config

Signatures

  • Wannacry

    WannaCry is a ransomware cryptoworm.

  • Wannacry family
  • Contacts a large (3131) amount of remote hosts 1 TTPs

    This may indicate a network scan to discover remotely running services.

  • Executes dropped EXE 1 IoCs
  • Creates a large amount of network flows 1 TTPs

    This may indicate a network scan to discover remotely running services.

  • Drops file in System32 directory 1 IoCs
  • Drops file in Windows directory 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies data under HKEY_USERS 24 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2025-01-30_bcad73cb6776fa8ea72152020dd1974d_wannacry.exe
    "C:\Users\Admin\AppData\Local\Temp\2025-01-30_bcad73cb6776fa8ea72152020dd1974d_wannacry.exe"
    1⤵
    • Drops file in Windows directory
    • System Location Discovery: System Language Discovery
    PID:1232
    • C:\WINDOWS\tasksche.exe
      C:\WINDOWS\tasksche.exe /i
      2⤵
      • Executes dropped EXE
      PID:2800
  • C:\Users\Admin\AppData\Local\Temp\2025-01-30_bcad73cb6776fa8ea72152020dd1974d_wannacry.exe
    C:\Users\Admin\AppData\Local\Temp\2025-01-30_bcad73cb6776fa8ea72152020dd1974d_wannacry.exe -m security
    1⤵
    • Drops file in System32 directory
    • System Location Discovery: System Language Discovery
    • Modifies data under HKEY_USERS
    PID:2776

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Windows\tasksche.exe

    Filesize

    3.4MB

    MD5

    42e2e3bb7d23af2bd402aa8ffe89eacc

    SHA1

    2224257216d3168798c7782e668de7ca2f3a8554

    SHA256

    016d016763f10051b7fc280f144beca5e64fed102fb605fe1adf129e21803ae9

    SHA512

    e281fb4e7f16e68505a49c4fd9c8bf8e1dc18528d74eaf27e33acac1d8f18e90b0615120913c54eb72ad36d43672a62cd75a721af3961cb8a151956d8780fb6b