Analysis

  • max time kernel
    150s
  • max time network
    150s
  • platform
    windows7_x64
  • resource
    win7-20241010-en
  • resource tags

    arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system
  • submitted
    01-02-2025 17:26

General

  • Target

    2025-02-01_42baa2aed9aa0eb415360c16643e98e8_wannacry.exe

  • Size

    5.0MB

  • MD5

    42baa2aed9aa0eb415360c16643e98e8

  • SHA1

    6be2960661b80e5def2a7dd07a960af569283b1a

  • SHA256

    ee3c687569e75bb9dba59fa396e65b0d9f9d6551b75fbe92171acba675b14cff

  • SHA512

    65cfe979bf9a05f606a4837848364cd6ee09cf010f930b9ccb622f3a2fc6c6d597d95c5e8c58c90283a202d373722be7fdd5694fc8c1df6d115fa4f3d23c10c8

  • SSDEEP

    49152:2nAQqMSPbcBVH6SAARdhnvxJM0H9PAMEcaEau3R8yAH1plAH:yDqPoB56SAEdhvxWa9P593R8yAVp2H

Malware Config

Signatures

  • Wannacry

    WannaCry is a ransomware cryptoworm.

  • Wannacry family
  • Contacts a large (3258) amount of remote hosts 1 TTPs

    This may indicate a network scan to discover remotely running services.

  • Executes dropped EXE 1 IoCs
  • Creates a large amount of network flows 1 TTPs

    This may indicate a network scan to discover remotely running services.

  • Drops file in System32 directory 1 IoCs
  • Drops file in Windows directory 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies data under HKEY_USERS 24 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2025-02-01_42baa2aed9aa0eb415360c16643e98e8_wannacry.exe
    "C:\Users\Admin\AppData\Local\Temp\2025-02-01_42baa2aed9aa0eb415360c16643e98e8_wannacry.exe"
    1⤵
    • Drops file in Windows directory
    • System Location Discovery: System Language Discovery
    PID:3052
    • C:\WINDOWS\tasksche.exe
      C:\WINDOWS\tasksche.exe /i
      2⤵
      • Executes dropped EXE
      PID:2044
  • C:\Users\Admin\AppData\Local\Temp\2025-02-01_42baa2aed9aa0eb415360c16643e98e8_wannacry.exe
    C:\Users\Admin\AppData\Local\Temp\2025-02-01_42baa2aed9aa0eb415360c16643e98e8_wannacry.exe -m security
    1⤵
    • Drops file in System32 directory
    • System Location Discovery: System Language Discovery
    • Modifies data under HKEY_USERS
    PID:1748

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Windows\tasksche.exe

    Filesize

    3.4MB

    MD5

    9263a694928ad1180cb9391d825b22af

    SHA1

    44b85bc13fb342ff88a74454a3e121bd55848bcb

    SHA256

    7a750dfdbc5dc5525063b66c65ef94a606ecbe472b13027bcb8d60083f49af5f

    SHA512

    716a0c08d1de35b7ad6bbbb8fac63345dcbaea440cd0c91babb7c294969f74db34a54840a868fd9858f0c199b160247dd354215f5e38ca5ca9989cd84e93ae12