Analysis
-
max time kernel
150s -
max time network
150s -
platform
windows7_x64 -
resource
win7-20241023-en -
resource tags
arch:x64arch:x86image:win7-20241023-enlocale:en-usos:windows7-x64system -
submitted
14-02-2025 01:07
Static task
static1
Behavioral task
behavioral1
Sample
2025-02-14_2e5339a3ccfbe606059fcbd4ce71455e_wannacry.exe
Resource
win7-20241023-en
Behavioral task
behavioral2
Sample
2025-02-14_2e5339a3ccfbe606059fcbd4ce71455e_wannacry.exe
Resource
win10v2004-20250211-en
General
-
Target
2025-02-14_2e5339a3ccfbe606059fcbd4ce71455e_wannacry.exe
-
Size
3.6MB
-
MD5
2e5339a3ccfbe606059fcbd4ce71455e
-
SHA1
cc2c34216a989d887b708239d070c3135e86c7b0
-
SHA256
b086c64cdbda9f6340530855f30f6a71c9e75007bc29d0c65e104ce6a3a68be3
-
SHA512
a7c6b8bf8e87ec1ffc63dd1ffee9c2dc14a0e84b3e736a59f3048a26adba78dce745f373fcf05fec67f497c2db9973b185e1e46aa8943ec8e4d5bbd98c4574d7
-
SSDEEP
98304:Z1PoBhz1aRxcSUDk36SAEdhvxWa9P593R8yAVp2HI:Z1Pe1Cxcxk3ZAEUadzR8yc4HI
Malware Config
Signatures
-
Wannacry
WannaCry is a ransomware cryptoworm.
-
Wannacry family
-
Contacts a large (3344) amount of remote hosts 1 TTPs
This may indicate a network scan to discover remotely running services.
-
Executes dropped EXE 1 IoCs
pid Process 1712 tasksche.exe -
Creates a large amount of network flows 1 TTPs
This may indicate a network scan to discover remotely running services.
-
Drops file in System32 directory 1 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\Temporary Internet Files\counters.dat 2025-02-14_2e5339a3ccfbe606059fcbd4ce71455e_wannacry.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\WINDOWS\tasksche.exe 2025-02-14_2e5339a3ccfbe606059fcbd4ce71455e_wannacry.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 1660 1712 WerFault.exe 31 -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2025-02-14_2e5339a3ccfbe606059fcbd4ce71455e_wannacry.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tasksche.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2025-02-14_2e5339a3ccfbe606059fcbd4ce71455e_wannacry.exe -
Modifies data under HKEY_USERS 1 IoCs
description ioc Process Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings 2025-02-14_2e5339a3ccfbe606059fcbd4ce71455e_wannacry.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 1956 wrote to memory of 1712 1956 2025-02-14_2e5339a3ccfbe606059fcbd4ce71455e_wannacry.exe 31 PID 1956 wrote to memory of 1712 1956 2025-02-14_2e5339a3ccfbe606059fcbd4ce71455e_wannacry.exe 31 PID 1956 wrote to memory of 1712 1956 2025-02-14_2e5339a3ccfbe606059fcbd4ce71455e_wannacry.exe 31 PID 1956 wrote to memory of 1712 1956 2025-02-14_2e5339a3ccfbe606059fcbd4ce71455e_wannacry.exe 31 PID 1712 wrote to memory of 1660 1712 tasksche.exe 32 PID 1712 wrote to memory of 1660 1712 tasksche.exe 32 PID 1712 wrote to memory of 1660 1712 tasksche.exe 32 PID 1712 wrote to memory of 1660 1712 tasksche.exe 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\2025-02-14_2e5339a3ccfbe606059fcbd4ce71455e_wannacry.exe"C:\Users\Admin\AppData\Local\Temp\2025-02-14_2e5339a3ccfbe606059fcbd4ce71455e_wannacry.exe"1⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1956 -
C:\WINDOWS\tasksche.exeC:\WINDOWS\tasksche.exe /i2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1712 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1712 -s 363⤵
- Program crash
PID:1660
-
-
-
C:\Users\Admin\AppData\Local\Temp\2025-02-14_2e5339a3ccfbe606059fcbd4ce71455e_wannacry.exeC:\Users\Admin\AppData\Local\Temp\2025-02-14_2e5339a3ccfbe606059fcbd4ce71455e_wannacry.exe -m security1⤵
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies data under HKEY_USERS
PID:1028
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3.4MB
MD52c18486f6339720ec586e8946c070df0
SHA1af841da81bfecd5664d25e926e9d5a3a63f8a49f
SHA25693410da7bdcf5637ff245e2feae1756253796ebfbb42abad0597173e3fe05924
SHA512e0695af5e74bc919ce59012b7d4affadc5910dc8de062875d08ea36f1fca01e9c9dc17de2106f200c792e702770ff49f9cb2e7fb064dfbe3bb90c2fa6ab488c7