Analysis

  • max time kernel
    150s
  • max time network
    150s
  • platform
    windows7_x64
  • resource
    win7-20240729-en
  • resource tags

    arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system
  • submitted
    21/02/2025, 16:57

General

  • Target

    2025-02-21_a9e79da2854e5f7990ef2574de6aa3e6_wannacry.exe

  • Size

    5.0MB

  • MD5

    a9e79da2854e5f7990ef2574de6aa3e6

  • SHA1

    22dc585e2e1208acc8f6f8588e813ec673d4e4f6

  • SHA256

    28ddbf4de40c422d885088f42a86c80060fcffb8f24d15e2b7b68c222a5923e9

  • SHA512

    aca655dd05604c689520144b5dd04e40d394519e859674390f28fa9c100e09ca2ac4ef861780df9b23f2821264858b63d321ceb7612036720853fe191cb579c9

  • SSDEEP

    98304:Z8qPoBhz1aRxcSUDk36SAEdhvxWa9P593R8yAVp2:Z8qPe1Cxcxk3ZAEUadzR8yc4

Malware Config

Signatures

  • Wannacry

    WannaCry is a ransomware cryptoworm.

  • Wannacry family
  • Contacts a large (3349) amount of remote hosts 1 TTPs

    This may indicate a network scan to discover remotely running services.

  • Executes dropped EXE 1 IoCs
  • Creates a large amount of network flows 1 TTPs

    This may indicate a network scan to discover remotely running services.

  • Drops file in System32 directory 1 IoCs
  • Drops file in Windows directory 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies data under HKEY_USERS 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2025-02-21_a9e79da2854e5f7990ef2574de6aa3e6_wannacry.exe
    "C:\Users\Admin\AppData\Local\Temp\2025-02-21_a9e79da2854e5f7990ef2574de6aa3e6_wannacry.exe"
    1⤵
    • Drops file in Windows directory
    • System Location Discovery: System Language Discovery
    PID:2188
    • C:\WINDOWS\tasksche.exe
      C:\WINDOWS\tasksche.exe /i
      2⤵
      • Executes dropped EXE
      PID:2652
  • C:\Users\Admin\AppData\Local\Temp\2025-02-21_a9e79da2854e5f7990ef2574de6aa3e6_wannacry.exe
    C:\Users\Admin\AppData\Local\Temp\2025-02-21_a9e79da2854e5f7990ef2574de6aa3e6_wannacry.exe -m security
    1⤵
    • Drops file in System32 directory
    • System Location Discovery: System Language Discovery
    • Modifies data under HKEY_USERS
    PID:2800

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Windows\tasksche.exe

    Filesize

    3.4MB

    MD5

    e1a0c52563a70fd374d035fa03fadde7

    SHA1

    163ed07fa3511d35d18a52c0b75448b68c3c61a3

    SHA256

    6127eaec3d52b073e8a84365f2b2c68edaa84277ab25baf9409ea63261f594e6

    SHA512

    1c70682586bb94305749e9c3569502389dc6a82908ce0f2ee898babb33c15f20d1ad87e1d21e2fce1a88841d260c334667012be4be2eb15bd2cae85875621d12