Resubmissions
23/02/2025, 00:49
250223-a6ke5asne1 323/02/2025, 00:46
250223-a46kkssndw 823/02/2025, 00:45
250223-a35lwssncv 823/02/2025, 00:43
250223-a3bntatlbm 822/02/2025, 22:44
250222-2n3yaszqex 1022/02/2025, 22:42
250222-2mvwaszqcx 822/02/2025, 22:39
250222-2k9axa1mgm 1022/02/2025, 22:36
250222-2jmqhs1mem 822/02/2025, 22:24
250222-2bh3cszncz 8Analysis
-
max time kernel
130s -
max time network
131s -
platform
windows10-2004_x64 -
resource
win10v2004-20250217-en -
resource tags
arch:x64arch:x86image:win10v2004-20250217-enlocale:en-usos:windows10-2004-x64system -
submitted
22/02/2025, 22:44
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://github.com/Da2dalus/The-MALWARE-Repo
Resource
win10v2004-20250217-en
General
-
Target
https://github.com/Da2dalus/The-MALWARE-Repo
Malware Config
Extracted
C:\Users\Admin\Downloads\!Please Read Me!.txt
wannacry
15zGqZCTcys6eCjDkE3DypCjXi6QWRV6V1
Signatures
-
Wannacry
WannaCry is a ransomware cryptoworm.
-
Wannacry family
-
Deletes shadow copies 3 TTPs
Ransomware often targets backup files to inhibit system recovery.
-
Downloads MZ/PE file 1 IoCs
flow pid Process 51 3272 msedge.exe -
Drops startup file 2 IoCs
description ioc Process File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\~SDFB09.tmp WannaCry.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Word\STARTUP\~SDFB10.tmp WannaCry.exe -
Executes dropped EXE 5 IoCs
pid Process 3280 WannaCry.exe 4956 !WannaDecryptor!.exe 400 !WannaDecryptor!.exe 4980 !WannaDecryptor!.exe 4916 !WannaDecryptor!.exe -
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Microsoft Update Task Scheduler = "\"C:\\Users\\Admin\\Downloads\\WannaCry.exe\" /r" WannaCry.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
flow ioc 51 raw.githubusercontent.com 50 raw.githubusercontent.com -
Sets desktop wallpaper using registry 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1294999112-580688058-1763548717-1000\Control Panel\Desktop\Wallpaper = "C:\\Users\\Admin\\Desktop\\!WannaCryptor!.bmp" !WannaDecryptor!.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 14 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language !WannaDecryptor!.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WMIC.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WannaCry.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cscript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language !WannaDecryptor!.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language !WannaDecryptor!.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language !WannaDecryptor!.exe -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe -
Kills process with taskkill 4 IoCs
pid Process 2820 taskkill.exe 3608 taskkill.exe 4944 taskkill.exe 1352 taskkill.exe -
NTFS ADS 1 IoCs
description ioc Process File opened for modification C:\Users\Admin\Downloads\Unconfirmed 854195.crdownload:SmartScreen msedge.exe -
Suspicious behavior: EnumeratesProcesses 12 IoCs
pid Process 3272 msedge.exe 3272 msedge.exe 2924 msedge.exe 2924 msedge.exe 116 identity_helper.exe 116 identity_helper.exe 1444 msedge.exe 1444 msedge.exe 4680 msedge.exe 4680 msedge.exe 4680 msedge.exe 4680 msedge.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 4916 !WannaDecryptor!.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
pid Process 2924 msedge.exe 2924 msedge.exe 2924 msedge.exe 2924 msedge.exe 2924 msedge.exe 2924 msedge.exe 2924 msedge.exe -
Suspicious use of AdjustPrivilegeToken 49 IoCs
description pid Process Token: SeDebugPrivilege 4944 taskkill.exe Token: SeDebugPrivilege 3608 taskkill.exe Token: SeDebugPrivilege 1352 taskkill.exe Token: SeDebugPrivilege 2820 taskkill.exe Token: SeIncreaseQuotaPrivilege 4336 WMIC.exe Token: SeSecurityPrivilege 4336 WMIC.exe Token: SeTakeOwnershipPrivilege 4336 WMIC.exe Token: SeLoadDriverPrivilege 4336 WMIC.exe Token: SeSystemProfilePrivilege 4336 WMIC.exe Token: SeSystemtimePrivilege 4336 WMIC.exe Token: SeProfSingleProcessPrivilege 4336 WMIC.exe Token: SeIncBasePriorityPrivilege 4336 WMIC.exe Token: SeCreatePagefilePrivilege 4336 WMIC.exe Token: SeBackupPrivilege 4336 WMIC.exe Token: SeRestorePrivilege 4336 WMIC.exe Token: SeShutdownPrivilege 4336 WMIC.exe Token: SeDebugPrivilege 4336 WMIC.exe Token: SeSystemEnvironmentPrivilege 4336 WMIC.exe Token: SeRemoteShutdownPrivilege 4336 WMIC.exe Token: SeUndockPrivilege 4336 WMIC.exe Token: SeManageVolumePrivilege 4336 WMIC.exe Token: 33 4336 WMIC.exe Token: 34 4336 WMIC.exe Token: 35 4336 WMIC.exe Token: 36 4336 WMIC.exe Token: SeIncreaseQuotaPrivilege 4336 WMIC.exe Token: SeSecurityPrivilege 4336 WMIC.exe Token: SeTakeOwnershipPrivilege 4336 WMIC.exe Token: SeLoadDriverPrivilege 4336 WMIC.exe Token: SeSystemProfilePrivilege 4336 WMIC.exe Token: SeSystemtimePrivilege 4336 WMIC.exe Token: SeProfSingleProcessPrivilege 4336 WMIC.exe Token: SeIncBasePriorityPrivilege 4336 WMIC.exe Token: SeCreatePagefilePrivilege 4336 WMIC.exe Token: SeBackupPrivilege 4336 WMIC.exe Token: SeRestorePrivilege 4336 WMIC.exe Token: SeShutdownPrivilege 4336 WMIC.exe Token: SeDebugPrivilege 4336 WMIC.exe Token: SeSystemEnvironmentPrivilege 4336 WMIC.exe Token: SeRemoteShutdownPrivilege 4336 WMIC.exe Token: SeUndockPrivilege 4336 WMIC.exe Token: SeManageVolumePrivilege 4336 WMIC.exe Token: 33 4336 WMIC.exe Token: 34 4336 WMIC.exe Token: 35 4336 WMIC.exe Token: 36 4336 WMIC.exe Token: SeBackupPrivilege 4656 vssvc.exe Token: SeRestorePrivilege 4656 vssvc.exe Token: SeAuditPrivilege 4656 vssvc.exe -
Suspicious use of FindShellTrayWindow 35 IoCs
pid Process 2924 msedge.exe 2924 msedge.exe 2924 msedge.exe 2924 msedge.exe 2924 msedge.exe 2924 msedge.exe 2924 msedge.exe 2924 msedge.exe 2924 msedge.exe 2924 msedge.exe 2924 msedge.exe 2924 msedge.exe 2924 msedge.exe 2924 msedge.exe 2924 msedge.exe 2924 msedge.exe 2924 msedge.exe 2924 msedge.exe 2924 msedge.exe 2924 msedge.exe 2924 msedge.exe 2924 msedge.exe 2924 msedge.exe 2924 msedge.exe 2924 msedge.exe 2924 msedge.exe 2924 msedge.exe 2924 msedge.exe 2924 msedge.exe 2924 msedge.exe 2924 msedge.exe 2924 msedge.exe 2924 msedge.exe 2924 msedge.exe 2924 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 2924 msedge.exe 2924 msedge.exe 2924 msedge.exe 2924 msedge.exe 2924 msedge.exe 2924 msedge.exe 2924 msedge.exe 2924 msedge.exe 2924 msedge.exe 2924 msedge.exe 2924 msedge.exe 2924 msedge.exe 2924 msedge.exe 2924 msedge.exe 2924 msedge.exe 2924 msedge.exe 2924 msedge.exe 2924 msedge.exe 2924 msedge.exe 2924 msedge.exe 2924 msedge.exe 2924 msedge.exe 2924 msedge.exe 2924 msedge.exe -
Suspicious use of SetWindowsHookEx 8 IoCs
pid Process 4956 !WannaDecryptor!.exe 4956 !WannaDecryptor!.exe 400 !WannaDecryptor!.exe 400 !WannaDecryptor!.exe 4980 !WannaDecryptor!.exe 4980 !WannaDecryptor!.exe 4916 !WannaDecryptor!.exe 4916 !WannaDecryptor!.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2924 wrote to memory of 940 2924 msedge.exe 86 PID 2924 wrote to memory of 940 2924 msedge.exe 86 PID 2924 wrote to memory of 1996 2924 msedge.exe 87 PID 2924 wrote to memory of 1996 2924 msedge.exe 87 PID 2924 wrote to memory of 1996 2924 msedge.exe 87 PID 2924 wrote to memory of 1996 2924 msedge.exe 87 PID 2924 wrote to memory of 1996 2924 msedge.exe 87 PID 2924 wrote to memory of 1996 2924 msedge.exe 87 PID 2924 wrote to memory of 1996 2924 msedge.exe 87 PID 2924 wrote to memory of 1996 2924 msedge.exe 87 PID 2924 wrote to memory of 1996 2924 msedge.exe 87 PID 2924 wrote to memory of 1996 2924 msedge.exe 87 PID 2924 wrote to memory of 1996 2924 msedge.exe 87 PID 2924 wrote to memory of 1996 2924 msedge.exe 87 PID 2924 wrote to memory of 1996 2924 msedge.exe 87 PID 2924 wrote to memory of 1996 2924 msedge.exe 87 PID 2924 wrote to memory of 1996 2924 msedge.exe 87 PID 2924 wrote to memory of 1996 2924 msedge.exe 87 PID 2924 wrote to memory of 1996 2924 msedge.exe 87 PID 2924 wrote to memory of 1996 2924 msedge.exe 87 PID 2924 wrote to memory of 1996 2924 msedge.exe 87 PID 2924 wrote to memory of 1996 2924 msedge.exe 87 PID 2924 wrote to memory of 1996 2924 msedge.exe 87 PID 2924 wrote to memory of 1996 2924 msedge.exe 87 PID 2924 wrote to memory of 1996 2924 msedge.exe 87 PID 2924 wrote to memory of 1996 2924 msedge.exe 87 PID 2924 wrote to memory of 1996 2924 msedge.exe 87 PID 2924 wrote to memory of 1996 2924 msedge.exe 87 PID 2924 wrote to memory of 1996 2924 msedge.exe 87 PID 2924 wrote to memory of 1996 2924 msedge.exe 87 PID 2924 wrote to memory of 1996 2924 msedge.exe 87 PID 2924 wrote to memory of 1996 2924 msedge.exe 87 PID 2924 wrote to memory of 1996 2924 msedge.exe 87 PID 2924 wrote to memory of 1996 2924 msedge.exe 87 PID 2924 wrote to memory of 1996 2924 msedge.exe 87 PID 2924 wrote to memory of 1996 2924 msedge.exe 87 PID 2924 wrote to memory of 1996 2924 msedge.exe 87 PID 2924 wrote to memory of 1996 2924 msedge.exe 87 PID 2924 wrote to memory of 1996 2924 msedge.exe 87 PID 2924 wrote to memory of 1996 2924 msedge.exe 87 PID 2924 wrote to memory of 1996 2924 msedge.exe 87 PID 2924 wrote to memory of 1996 2924 msedge.exe 87 PID 2924 wrote to memory of 3272 2924 msedge.exe 88 PID 2924 wrote to memory of 3272 2924 msedge.exe 88 PID 2924 wrote to memory of 440 2924 msedge.exe 89 PID 2924 wrote to memory of 440 2924 msedge.exe 89 PID 2924 wrote to memory of 440 2924 msedge.exe 89 PID 2924 wrote to memory of 440 2924 msedge.exe 89 PID 2924 wrote to memory of 440 2924 msedge.exe 89 PID 2924 wrote to memory of 440 2924 msedge.exe 89 PID 2924 wrote to memory of 440 2924 msedge.exe 89 PID 2924 wrote to memory of 440 2924 msedge.exe 89 PID 2924 wrote to memory of 440 2924 msedge.exe 89 PID 2924 wrote to memory of 440 2924 msedge.exe 89 PID 2924 wrote to memory of 440 2924 msedge.exe 89 PID 2924 wrote to memory of 440 2924 msedge.exe 89 PID 2924 wrote to memory of 440 2924 msedge.exe 89 PID 2924 wrote to memory of 440 2924 msedge.exe 89 PID 2924 wrote to memory of 440 2924 msedge.exe 89 PID 2924 wrote to memory of 440 2924 msedge.exe 89 PID 2924 wrote to memory of 440 2924 msedge.exe 89 PID 2924 wrote to memory of 440 2924 msedge.exe 89 PID 2924 wrote to memory of 440 2924 msedge.exe 89 PID 2924 wrote to memory of 440 2924 msedge.exe 89 -
Uses Volume Shadow Copy service COM API
The Volume Shadow Copy service is used to manage backups/snapshots.
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --start-maximized --single-argument https://github.com/Da2dalus/The-MALWARE-Repo1⤵
- Enumerates system info in registry
- NTFS ADS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2924 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffa24a546f8,0x7ffa24a54708,0x7ffa24a547182⤵PID:940
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2120,7727491627760989340,2740443939674685056,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2128 /prefetch:22⤵PID:1996
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2120,7727491627760989340,2740443939674685056,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2200 /prefetch:32⤵
- Downloads MZ/PE file
- Suspicious behavior: EnumeratesProcesses
PID:3272
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2120,7727491627760989340,2740443939674685056,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2972 /prefetch:82⤵PID:440
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2120,7727491627760989340,2740443939674685056,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3320 /prefetch:12⤵PID:1860
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2120,7727491627760989340,2740443939674685056,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3340 /prefetch:12⤵PID:1960
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2120,7727491627760989340,2740443939674685056,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5316 /prefetch:82⤵PID:4416
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2120,7727491627760989340,2740443939674685056,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5316 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:116
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2120,7727491627760989340,2740443939674685056,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5588 /prefetch:12⤵PID:2272
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2120,7727491627760989340,2740443939674685056,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5608 /prefetch:12⤵PID:4732
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=edge_collections.mojom.CollectionsDataManager --field-trial-handle=2120,7727491627760989340,2740443939674685056,131072 --lang=en-US --service-sandbox-type=collections --mojo-platform-channel-handle=5796 /prefetch:82⤵PID:4540
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2120,7727491627760989340,2740443939674685056,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5832 /prefetch:12⤵PID:4216
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --field-trial-handle=2120,7727491627760989340,2740443939674685056,131072 --lang=en-US --service-sandbox-type=icon_reader --mojo-platform-channel-handle=6320 /prefetch:82⤵PID:960
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2120,7727491627760989340,2740443939674685056,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6448 /prefetch:12⤵PID:3300
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2120,7727491627760989340,2740443939674685056,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6484 /prefetch:12⤵PID:4888
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --field-trial-handle=2120,7727491627760989340,2740443939674685056,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5572 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:1444
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2120,7727491627760989340,2740443939674685056,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=5460 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4680
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4688
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:5108
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵PID:3648
-
C:\Users\Admin\Downloads\WannaCry.exe"C:\Users\Admin\Downloads\WannaCry.exe"1⤵
- Drops startup file
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
PID:3280 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c 98491740264314.bat2⤵
- System Location Discovery: System Language Discovery
PID:716 -
C:\Windows\SysWOW64\cscript.execscript //nologo c.vbs3⤵
- System Location Discovery: System Language Discovery
PID:400
-
-
-
C:\Users\Admin\Downloads\!WannaDecryptor!.exe!WannaDecryptor!.exe f2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:4956
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im MSExchange*2⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2820
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im Microsoft.Exchange.*2⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:3608
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im sqlserver.exe2⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:4944
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im sqlwriter.exe2⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:1352
-
-
C:\Users\Admin\Downloads\!WannaDecryptor!.exe!WannaDecryptor!.exe c2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:400
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c start /b !WannaDecryptor!.exe v2⤵
- System Location Discovery: System Language Discovery
PID:4124 -
C:\Users\Admin\Downloads\!WannaDecryptor!.exe!WannaDecryptor!.exe v3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:4980 -
C:\Windows\SysWOW64\cmd.execmd.exe /c vssadmin delete shadows /all /quiet & wmic shadowcopy delete & bcdedit /set {default} bootstatuspolicy ignoreallfailures & bcdedit /set {default} recoveryenabled no & wbadmin delete catalog -quiet4⤵
- System Location Discovery: System Language Discovery
PID:3352 -
C:\Windows\SysWOW64\Wbem\WMIC.exewmic shadowcopy delete5⤵
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:4336
-
-
-
-
-
C:\Users\Admin\Downloads\!WannaDecryptor!.exe!WannaDecryptor!.exe2⤵
- Executes dropped EXE
- Sets desktop wallpaper using registry
- System Location Discovery: System Language Discovery
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:4916
-
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵
- Suspicious use of AdjustPrivilegeToken
PID:4656
Network
MITRE ATT&CK Enterprise v15
Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
1Credentials In Files
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD50d6b4373e059c5b1fc25b68e6d990827
SHA1b924e33d05263bffdff75d218043eed370108161
SHA256fafcaeb410690fcf64fd35de54150c2f9f45b96de55812309c762e0a336b4aa2
SHA5129bffd6911c9071dd70bc4366655f2370e754274f11c2e92a9ac2f760f316174a0af4e01ddb6f071816fdcad4bb00ff49915fb18fde7ee2dabb953a29e87d29e4
-
Filesize
152B
MD5a4852fc46a00b2fbd09817fcd179715d
SHA1b5233a493ea793f7e810e578fe415a96e8298a3c
SHA2566cbb88dea372a5b15d661e78a983b0c46f7ae4d72416978814a17aa65a73079f
SHA51238972cf90f5ca9286761280fcf8aa375f316eb59733466375f8ba055ce84b6c54e2297bad9a4212374c860898517e5a0c69343190fc4753aafc904557c1ea6dc
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\1d4baa5e-0be2-4471-968e-3385e0c1ce43.tmp
Filesize6KB
MD5ff0972a4dad8d6b6b123777ab7196e7b
SHA1017bbbc630945cf647f70dc1aa2c7b5c5ecadd49
SHA25640000308e72b5ddc2f4e015fea3037a3c28546b6d1c6a40fb533dbcf8a4f3722
SHA512535b0ee0e1b2c6eef21edec8b02162028282f3d47df40d2cb17c4bee8b725a0fbffc8ea1ddcde25520fc6821a29b8745c4627834dfe3469ed050abfc5f18d8f5
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize1KB
MD5efbb7c681a90a01161cc5c20b8433dd6
SHA12037a673df274b78590c30e8543c16207ad58c24
SHA256cab9508ff2a78817bb9ccb54b9c97dc528ce128480d045ef74daf1be8f64815c
SHA5125021153b6400eae456436d0117d64edc6185ba62374f42c23e691bad759ea8e25790994fc464c4448a8aac2b31d055b9a0c3d0d7298eea02c93b404bb3d3b731
-
Filesize
579B
MD50170c30b0f125bede7f88c82edc2b0af
SHA1f6e5afbb5d657f6882b0e285c0cdfeee31c24d76
SHA256aa9109d46652bfd48f41db8cc18992144b90580d93b2d111f0c6b5954ad71311
SHA51202b0a5fb22290cd840a416139235128afdea2d612c1266a2813c0e122ba18bd398f3b8bc04f4cf789d5b3a68b26f957c34fa31746c916557f40260c819b42b98
-
Filesize
6KB
MD5efc86784e4a0da56a07371edcd133e13
SHA1e7b832ed2c0b87b9070ab5185561071cfb83073c
SHA25643a34e706a9d4f804888774cc705ddba1b3cbdec8b5cbc854820a39ce504e60b
SHA512159a81e9448df8f36c047514158495e5c593c96caa1679b7b3c1dcf1c33852723f2fbee54a7855013d5d7352833ffe61616b2260f2f11a0e228b79f94359bd75
-
Filesize
6KB
MD58816a749e052de7074855eeb7cf74850
SHA1e6918d4d3eea4f96789ef36e97eff043dbbc903e
SHA256dade306f4b1058835cb8e0cf5fc95a4b96e3de6c3381f449b8faddffa267eac3
SHA512dd3e5d751e14d98cf67491d840f060adf2972ef9c6487e178147f21ab485396a04a5d78c84cd872e7ccbab7d625452f90a3c602daf2bbfc7927503551ebd7db7
-
Filesize
874B
MD5d70502b4281d7887bc21f816c2748269
SHA16958079319498a5b0572e5f8630059583bd49edf
SHA2563d0735df010543e0240310cdf9b390fb2d3652fd5444cbc88001d21fb6589c56
SHA512c32d686e38e5a0b7503ca0882a7c2b654e61ca20af19fc0b6fc4ed43b953bcdd92f514f655b1b71e9ff0c658fcb47e0bb0765887afe107ebc6486d05142afdec
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\b38bf074-8361-478f-bc5e-e270173e26ec.tmp
Filesize1KB
MD5551abe6b5a9d3654cedc3f639c8a13c2
SHA1ae028e198ca707fa601319c1ce0cc29e94809ab5
SHA256bfa585b121efff018a0ed750273632fb6b7ccd50a47e5471ef29e9aa5b8d2669
SHA51259cc5698462f41fbdd60583231b232d4bd58f64d18cf718d0a112f35e1a4f17ec27506287147096955387a7b64953cd9c04d089618979a8acfd727aabb2d0520
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD5ac627ac4896bc9bd2d7f9eaa6f75194a
SHA11211226d03a2c3629235ad2a6e3ec09576acacc0
SHA256ff7fdfd2a2fb85025e743b89b8763dd023032fbd8a1980adc4c3bfb7c4fcde65
SHA51273eccce1a5c88a48d151624d19bd78554931264e453101bbd7deea1e2ef67564c191035b675359e35700c71c80778d59aa51dcb42aac71385b1f06821e9517e3
-
Filesize
11KB
MD5cfc92a19833facee212a5122c2b65787
SHA1d3d5b1a4e71f103b0bb1c9f2a499fa7e8257a48f
SHA25640fc80d882d30bfc1699e78bfc067be850c66ff500eaeb01dcb5112a74fa28df
SHA51242aef41d971efeb3e791f1d1084e2030303c3a067632b063882ae3fb5e455d3cf5bcf0899465cf2ae402cc2699cea057ec3898ec05c0993e01693036a3c92a0b
-
Filesize
797B
MD5afa18cf4aa2660392111763fb93a8c3d
SHA1c219a3654a5f41ce535a09f2a188a464c3f5baf5
SHA256227082c719fd4394c1f2311a0877d8a302c5b092bcc49f853a5cf3d2945f42b0
SHA5124161f250d59b7d4d4a6c4f16639d66d21b2a9606de956d22ec00bedb006643fedbbb8e4cde9f6c0c977285918648314883ca91f3442d1125593bf2605f2d5c6b
-
Filesize
590B
MD572c4d4e09662b6c0bdb085f7d76c7a1c
SHA11a5c4c901b443efbee7bfe9e89ad7400b4ad7dd4
SHA256bade990b52ed8ea51a3351f5ebfa49cd9f05cf69391a655bcdd2479fa224f917
SHA51242c28516b6090c49c6bcee5a1b2098a91642d690c44be5994dd587c676047adabb1387c5752acb8c328a554700e90a09fdcdc4326980aeecabaf6e4c84c4a7d9
-
Filesize
136B
MD50ac9141a1369fa0ff75230d064dae4ba
SHA170c24dd498cc3dd6927d1ff4e2b8d5b7f663703b
SHA256b51b7a7249540394f15979bd9bdcf22852c4d401160587b69a7db7dd4526e9b6
SHA5128bf9d82b36122167b0681d2661cc8f8e45a55f953b058e8cc3adf387f3feb66864db1cfe632773ee294cc806fe6a3fdadee6de87129b8a1c11bed06f4548545a
-
Filesize
136B
MD5f5a0c3eddc90e31ec9a24b6c8af8c158
SHA14f4fa22360d067640719f54e07bb51b9167958d9
SHA2568e777fc7b4b541542c3ea903bb76fb3b0cd069026be29b1eaa8b67c851136643
SHA512be32ad128461a563699afc3ab905857ff7c65eb6ba5fe72f9e1ca60fe266a1d65f4dddbd4bd924fd7465527bcbc4bb9ecc8f33e0f0eea279817a4bc778f11d94
-
Filesize
136B
MD5373ed078c2d736cd3e7938466b7d5633
SHA17f990b9026ccddd4c5c3f804e6b42f7cc9f3638e
SHA25620ac6db5542236eacc39404bb3d7dcf35c1ba0f2f556a6383771c69d7d654f5e
SHA51237f28279de292c84d8647c60d447cfcf5ddb2a5045bc47b412ee96c9e2c7504776d41865a3c9aad8b5298908cdf044af044a969188358ea057ebb3c45989f0d0
-
Filesize
136B
MD55aa78f6431659af9fe8be8818da64eb1
SHA1329152d8505523b16adb2e680dfb116a9fe86d63
SHA2566424b3a3ba8016505a28e3016b283804eb6851c9966b9a32cc215ce013e45a7a
SHA51272b11583fe662db10d9eb43cf2576dcc8411f1a2b2e5b392c860f4d4ea4f9b935a1d584dfe09566b31c98a320d4619a46236a4349fe190e082d095aececc3891
-
Filesize
318B
MD5a261428b490a45438c0d55781a9c6e75
SHA1e9eefce11cefcbb7e5168bfb8de8a3c3ac45c41e
SHA2564288d655b7de7537d7ea13fdeb1ba19760bcaf04384cd68619d9e5edb5e31f44
SHA512304887938520ffcc6966da83596ccc8688b7eace9572982c224f3fb9c59e6fb2dcaa021a19d2aae47346e954c0d0d8145c723b7143dece11ac7261dc41ba3d40
-
Filesize
224KB
MD55c7fb0927db37372da25f270708103a2
SHA1120ed9279d85cbfa56e5b7779ffa7162074f7a29
SHA256be22645c61949ad6a077373a7d6cd85e3fae44315632f161adc4c99d5a8e6844
SHA512a15f97fad744ccf5f620e5aabb81f48507327b898a9aa4287051464019e0f89224c484e9691812e166471af9beaddcfc3deb2ba878658761f4800663beef7206
-
Filesize
201B
MD502b937ceef5da308c5689fcdb3fb12e9
SHA1fa5490ea513c1b0ee01038c18cb641a51f459507
SHA2565d57b86aeb52be824875008a6444daf919717408ec45aff4640b5e64610666f1
SHA512843eeae13ac5fdc216b14e40534543c283ecb2b6c31503aba2d25ddd215df19105892e43cf618848742de9c13687d21e8c834eff3f2b69a26df2509a6f992653
-
Filesize
628B
MD50afc04bf1f0011400bd845eb689f297e
SHA1641dd50995cb475722d26116b7d7b16b91aa2b61
SHA256b4f816d111084193cf046ddbc0c2bb9d8660ce4f332c6f2dd4ea2b1d31770133
SHA5129b7994ae3d701755fb766f664ceda3bcc4bfd5b50dfb76035ef70e9c9a31e837bb46fd1a4871aaecbdf8ebcfea0a37fd0087db24c45017b0ef5a090d055ea61d
-
Filesize
42KB
MD5980b08bac152aff3f9b0136b616affa5
SHA12a9c9601ea038f790cc29379c79407356a3d25a3
SHA256402046ada270528c9ac38bbfa0152836fe30fb8e12192354e53b8397421430d9
SHA512100cda1f795781042b012498afd783fd6ff03b0068dbd07b2c2e163cd95e6c6e00755ce16b02b017693c9febc149ed02df9df9b607e2b9cca4b07e5bd420f496
-
Filesize
236KB
MD5cf1416074cd7791ab80a18f9e7e219d9
SHA1276d2ec82c518d887a8a3608e51c56fa28716ded
SHA25678e3f87f31688355c0f398317b2d87d803bd87ee3656c5a7c80f0561ec8606df
SHA5120bb0843a90edacaf1407e6a7273a9fbb896701635e4d9467392b7350ad25a1bec0c1ceef36737b4af5e5841936f4891436eded0533aa3d74c9a54efa42f024c5