Analysis

  • max time kernel
    150s
  • max time network
    150s
  • platform
    windows7_x64
  • resource
    win7-20250207-en
  • resource tags

    arch:x64arch:x86image:win7-20250207-enlocale:en-usos:windows7-x64system
  • submitted
    23/02/2025, 16:57

General

  • Target

    2025-02-23_7adec43110b1b69214ea9d8649d0f2fe_ramnit_wannacry.exe

  • Size

    5.0MB

  • MD5

    7adec43110b1b69214ea9d8649d0f2fe

  • SHA1

    c7035c202945d143b04afb175f9dd2b231443c7e

  • SHA256

    4412dc1daffb2b4711a7cd244c04c15dce813bb3678e03500e20806bca94f87f

  • SHA512

    98a3acc6d913c1dd0e9e5d469d8c172d931bfbbb0852d51971a560a5a4029a01f2d0e864579c5f50f198a03d10cb17c587b4bf196fe5fbe79f26e84a3153cc08

  • SSDEEP

    49152:XnAQqMBtgCIPUmC2rkdJh6qNIINWPp2cxHHPv1cnkhAMEcaEau3R8yAH1plAH:XDqErPen3GA593R8yAVp2H

Malware Config

Signatures

  • Wannacry

    WannaCry is a ransomware cryptoworm.

  • Wannacry family
  • Contacts a large (3333) amount of remote hosts 1 TTPs

    This may indicate a network scan to discover remotely running services.

  • Executes dropped EXE 1 IoCs
  • Creates a large amount of network flows 1 TTPs

    This may indicate a network scan to discover remotely running services.

  • Drops file in System32 directory 1 IoCs
  • Drops file in Windows directory 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies data under HKEY_USERS 24 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2025-02-23_7adec43110b1b69214ea9d8649d0f2fe_ramnit_wannacry.exe
    "C:\Users\Admin\AppData\Local\Temp\2025-02-23_7adec43110b1b69214ea9d8649d0f2fe_ramnit_wannacry.exe"
    1⤵
    • Drops file in Windows directory
    • System Location Discovery: System Language Discovery
    PID:1628
    • C:\WINDOWS\tasksche.exe
      C:\WINDOWS\tasksche.exe /i
      2⤵
      • Executes dropped EXE
      PID:2184
  • C:\Users\Admin\AppData\Local\Temp\2025-02-23_7adec43110b1b69214ea9d8649d0f2fe_ramnit_wannacry.exe
    C:\Users\Admin\AppData\Local\Temp\2025-02-23_7adec43110b1b69214ea9d8649d0f2fe_ramnit_wannacry.exe -m security
    1⤵
    • Drops file in System32 directory
    • System Location Discovery: System Language Discovery
    • Modifies data under HKEY_USERS
    PID:1920

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Windows\tasksche.exe

    Filesize

    3.4MB

    MD5

    f495c0dbc9c8a58675b3b8843282bb80

    SHA1

    59e03d1b7becb21fbdf43e980a68c2b33b59d250

    SHA256

    0f0d0e54c33def51a1f025aeabbb7b902eceb490de0fea92729260dfc20aa227

    SHA512

    32e3fa22d5f3aeed26611c728910b4fc040526a0851e72f85941981ba2f2d2e7d77230b8c14cdc15dc1544b573705f6a311809d061ad8b8a582a3f443defa6e9