Analysis

  • max time kernel
    150s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20250410-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20250410-enlocale:en-usos:windows10-2004-x64system
  • submitted
    17/04/2025, 10:09

General

  • Target

    2025-04-17_5bc8a0545e7873a731787eb9c3ad4ebc_elex_wannacry.exe

  • Size

    3.6MB

  • MD5

    5bc8a0545e7873a731787eb9c3ad4ebc

  • SHA1

    f99739d2902ff589169f7db87d2215e3abca7354

  • SHA256

    ede9b9e86d7673130d3365d2d7a90ff87ed54cf0a7a8f74d8b241d839776ce7f

  • SHA512

    a01af09a12cd8bdd3565473f7b5c7d825e7e72176d406fd8a12194cd21e30b5c83844be33a6e163aa07f65f2648cc1b18f57d5c157a64c150de007fc254b223c

  • SSDEEP

    98304:XDqPoBhz1aRxcSUDk36SAEdhvigv1g593R8yAVp:XDqPe1Cxcxk3ZAEGgv1gzR8yc

Malware Config

Signatures

  • Wannacry

    WannaCry is a ransomware cryptoworm.

  • Wannacry family
  • Contacts a large (3190) amount of remote hosts 1 TTPs

    This may indicate a network scan to discover remotely running services.

  • Executes dropped EXE 1 IoCs
  • Creates a large amount of network flows 1 TTPs

    This may indicate a network scan to discover remotely running services.

  • Drops file in Windows directory 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies data under HKEY_USERS 5 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2025-04-17_5bc8a0545e7873a731787eb9c3ad4ebc_elex_wannacry.exe
    "C:\Users\Admin\AppData\Local\Temp\2025-04-17_5bc8a0545e7873a731787eb9c3ad4ebc_elex_wannacry.exe"
    1⤵
    • Drops file in Windows directory
    • System Location Discovery: System Language Discovery
    PID:4480
    • C:\WINDOWS\tasksche.exe
      C:\WINDOWS\tasksche.exe /i
      2⤵
      • Executes dropped EXE
      PID:2848
  • C:\Users\Admin\AppData\Local\Temp\2025-04-17_5bc8a0545e7873a731787eb9c3ad4ebc_elex_wannacry.exe
    C:\Users\Admin\AppData\Local\Temp\2025-04-17_5bc8a0545e7873a731787eb9c3ad4ebc_elex_wannacry.exe -m security
    1⤵
    • System Location Discovery: System Language Discovery
    • Modifies data under HKEY_USERS
    PID:1780

Network

MITRE ATT&CK Enterprise v16

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Windows\tasksche.exe

    Filesize

    3.4MB

    MD5

    7cac2cbc301bca24ad5335a5e3c3ac0c

    SHA1

    7719f1afda2e5f898bc271ce78ce6e674113066f

    SHA256

    0f4a72021e1b9fa7bfa6943d81b99a6fcff9af3108fb2cc45a45f7392f22ac05

    SHA512

    29175486a092d2052933f6daf1b4da34f1d98d6fbf41629352d430fc03a60a446d3246f040f7aed8f825f0be36430894b034ac5f9110f39fed034955d73773e0