Analysis
-
max time kernel
150s -
max time network
157s -
platform
windows11-21h2_x64 -
resource
win11-20250410-en -
resource tags
arch:x64arch:x86image:win11-20250410-enlocale:en-usos:windows11-21h2-x64system -
submitted
21/04/2025, 11:39
Static task
static1
Behavioral task
behavioral1
Sample
2025-04-21_654c77eabb35b39d942e5cbce63bfc66_elex_wannacry.exe
Resource
win10v2004-20250410-en
Behavioral task
behavioral2
Sample
2025-04-21_654c77eabb35b39d942e5cbce63bfc66_elex_wannacry.exe
Resource
win11-20250410-en
General
-
Target
2025-04-21_654c77eabb35b39d942e5cbce63bfc66_elex_wannacry.exe
-
Size
3.6MB
-
MD5
654c77eabb35b39d942e5cbce63bfc66
-
SHA1
82c99a1342c367b0583c518a2987d550a50b9ca6
-
SHA256
520ee8041c541271f208c206215851a4a0bc74c96f9a09c150389362cbacdb24
-
SHA512
c7899800533a4ad0b68fec8f5ea469031d28d1cca4ba5f5a59278442ac19659b12c4a9c1231f4ac7382511e405cb70e9c0e7ef7b1a30f73cdf0d7331158d6e50
-
SSDEEP
98304:yDqPoB2z1aRxcSUDk36SAEdhvxWa9C593R8yAVp2:yDqP11Cxcxk3ZAEUa0zR8yc4
Malware Config
Signatures
-
Wannacry
WannaCry is a ransomware cryptoworm.
-
Wannacry family
-
Contacts a large (3293) amount of remote hosts 1 TTPs
This may indicate a network scan to discover remotely running services.
-
Executes dropped EXE 1 IoCs
pid Process 5336 tasksche.exe -
Creates a large amount of network flows 1 TTPs
This may indicate a network scan to discover remotely running services.
-
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\WINDOWS\tasksche.exe 2025-04-21_654c77eabb35b39d942e5cbce63bfc66_elex_wannacry.exe -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2025-04-21_654c77eabb35b39d942e5cbce63bfc66_elex_wannacry.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2025-04-21_654c77eabb35b39d942e5cbce63bfc66_elex_wannacry.exe -
Modifies data under HKEY_USERS 5 IoCs
description ioc Process Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ 2025-04-21_654c77eabb35b39d942e5cbce63bfc66_elex_wannacry.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ProxyBypass = "1" 2025-04-21_654c77eabb35b39d942e5cbce63bfc66_elex_wannacry.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\IntranetName = "1" 2025-04-21_654c77eabb35b39d942e5cbce63bfc66_elex_wannacry.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\UNCAsIntranet = "1" 2025-04-21_654c77eabb35b39d942e5cbce63bfc66_elex_wannacry.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\AutoDetect = "0" 2025-04-21_654c77eabb35b39d942e5cbce63bfc66_elex_wannacry.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\2025-04-21_654c77eabb35b39d942e5cbce63bfc66_elex_wannacry.exe"C:\Users\Admin\AppData\Local\Temp\2025-04-21_654c77eabb35b39d942e5cbce63bfc66_elex_wannacry.exe"1⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:2836 -
C:\WINDOWS\tasksche.exeC:\WINDOWS\tasksche.exe /i2⤵
- Executes dropped EXE
PID:5336
-
-
C:\Users\Admin\AppData\Local\Temp\2025-04-21_654c77eabb35b39d942e5cbce63bfc66_elex_wannacry.exeC:\Users\Admin\AppData\Local\Temp\2025-04-21_654c77eabb35b39d942e5cbce63bfc66_elex_wannacry.exe -m security1⤵
- System Location Discovery: System Language Discovery
- Modifies data under HKEY_USERS
PID:4840
Network
MITRE ATT&CK Enterprise v16
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3.4MB
MD5deb98080a489989d6e5db3a9faf496d1
SHA170fb4264d4fefe40ed70f3bdd609e11b84583b85
SHA25654c7053f0dd9af0fde6e0967412813fab7b091bf79dabe03308602f6db05b1b4
SHA51227b452f5c6c25e3d2ef27add07e14aa74bd88cb206fea134d9abafbdea5ae43c4b7830bbf4cd06565c2821c1d7b6db003e04ba0544133e4e0113612157f6abf4