WannaCry Ransomware Activity

Detects WannaCry ransomware activity

Sigma rule (View on GitHub)

 1title: WannaCry Ransomware Activity
 2id: 41d40bff-377a-43e2-8e1b-2e543069e079
 3status: test
 4description: Detects WannaCry ransomware activity
 5references:
 6    - https://www.hybrid-analysis.com/sample/ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa?environmentId=100
 7    - https://x.com/nas_bench/status/1868639048484425963
 8author: Florian Roth (Nextron Systems), Tom U. @c_APT_ure (collection), oscd.community, Jonhnathan Ribeiro
 9date: 2019-01-16
10modified: 2025-10-18
11tags:
12    - attack.lateral-movement
13    - attack.t1210
14    - attack.discovery
15    - attack.t1083
16    - attack.defense-evasion
17    - attack.t1222.001
18    - attack.impact
19    - attack.t1486
20    - attack.t1490
21    - detection.emerging-threats
22logsource:
23    category: process_creation
24    product: windows
25detection:
26    selection_img:
27        - Image|endswith:
28              - '\tasksche.exe'
29              - '\mssecsvc.exe'
30              - '\taskdl.exe'
31              - '\taskhsvc.exe'
32              - '\taskse.exe'
33              - '\111.exe'
34              - '\lhdfrgui.exe'
35              # - '\diskpart.exe'  # cannot be used in a rule of level critical
36              - '\linuxnew.exe'
37              - '\wannacry.exe'
38        - Image|contains: 'WanaDecryptor'
39    selection_cmd:
40        CommandLine|contains: '@Please_Read_Me@.txt'
41    condition: 1 of selection_*
42fields:
43    - CommandLine
44    - ParentCommandLine
45falsepositives:
46    - Unknown
47level: critical

References

Related rules

to-top