Analysis

  • max time kernel
    152s
  • max time network
    153s
  • platform
    windows7_x64
  • resource
    win7v200722
  • submitted
    16-10-2020 21:37

General

  • Target

    5e28e910940af14e17d57de2977c2019fe81e8546c7daeab2725c5927ce4ce1e.dll

  • Size

    5.0MB

  • MD5

    6f2a81fa5f34458251c0816159efb6ca

  • SHA1

    7e211a896555b09996bc53f340af713f579dadfa

  • SHA256

    5e28e910940af14e17d57de2977c2019fe81e8546c7daeab2725c5927ce4ce1e

  • SHA512

    31df3240675d10d15ac4b272a92425b46ffe6ee4d397a5d34179a09318feb61c70642e7ec1df568998b43686c07a2a8312a31981cf51a2f60a21c53bc04cd499

Malware Config

Signatures

  • Wannacry

    WannaCry is a ransomware cryptoworm.

  • Executes dropped EXE 4 IoCs
  • Drops file in System32 directory 6 IoCs
  • Drops file in Windows directory 2 IoCs
  • Program crash 1 IoCs
  • Modifies data under HKEY_USERS 49 IoCs
  • Suspicious behavior: EnumeratesProcesses 5 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 15 IoCs

Processes

  • C:\Windows\system32\rundll32.exe
    rundll32.exe C:\Users\Admin\AppData\Local\Temp\5e28e910940af14e17d57de2977c2019fe81e8546c7daeab2725c5927ce4ce1e.dll,#1
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1332
    • C:\Windows\SysWOW64\rundll32.exe
      rundll32.exe C:\Users\Admin\AppData\Local\Temp\5e28e910940af14e17d57de2977c2019fe81e8546c7daeab2725c5927ce4ce1e.dll,#1
      2⤵
      • Drops file in Windows directory
      • Suspicious use of WriteProcessMemory
      PID:1048
      • C:\WINDOWS\mssecsvc.exe
        C:\WINDOWS\mssecsvc.exe
        3⤵
        • Executes dropped EXE
        • Drops file in Windows directory
        PID:1044
        • C:\WINDOWS\tasksche.exe
          C:\WINDOWS\tasksche.exe /i
          4⤵
          • Executes dropped EXE
          PID:816
  • C:\WINDOWS\mssecsvc.exe
    C:\WINDOWS\mssecsvc.exe -m security
    1⤵
    • Executes dropped EXE
    • Drops file in System32 directory
    • Modifies data under HKEY_USERS
    • Suspicious use of WriteProcessMemory
    PID:664
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -u -p 664 -s 616
      2⤵
      • Program crash
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:792
  • C:\WINDOWS\mssecsvc.exe
    C:\WINDOWS\mssecsvc.exe -m security
    1⤵
    • Executes dropped EXE
    • Drops file in System32 directory
    • Modifies data under HKEY_USERS
    PID:1160

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\WINDOWS\mssecsvc.exe
    MD5

    aaac4f4442ab7478126d61316c740afe

    SHA1

    22125cfa3072adc8d1a05859c4f83f445db68a61

    SHA256

    816adc100114f8fb4cb8abd9566496cec3af255e5ec131c50e50b64d975ecaca

    SHA512

    acf29483cf37a7104b80f580a3cb21b185258f993c23e097674863dc8a83759839ce5cea21ac160e306aa07f5fbe0dd0878466f5b334dd8002e61918ea26cb9b

  • C:\Windows\mssecsvc.exe
    MD5

    aaac4f4442ab7478126d61316c740afe

    SHA1

    22125cfa3072adc8d1a05859c4f83f445db68a61

    SHA256

    816adc100114f8fb4cb8abd9566496cec3af255e5ec131c50e50b64d975ecaca

    SHA512

    acf29483cf37a7104b80f580a3cb21b185258f993c23e097674863dc8a83759839ce5cea21ac160e306aa07f5fbe0dd0878466f5b334dd8002e61918ea26cb9b

  • C:\Windows\mssecsvc.exe
    MD5

    aaac4f4442ab7478126d61316c740afe

    SHA1

    22125cfa3072adc8d1a05859c4f83f445db68a61

    SHA256

    816adc100114f8fb4cb8abd9566496cec3af255e5ec131c50e50b64d975ecaca

    SHA512

    acf29483cf37a7104b80f580a3cb21b185258f993c23e097674863dc8a83759839ce5cea21ac160e306aa07f5fbe0dd0878466f5b334dd8002e61918ea26cb9b

  • C:\Windows\mssecsvc.exe
    MD5

    aaac4f4442ab7478126d61316c740afe

    SHA1

    22125cfa3072adc8d1a05859c4f83f445db68a61

    SHA256

    816adc100114f8fb4cb8abd9566496cec3af255e5ec131c50e50b64d975ecaca

    SHA512

    acf29483cf37a7104b80f580a3cb21b185258f993c23e097674863dc8a83759839ce5cea21ac160e306aa07f5fbe0dd0878466f5b334dd8002e61918ea26cb9b

  • C:\Windows\tasksche.exe
    MD5

    a32d2c5d51aafaa54ae3117db26b72ce

    SHA1

    e6e0a521f95d78b4897b7e24ca4cf76eac9b6d84

    SHA256

    011ae0697f87e8b45d3815e15655e3ee86f438f2a03e1e5fae5b424d9aad7603

    SHA512

    8da0b7bbda1bfb38f9c38c8ee00796ac5415bf1d2f4dd9d6ec69c4c2a2c4f3fdee136550f3a88772d9383513f7585b71cddf74ff68ace8cd8ecc4b8b00342864

  • memory/792-7-0x0000000000000000-mapping.dmp
  • memory/792-8-0x0000000000B60000-0x0000000000B71000-memory.dmp
    Filesize

    68KB

  • memory/792-9-0x0000000000B60000-0x0000000000B71000-memory.dmp
    Filesize

    68KB

  • memory/792-12-0x0000000001360000-0x0000000001371000-memory.dmp
    Filesize

    68KB

  • memory/1044-1-0x0000000000000000-mapping.dmp
  • memory/1048-0-0x0000000000000000-mapping.dmp
  • memory/1356-3-0x000007FEF83B0000-0x000007FEF862A000-memory.dmp
    Filesize

    2.5MB