Analysis

  • max time kernel
    173s
  • max time network
    219s
  • platform
    windows10_x64
  • resource
    win10v20201028
  • submitted
    26-12-2020 20:16

General

  • Target

    WannaCry/Trojan-Ransom.Win32.Wanna.m.0d95f3f64e7782ec7acd3a1b76c276a6.dll

  • Size

    5.0MB

  • MD5

    0d95f3f64e7782ec7acd3a1b76c276a6

  • SHA1

    c9301e03c44831417d5afad96921e565577c08cf

  • SHA256

    0b352401619b8b6375dd37ba94a8b73526f428631ac12145858a94ce354b5ddc

  • SHA512

    2e0c5066169488d18fe4dd4981e90066ddf66ab0aa2dab41aecd0e444e595894bd418ab896503d4b2fbee98f9c13506911561e11f881117a74e9e1017eca6eb0

Malware Config

Signatures

  • Wannacry

    WannaCry is a ransomware cryptoworm.

  • Executes dropped EXE 3 IoCs
  • Drops file in System32 directory 7 IoCs
  • Drops file in Windows directory 4 IoCs
  • Modifies data under HKEY_USERS 8 IoCs
  • Suspicious use of WriteProcessMemory 9 IoCs

Processes

  • C:\Windows\system32\rundll32.exe
    rundll32.exe C:\Users\Admin\AppData\Local\Temp\WannaCry\Trojan-Ransom.Win32.Wanna.m.0d95f3f64e7782ec7acd3a1b76c276a6.dll,#1
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1012
    • C:\Windows\SysWOW64\rundll32.exe
      rundll32.exe C:\Users\Admin\AppData\Local\Temp\WannaCry\Trojan-Ransom.Win32.Wanna.m.0d95f3f64e7782ec7acd3a1b76c276a6.dll,#1
      2⤵
      • Drops file in Windows directory
      • Suspicious use of WriteProcessMemory
      PID:752
      • C:\WINDOWS\mssecsvr.exe
        C:\WINDOWS\mssecsvr.exe
        3⤵
        • Executes dropped EXE
        • Drops file in Windows directory
        • Suspicious use of WriteProcessMemory
        PID:3304
        • C:\WINDOWS\tasksche.exe
          C:\WINDOWS\tasksche.exe /i
          4⤵
          • Executes dropped EXE
          • Drops file in Windows directory
          PID:3208
  • C:\WINDOWS\mssecsvr.exe
    C:\WINDOWS\mssecsvr.exe -m security
    1⤵
    • Executes dropped EXE
    • Drops file in System32 directory
    • Modifies data under HKEY_USERS
    PID:1324

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\WINDOWS\mssecsvr.exe
    MD5

    be31aaec48f653b49a4ef8d9f4718bac

    SHA1

    02d1ec8b78ac096f5f175e1e11c47411b2088f4a

    SHA256

    15fd3b514b40082951c33e3a0b6b1164bd244ca0806162a3ebc61c90ab39d98d

    SHA512

    c3f428639b8008ba06c1a230ec0742f5b06b04f7e0fd7b4770641d9c19b880bcd3f65a45154fa26d2684f052fe014c479a28dc94756142322805679e00d104ad

  • C:\WINDOWS\tasksche.exe
    MD5

    523fced1367557eff377b4795b8f9e83

    SHA1

    7caf8700303a20d1836e33ba45bd722207a46c8f

    SHA256

    a82524f5d7849444d4c2228c831205a288863f4d21422e7eac593ae191c32c31

    SHA512

    d0d53dc64c84a112c61381204eade9f8e1890e52aba110b40804b2d373255b7ba5e02f34bb55e3e8727f8a0e524aff1a2780daaa2b16946fcb05ae67e338e3f4

  • C:\Windows\mssecsvr.exe
    MD5

    be31aaec48f653b49a4ef8d9f4718bac

    SHA1

    02d1ec8b78ac096f5f175e1e11c47411b2088f4a

    SHA256

    15fd3b514b40082951c33e3a0b6b1164bd244ca0806162a3ebc61c90ab39d98d

    SHA512

    c3f428639b8008ba06c1a230ec0742f5b06b04f7e0fd7b4770641d9c19b880bcd3f65a45154fa26d2684f052fe014c479a28dc94756142322805679e00d104ad

  • C:\Windows\mssecsvr.exe
    MD5

    be31aaec48f653b49a4ef8d9f4718bac

    SHA1

    02d1ec8b78ac096f5f175e1e11c47411b2088f4a

    SHA256

    15fd3b514b40082951c33e3a0b6b1164bd244ca0806162a3ebc61c90ab39d98d

    SHA512

    c3f428639b8008ba06c1a230ec0742f5b06b04f7e0fd7b4770641d9c19b880bcd3f65a45154fa26d2684f052fe014c479a28dc94756142322805679e00d104ad

  • C:\Windows\tasksche.exe
    MD5

    523fced1367557eff377b4795b8f9e83

    SHA1

    7caf8700303a20d1836e33ba45bd722207a46c8f

    SHA256

    a82524f5d7849444d4c2228c831205a288863f4d21422e7eac593ae191c32c31

    SHA512

    d0d53dc64c84a112c61381204eade9f8e1890e52aba110b40804b2d373255b7ba5e02f34bb55e3e8727f8a0e524aff1a2780daaa2b16946fcb05ae67e338e3f4

  • memory/752-2-0x0000000000000000-mapping.dmp
  • memory/3208-7-0x0000000000000000-mapping.dmp
  • memory/3304-3-0x0000000000000000-mapping.dmp