Analysis

  • max time kernel
    58s
  • max time network
    132s
  • platform
    windows7_x64
  • resource
    win7v20201028
  • submitted
    26-12-2020 20:16

General

  • Target

    WannaCry/Trojan-Ransom.Win32.Wanna.m.106e21fb736cb4e7a18a1746ef18e03f.dll

  • Size

    5.0MB

  • MD5

    106e21fb736cb4e7a18a1746ef18e03f

  • SHA1

    77a6da4aba3f6f0f8da2d5a5d646d295ca0fb088

  • SHA256

    54d4b7ac7bafcf657cceb0ba8231d287065a1da82f9cc8dbf4077be950bf3d8e

  • SHA512

    0056a56bb4a95743232034ea6db0fe692c43751c4854b1695cf82989be82c987e64fa48448cc07516409f3e50c0ae9c0b6ccefb37b504cc3f7a05334a5f6e7cb

Malware Config

Signatures

  • Wannacry

    WannaCry is a ransomware cryptoworm.

  • Executes dropped EXE 3 IoCs
  • Drops file in System32 directory 3 IoCs
  • Drops file in Windows directory 2 IoCs
  • Modifies data under HKEY_USERS 24 IoCs
  • Suspicious use of WriteProcessMemory 11 IoCs

Processes

  • C:\Windows\system32\rundll32.exe
    rundll32.exe C:\Users\Admin\AppData\Local\Temp\WannaCry\Trojan-Ransom.Win32.Wanna.m.106e21fb736cb4e7a18a1746ef18e03f.dll,#1
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1664
    • C:\Windows\SysWOW64\rundll32.exe
      rundll32.exe C:\Users\Admin\AppData\Local\Temp\WannaCry\Trojan-Ransom.Win32.Wanna.m.106e21fb736cb4e7a18a1746ef18e03f.dll,#1
      2⤵
      • Drops file in Windows directory
      • Suspicious use of WriteProcessMemory
      PID:1520
      • C:\WINDOWS\mssecsvc.exe
        C:\WINDOWS\mssecsvc.exe
        3⤵
        • Executes dropped EXE
        • Drops file in Windows directory
        PID:1200
        • C:\WINDOWS\tasksche.exe
          C:\WINDOWS\tasksche.exe /i
          4⤵
          • Executes dropped EXE
          PID:1300
  • C:\WINDOWS\mssecsvc.exe
    C:\WINDOWS\mssecsvc.exe -m security
    1⤵
    • Executes dropped EXE
    • Drops file in System32 directory
    • Modifies data under HKEY_USERS
    PID:1800

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\WINDOWS\mssecsvc.exe
    MD5

    67ffa51c2157f840f4fe4d538058826d

    SHA1

    e7f1ecb323e206be4c269eddf3596e6e054a9125

    SHA256

    fb90b179d1ae26042b9584898e46a5ba2ebdd499db8ba7ba3f45fedd9e2d8e94

    SHA512

    6ca37faab29096d2c755aad3d06ca0a4428716183cba318651c5e07ddb490644a30cb0b619f09ceebad0caa731c6fd264df0bedebed71f509de8014f03cd2218

  • C:\Windows\mssecsvc.exe
    MD5

    67ffa51c2157f840f4fe4d538058826d

    SHA1

    e7f1ecb323e206be4c269eddf3596e6e054a9125

    SHA256

    fb90b179d1ae26042b9584898e46a5ba2ebdd499db8ba7ba3f45fedd9e2d8e94

    SHA512

    6ca37faab29096d2c755aad3d06ca0a4428716183cba318651c5e07ddb490644a30cb0b619f09ceebad0caa731c6fd264df0bedebed71f509de8014f03cd2218

  • C:\Windows\mssecsvc.exe
    MD5

    67ffa51c2157f840f4fe4d538058826d

    SHA1

    e7f1ecb323e206be4c269eddf3596e6e054a9125

    SHA256

    fb90b179d1ae26042b9584898e46a5ba2ebdd499db8ba7ba3f45fedd9e2d8e94

    SHA512

    6ca37faab29096d2c755aad3d06ca0a4428716183cba318651c5e07ddb490644a30cb0b619f09ceebad0caa731c6fd264df0bedebed71f509de8014f03cd2218

  • C:\Windows\tasksche.exe
    MD5

    c255f33f14e53ec5f78187627f89d99e

    SHA1

    054e68bd5e2f06437064c01545f92809bd76da9f

    SHA256

    dfffdf15a902fb5968f3476edd59711e82232d73266c6fec3accada1e59008be

    SHA512

    93d5c83889b80f6add3c46bf86f02eda7c3c8c6f8d1aa05600e04e5609c166242bbfbbe32a09592c36dc6c7868bd81ad36cef9dd7ec4abdf04223ec8aa179ba3

  • memory/1200-3-0x0000000000000000-mapping.dmp
  • memory/1520-2-0x0000000000000000-mapping.dmp
  • memory/1900-5-0x000007FEF6010000-0x000007FEF628A000-memory.dmp
    Filesize

    2.5MB