Analysis

  • max time kernel
    171s
  • max time network
    186s
  • platform
    windows10_x64
  • resource
    win10v20201028
  • submitted
    26-12-2020 20:16

General

  • Target

    WannaCry/Trojan-Ransom.Win32.Wanna.m.2a13081acf353142a3e792683520cfaf.dll

  • Size

    5.0MB

  • MD5

    2a13081acf353142a3e792683520cfaf

  • SHA1

    9ced5f6260a5b508a6226693936a7d8f2308db27

  • SHA256

    4c44d1c79e5f6f15d7dd3416f79e4fadb669c32615ab234767b506a8116e44f0

  • SHA512

    ab9cee7fa2c4ee3a58031a82ea275c13d72a0399c2cc889170715e334cff8760be7fd8ee90a77128cdacbf4c6f3538f391f5c9d595653be24cfa0dacb947a210

Malware Config

Signatures

  • Wannacry

    WannaCry is a ransomware cryptoworm.

  • Executes dropped EXE 3 IoCs
  • Drops file in System32 directory 7 IoCs
  • Drops file in Windows directory 2 IoCs
  • Modifies data under HKEY_USERS 8 IoCs
  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Windows\system32\rundll32.exe
    rundll32.exe C:\Users\Admin\AppData\Local\Temp\WannaCry\Trojan-Ransom.Win32.Wanna.m.2a13081acf353142a3e792683520cfaf.dll,#1
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:3588
    • C:\Windows\SysWOW64\rundll32.exe
      rundll32.exe C:\Users\Admin\AppData\Local\Temp\WannaCry\Trojan-Ransom.Win32.Wanna.m.2a13081acf353142a3e792683520cfaf.dll,#1
      2⤵
      • Drops file in Windows directory
      • Suspicious use of WriteProcessMemory
      PID:3584
      • C:\WINDOWS\mssecsvc.exe
        C:\WINDOWS\mssecsvc.exe
        3⤵
        • Executes dropped EXE
        • Drops file in Windows directory
        PID:632
        • C:\WINDOWS\tasksche.exe
          C:\WINDOWS\tasksche.exe /i
          4⤵
          • Executes dropped EXE
          PID:2552
  • C:\WINDOWS\mssecsvc.exe
    C:\WINDOWS\mssecsvc.exe -m security
    1⤵
    • Executes dropped EXE
    • Drops file in System32 directory
    • Modifies data under HKEY_USERS
    PID:1352

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\WINDOWS\mssecsvc.exe
    MD5

    2d017fa037d287f94f1441f3d4d829df

    SHA1

    5229f06ca64a98db0757b190714183ef22af5075

    SHA256

    f6fac3c066c00e6ced8218011777b37e571112f23e6c66658519b7cccc1e1311

    SHA512

    5b127b1d6732f8e3e546a314b063f2ecd3e4ad41c5b27fcc7485e505102ea510aa2e45617309801837aa7f8a2a07c8bcc490d0cfca2ededa8b20256a5d8a25a9

  • C:\Windows\mssecsvc.exe
    MD5

    2d017fa037d287f94f1441f3d4d829df

    SHA1

    5229f06ca64a98db0757b190714183ef22af5075

    SHA256

    f6fac3c066c00e6ced8218011777b37e571112f23e6c66658519b7cccc1e1311

    SHA512

    5b127b1d6732f8e3e546a314b063f2ecd3e4ad41c5b27fcc7485e505102ea510aa2e45617309801837aa7f8a2a07c8bcc490d0cfca2ededa8b20256a5d8a25a9

  • C:\Windows\mssecsvc.exe
    MD5

    2d017fa037d287f94f1441f3d4d829df

    SHA1

    5229f06ca64a98db0757b190714183ef22af5075

    SHA256

    f6fac3c066c00e6ced8218011777b37e571112f23e6c66658519b7cccc1e1311

    SHA512

    5b127b1d6732f8e3e546a314b063f2ecd3e4ad41c5b27fcc7485e505102ea510aa2e45617309801837aa7f8a2a07c8bcc490d0cfca2ededa8b20256a5d8a25a9

  • C:\Windows\tasksche.exe
    MD5

    507c3ed8112cb4a3b12b09b7aa484c5d

    SHA1

    0c133073d2476ccdd3f7e8fa97301d0cc1cfc81c

    SHA256

    8ad2f1dcc862074a83f4d34bc3653f59374a7375a74e661787c755bc2fe2ea54

    SHA512

    56adc50ba97e83e324381e952f88825c68145a29f0fe12fc5f7a47d874849d0e953a68c2be658e527394c005cc4850b5e492f781e7a6f44245b3d91b5212662b

  • memory/632-3-0x0000000000000000-mapping.dmp
  • memory/3584-2-0x0000000000000000-mapping.dmp