Analysis

  • max time kernel
    172s
  • max time network
    209s
  • platform
    windows10_x64
  • resource
    win10v20201028
  • submitted
    26-12-2020 20:16

General

  • Target

    WannaCry/Trojan-Ransom.Win32.Wanna.m.01bdc6fb077098f4a3b60f4b0e479a7f.dll

  • Size

    5.0MB

  • MD5

    01bdc6fb077098f4a3b60f4b0e479a7f

  • SHA1

    61acc362327a7df8f7672b905c62414f769beb61

  • SHA256

    35c0e0c0e70565cfdc78ac708e122c2f65059ea337216418d674a343da90927e

  • SHA512

    1c1adcf76854c615cd80ff489845c3261ff3de5f6dd1374527cdd5e00ecb0510a4a03df554f4299dd786d8d3abc6a3f7ad9ecda3cfed6e19b00c6cf30321bab5

Malware Config

Signatures

  • Wannacry

    WannaCry is a ransomware cryptoworm.

  • Executes dropped EXE 2 IoCs
  • Drops file in System32 directory 7 IoCs
  • Drops file in Windows directory 2 IoCs
  • Modifies data under HKEY_USERS 8 IoCs
  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Windows\system32\rundll32.exe
    rundll32.exe C:\Users\Admin\AppData\Local\Temp\WannaCry\Trojan-Ransom.Win32.Wanna.m.01bdc6fb077098f4a3b60f4b0e479a7f.dll,#1
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:720
    • C:\Windows\SysWOW64\rundll32.exe
      rundll32.exe C:\Users\Admin\AppData\Local\Temp\WannaCry\Trojan-Ransom.Win32.Wanna.m.01bdc6fb077098f4a3b60f4b0e479a7f.dll,#1
      2⤵
      • Drops file in Windows directory
      • Suspicious use of WriteProcessMemory
      PID:3232
      • C:\WINDOWS\mssecsvr.exe
        C:\WINDOWS\mssecsvr.exe
        3⤵
        • Executes dropped EXE
        • Drops file in Windows directory
        PID:4176
  • C:\WINDOWS\mssecsvr.exe
    C:\WINDOWS\mssecsvr.exe -m security
    1⤵
    • Executes dropped EXE
    • Drops file in System32 directory
    • Modifies data under HKEY_USERS
    PID:652

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\WINDOWS\mssecsvr.exe
    MD5

    ad8aa6668838b6d869f81fb289b636b1

    SHA1

    cc3643cd70f59854e492369b7e580a298fb7ad31

    SHA256

    46988f6a24d131166de061d95bad9ab9de3a53ab0286e7c9cb39333eaea562f7

    SHA512

    1bf2b56ba5a84a0232d80855e9df52e844eb751fc5953d09fce9263648ecc62a580fd4bf72890e0d1528c008547596ad91376a8a25b65dddaabb6a2708a6da44

  • C:\Windows\mssecsvr.exe
    MD5

    ad8aa6668838b6d869f81fb289b636b1

    SHA1

    cc3643cd70f59854e492369b7e580a298fb7ad31

    SHA256

    46988f6a24d131166de061d95bad9ab9de3a53ab0286e7c9cb39333eaea562f7

    SHA512

    1bf2b56ba5a84a0232d80855e9df52e844eb751fc5953d09fce9263648ecc62a580fd4bf72890e0d1528c008547596ad91376a8a25b65dddaabb6a2708a6da44

  • C:\Windows\mssecsvr.exe
    MD5

    ad8aa6668838b6d869f81fb289b636b1

    SHA1

    cc3643cd70f59854e492369b7e580a298fb7ad31

    SHA256

    46988f6a24d131166de061d95bad9ab9de3a53ab0286e7c9cb39333eaea562f7

    SHA512

    1bf2b56ba5a84a0232d80855e9df52e844eb751fc5953d09fce9263648ecc62a580fd4bf72890e0d1528c008547596ad91376a8a25b65dddaabb6a2708a6da44

  • memory/3232-2-0x0000000000000000-mapping.dmp
  • memory/4176-3-0x0000000000000000-mapping.dmp