Analysis

  • max time kernel
    150s
  • max time network
    149s
  • platform
    windows7_x64
  • resource
    win7v20201028
  • submitted
    19-01-2021 10:20

General

  • Target

    00bc02b91a3850390e977e4b75f1f84f.dll

  • Size

    5.0MB

  • MD5

    00bc02b91a3850390e977e4b75f1f84f

  • SHA1

    73240c616134f1830a0ab8dd565284d92e238333

  • SHA256

    88489f32a5e8521eb18fc390aac403c729fccb579e5b23307ca487ec7c724ce1

  • SHA512

    7baaf5578589f6881334868c1c7a4739a7e2294cef4967f10db20d9280dff2379b0977c6bec9d7c57b50df0e064a71d9df7be39ce48605a5c32b868e927667a5

Malware Config

Signatures

  • Wannacry

    WannaCry is a ransomware cryptoworm.

  • Executes dropped EXE 3 IoCs
  • Drops file in System32 directory 3 IoCs
  • Drops file in Windows directory 2 IoCs
  • Modifies data under HKEY_USERS 24 IoCs
  • Suspicious use of WriteProcessMemory 11 IoCs

Processes

  • C:\Windows\system32\rundll32.exe
    rundll32.exe C:\Users\Admin\AppData\Local\Temp\00bc02b91a3850390e977e4b75f1f84f.dll,#1
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1812
    • C:\Windows\SysWOW64\rundll32.exe
      rundll32.exe C:\Users\Admin\AppData\Local\Temp\00bc02b91a3850390e977e4b75f1f84f.dll,#1
      2⤵
      • Drops file in Windows directory
      • Suspicious use of WriteProcessMemory
      PID:1300
      • C:\WINDOWS\mssecsvc.exe
        C:\WINDOWS\mssecsvc.exe
        3⤵
        • Executes dropped EXE
        • Drops file in Windows directory
        PID:1952
        • C:\WINDOWS\tasksche.exe
          C:\WINDOWS\tasksche.exe /i
          4⤵
          • Executes dropped EXE
          PID:1744
  • C:\WINDOWS\mssecsvc.exe
    C:\WINDOWS\mssecsvc.exe -m security
    1⤵
    • Executes dropped EXE
    • Drops file in System32 directory
    • Modifies data under HKEY_USERS
    PID:1056

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\WINDOWS\mssecsvc.exe
    MD5

    8d9a4207429d7e829dc91955a1694d7e

    SHA1

    07f3c64ff5c68b3eafa417dab76c989fc9fff171

    SHA256

    17e5e0d52f4de23d3195ec2d93d366fefc7e59b6b20f71df12e7218313163da2

    SHA512

    98c5d9fd1a665446e8a443ed8d60cb250924386ce2d24d7501ec3b2d292240122a8916af1860d5d689177f582890226286ed8f0ed4e8cec5db2d024d8a88d70b

  • C:\Windows\mssecsvc.exe
    MD5

    8d9a4207429d7e829dc91955a1694d7e

    SHA1

    07f3c64ff5c68b3eafa417dab76c989fc9fff171

    SHA256

    17e5e0d52f4de23d3195ec2d93d366fefc7e59b6b20f71df12e7218313163da2

    SHA512

    98c5d9fd1a665446e8a443ed8d60cb250924386ce2d24d7501ec3b2d292240122a8916af1860d5d689177f582890226286ed8f0ed4e8cec5db2d024d8a88d70b

  • C:\Windows\mssecsvc.exe
    MD5

    8d9a4207429d7e829dc91955a1694d7e

    SHA1

    07f3c64ff5c68b3eafa417dab76c989fc9fff171

    SHA256

    17e5e0d52f4de23d3195ec2d93d366fefc7e59b6b20f71df12e7218313163da2

    SHA512

    98c5d9fd1a665446e8a443ed8d60cb250924386ce2d24d7501ec3b2d292240122a8916af1860d5d689177f582890226286ed8f0ed4e8cec5db2d024d8a88d70b

  • C:\Windows\tasksche.exe
    MD5

    741b6e8f838fd37cdf0431551432b0e7

    SHA1

    1a480f81cb2308c28b3eaee24e04ef133ff2e41e

    SHA256

    3a4a89b71005c5233e592cc20d6fd06b21aeca3415554390e4365bb76eade469

    SHA512

    0e12d88c40ee38d717a8501bf67f63885afef54328105f4337d59c516f5a3f562e4fa4f7ec54e9afffa04a402918699c33b8d2ccc76b8e5c60c76de4d0fd9cac

  • memory/1300-2-0x0000000000000000-mapping.dmp
  • memory/1300-3-0x0000000076241000-0x0000000076243000-memory.dmp
    Filesize

    8KB

  • memory/1320-7-0x000007FEF79D0000-0x000007FEF7C4A000-memory.dmp
    Filesize

    2.5MB

  • memory/1952-4-0x0000000000000000-mapping.dmp