Analysis

  • max time kernel
    150s
  • max time network
    152s
  • platform
    windows10_x64
  • resource
    win10v20210410
  • submitted
    05-05-2021 00:36

General

  • Target

    7a8f03f878be1a9edf1fd5c0d4bef4808be8434410030c2e8f2e9257553cc728.dll

  • Size

    5.0MB

  • MD5

    17243fc984cc18f6bfc96752869722fe

  • SHA1

    cb603f094c226fb668a93dd6eaef4dbcda9a0a92

  • SHA256

    7a8f03f878be1a9edf1fd5c0d4bef4808be8434410030c2e8f2e9257553cc728

  • SHA512

    98ebe3e9f6d6f04f6c9b479e5964094dfa204396f8b012afdcb66e2be325ec2ed4e590df08a78b19959eee7a9e65b0396092d3908a68096fb128408bf78fda23

Malware Config

Signatures

  • Wannacry

    WannaCry is a ransomware cryptoworm.

  • Executes dropped EXE 2 IoCs
  • Drops file in System32 directory 7 IoCs
  • Drops file in Windows directory 2 IoCs
  • Modifies data under HKEY_USERS 8 IoCs
  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Windows\system32\rundll32.exe
    rundll32.exe C:\Users\Admin\AppData\Local\Temp\7a8f03f878be1a9edf1fd5c0d4bef4808be8434410030c2e8f2e9257553cc728.dll,#1
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:4020
    • C:\Windows\SysWOW64\rundll32.exe
      rundll32.exe C:\Users\Admin\AppData\Local\Temp\7a8f03f878be1a9edf1fd5c0d4bef4808be8434410030c2e8f2e9257553cc728.dll,#1
      2⤵
      • Drops file in Windows directory
      • Suspicious use of WriteProcessMemory
      PID:4052
      • C:\WINDOWS\mssecsvc.exe
        C:\WINDOWS\mssecsvc.exe
        3⤵
        • Executes dropped EXE
        • Drops file in Windows directory
        PID:1268
  • C:\WINDOWS\mssecsvc.exe
    C:\WINDOWS\mssecsvc.exe -m security
    1⤵
    • Executes dropped EXE
    • Drops file in System32 directory
    • Modifies data under HKEY_USERS
    PID:3300

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\WINDOWS\mssecsvc.exe
    MD5

    c7d159397b5c4b1c816151e15d15c786

    SHA1

    8deb664e15e2d9f732bf37096dc224bcb59c7200

    SHA256

    cc21463955684526ed9ebf2c70269a08ee5e8b44c9f64d398406c0e2727f1e8c

    SHA512

    11a96bd4ede3365cebb1b8759da35057afbf690df1197da2c42ab62461934bfcf7e34b4f45362aba354eeef6721b392f103a142371d05035b7bfddf8385b0900

  • C:\Windows\mssecsvc.exe
    MD5

    c7d159397b5c4b1c816151e15d15c786

    SHA1

    8deb664e15e2d9f732bf37096dc224bcb59c7200

    SHA256

    cc21463955684526ed9ebf2c70269a08ee5e8b44c9f64d398406c0e2727f1e8c

    SHA512

    11a96bd4ede3365cebb1b8759da35057afbf690df1197da2c42ab62461934bfcf7e34b4f45362aba354eeef6721b392f103a142371d05035b7bfddf8385b0900

  • C:\Windows\mssecsvc.exe
    MD5

    c7d159397b5c4b1c816151e15d15c786

    SHA1

    8deb664e15e2d9f732bf37096dc224bcb59c7200

    SHA256

    cc21463955684526ed9ebf2c70269a08ee5e8b44c9f64d398406c0e2727f1e8c

    SHA512

    11a96bd4ede3365cebb1b8759da35057afbf690df1197da2c42ab62461934bfcf7e34b4f45362aba354eeef6721b392f103a142371d05035b7bfddf8385b0900

  • memory/1268-115-0x0000000000000000-mapping.dmp
  • memory/4052-114-0x0000000000000000-mapping.dmp