Analysis

  • max time kernel
    150s
  • max time network
    149s
  • platform
    windows7_x64
  • resource
    win7v20210410
  • submitted
    13-05-2021 12:33

General

  • Target

    6b714812ff41c8772a44becd25a135e628e3ca0cbc0ab1a9d78573828b7b4c08.dll

  • Size

    5.0MB

  • MD5

    51b2d63e9620e8cc494f44c9fe856a09

  • SHA1

    4ba0268089ede8bc03655848904bdbbf31e8e590

  • SHA256

    6b714812ff41c8772a44becd25a135e628e3ca0cbc0ab1a9d78573828b7b4c08

  • SHA512

    41bf9614e8a9cbf8c52e255d82ca8af8be9fd076fece0d5c9ecfbb89ce1c278599b44d81b8dfc0190643e5890f31052aa6e6c67a4762dbf057d4ea586579f48b

Malware Config

Signatures

  • Wannacry

    WannaCry is a ransomware cryptoworm.

  • Executes dropped EXE 3 IoCs
  • Drops file in System32 directory 1 IoCs
  • Drops file in Windows directory 2 IoCs
  • Modifies data under HKEY_USERS 24 IoCs
  • Suspicious use of WriteProcessMemory 11 IoCs

Processes

  • C:\Windows\system32\rundll32.exe
    rundll32.exe C:\Users\Admin\AppData\Local\Temp\6b714812ff41c8772a44becd25a135e628e3ca0cbc0ab1a9d78573828b7b4c08.dll,#1
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1688
    • C:\Windows\SysWOW64\rundll32.exe
      rundll32.exe C:\Users\Admin\AppData\Local\Temp\6b714812ff41c8772a44becd25a135e628e3ca0cbc0ab1a9d78573828b7b4c08.dll,#1
      2⤵
      • Drops file in Windows directory
      • Suspicious use of WriteProcessMemory
      PID:1812
      • C:\WINDOWS\mssecsvc.exe
        C:\WINDOWS\mssecsvc.exe
        3⤵
        • Executes dropped EXE
        • Drops file in Windows directory
        PID:1412
        • C:\WINDOWS\tasksche.exe
          C:\WINDOWS\tasksche.exe /i
          4⤵
          • Executes dropped EXE
          PID:1288
  • C:\WINDOWS\mssecsvc.exe
    C:\WINDOWS\mssecsvc.exe -m security
    1⤵
    • Executes dropped EXE
    • Drops file in System32 directory
    • Modifies data under HKEY_USERS
    PID:1708

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\WINDOWS\mssecsvc.exe
    MD5

    ea850e72db29f2afeffd9a5d73fce46a

    SHA1

    23085cf73ae605e92dcf0b05c9eb753ccf2d2208

    SHA256

    9ef975ddd81f1fadfd54dd5fca21c36406fc64cc94180de386574e7bf5e2d104

    SHA512

    94dbeb10dfd9ef8680b307027ea49bff2d287c3ab3c82c602589c10db0a03c9de68cb126a1e3b874a94be98a7366541a5e0b5fe1cdcff53e2815578a85ba9ebd

  • C:\Windows\mssecsvc.exe
    MD5

    ea850e72db29f2afeffd9a5d73fce46a

    SHA1

    23085cf73ae605e92dcf0b05c9eb753ccf2d2208

    SHA256

    9ef975ddd81f1fadfd54dd5fca21c36406fc64cc94180de386574e7bf5e2d104

    SHA512

    94dbeb10dfd9ef8680b307027ea49bff2d287c3ab3c82c602589c10db0a03c9de68cb126a1e3b874a94be98a7366541a5e0b5fe1cdcff53e2815578a85ba9ebd

  • C:\Windows\mssecsvc.exe
    MD5

    ea850e72db29f2afeffd9a5d73fce46a

    SHA1

    23085cf73ae605e92dcf0b05c9eb753ccf2d2208

    SHA256

    9ef975ddd81f1fadfd54dd5fca21c36406fc64cc94180de386574e7bf5e2d104

    SHA512

    94dbeb10dfd9ef8680b307027ea49bff2d287c3ab3c82c602589c10db0a03c9de68cb126a1e3b874a94be98a7366541a5e0b5fe1cdcff53e2815578a85ba9ebd

  • C:\Windows\tasksche.exe
    MD5

    9c1aa2b49383fada47dfe88d6da14b44

    SHA1

    a0230d3601de00ddd893a399dc9c6d081aa2962a

    SHA256

    a557bf0c29df2264aa58fd54d4c43f423288969425cf3bd15f618f0691fb6cc2

    SHA512

    d6752103596a01c78450bba4625600e7ab03bb9b00c47a4b2ba47b8d0ac3af2aeeb03637789f2bd6403a7b87eb1e4fa39b6d53ce71767e9119562d0c8ea2eb8a

  • memory/1412-61-0x0000000000000000-mapping.dmp
  • memory/1812-59-0x0000000000000000-mapping.dmp
  • memory/1812-60-0x0000000075011000-0x0000000075013000-memory.dmp
    Filesize

    8KB