Analysis

  • max time kernel
    150s
  • max time network
    198s
  • platform
    windows7_x64
  • resource
    win7v20210408
  • submitted
    15-05-2021 06:31

General

  • Target

    8a8b241a3395b9d5a710ef4239f121df1489b8a46abd6b0c8fad55905df06fba.dll

  • Size

    5.0MB

  • MD5

    e47b15b0137d90824863a9dc6d105647

  • SHA1

    c233929bb352bb8b5e4a02cfc0570b246d5e6eb5

  • SHA256

    8a8b241a3395b9d5a710ef4239f121df1489b8a46abd6b0c8fad55905df06fba

  • SHA512

    04f2fb645d7e4b11feda8c3270fd543fccdb3341690d437b4279a33bfaef646db85d64f133f2bfc982140d967c8205d27fe0246654f9d71a9adacc2c6c417a87

Malware Config

Signatures

  • Wannacry

    WannaCry is a ransomware cryptoworm.

  • Executes dropped EXE 3 IoCs
  • Drops file in System32 directory 1 IoCs
  • Drops file in Windows directory 2 IoCs
  • Modifies data under HKEY_USERS 24 IoCs
  • Suspicious use of WriteProcessMemory 11 IoCs

Processes

  • C:\Windows\system32\rundll32.exe
    rundll32.exe C:\Users\Admin\AppData\Local\Temp\8a8b241a3395b9d5a710ef4239f121df1489b8a46abd6b0c8fad55905df06fba.dll,#1
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1092
    • C:\Windows\SysWOW64\rundll32.exe
      rundll32.exe C:\Users\Admin\AppData\Local\Temp\8a8b241a3395b9d5a710ef4239f121df1489b8a46abd6b0c8fad55905df06fba.dll,#1
      2⤵
      • Drops file in Windows directory
      • Suspicious use of WriteProcessMemory
      PID:1160
      • C:\WINDOWS\mssecsvc.exe
        C:\WINDOWS\mssecsvc.exe
        3⤵
        • Executes dropped EXE
        • Drops file in Windows directory
        PID:1992
        • C:\WINDOWS\tasksche.exe
          C:\WINDOWS\tasksche.exe /i
          4⤵
          • Executes dropped EXE
          PID:2028
  • C:\WINDOWS\mssecsvc.exe
    C:\WINDOWS\mssecsvc.exe -m security
    1⤵
    • Executes dropped EXE
    • Drops file in System32 directory
    • Modifies data under HKEY_USERS
    PID:1740

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\WINDOWS\mssecsvc.exe
    MD5

    7b11d4c3dda0783cc64cc15eb73f81a3

    SHA1

    a759114bbebd9085aef153a996835d7e3fade6a0

    SHA256

    01288f5bf5390ae8e0dfab80ff4971fb3e4fa8179a363ffeb2ff0dcfd43c583b

    SHA512

    698a0d82b5649b1f9ce8de84e5afc900297c026b475d0d990f8d79f5f69675ffab32f2eaf1b4d9e78c2e9fda80cd5f99482e426e3154fc0948d58dfcaa6f1ac1

  • C:\Windows\mssecsvc.exe
    MD5

    7b11d4c3dda0783cc64cc15eb73f81a3

    SHA1

    a759114bbebd9085aef153a996835d7e3fade6a0

    SHA256

    01288f5bf5390ae8e0dfab80ff4971fb3e4fa8179a363ffeb2ff0dcfd43c583b

    SHA512

    698a0d82b5649b1f9ce8de84e5afc900297c026b475d0d990f8d79f5f69675ffab32f2eaf1b4d9e78c2e9fda80cd5f99482e426e3154fc0948d58dfcaa6f1ac1

  • C:\Windows\mssecsvc.exe
    MD5

    7b11d4c3dda0783cc64cc15eb73f81a3

    SHA1

    a759114bbebd9085aef153a996835d7e3fade6a0

    SHA256

    01288f5bf5390ae8e0dfab80ff4971fb3e4fa8179a363ffeb2ff0dcfd43c583b

    SHA512

    698a0d82b5649b1f9ce8de84e5afc900297c026b475d0d990f8d79f5f69675ffab32f2eaf1b4d9e78c2e9fda80cd5f99482e426e3154fc0948d58dfcaa6f1ac1

  • C:\Windows\tasksche.exe
    MD5

    57c379e1881a5aa6e789abec995953ec

    SHA1

    8b9026ddc297aed71d5457107c3857f0fc48deb7

    SHA256

    3a8cf4f23866d8cd7b3ca2ce2a35297fd2b520323c5e5b4510a50ea5dba879a8

    SHA512

    71eae2e0f696c2e792dd06457cb20e9df0a7e8c794053e0bad7aa141cd37f87a6dfe63c411d1014043011004245a6c701c7b8337492dfa72ec54caafa18fdff9

  • memory/1160-60-0x0000000000000000-mapping.dmp
  • memory/1160-61-0x0000000075AA1000-0x0000000075AA3000-memory.dmp
    Filesize

    8KB

  • memory/1992-62-0x0000000000000000-mapping.dmp