Analysis

  • max time kernel
    150s
  • max time network
    149s
  • platform
    windows7_x64
  • resource
    win7v20210410
  • submitted
    15-05-2021 11:22

General

  • Target

    de8456537e95ac3116d46d95e8da3b66af2ab87f8039ba47093cc63a66eaf4ce.dll

  • Size

    5.0MB

  • MD5

    51bc7875d20c501041b7171acd26cad8

  • SHA1

    7a97039277884828ae21c9f6117da1231a1cb265

  • SHA256

    de8456537e95ac3116d46d95e8da3b66af2ab87f8039ba47093cc63a66eaf4ce

  • SHA512

    dd302277306de1d2813ae3276ae880cd983cea7b4a424631281cbfb2b4c3457c7d70f520ff632446824e8f82f9bd791912f05b805e1e8be7872634202f1152a1

Malware Config

Signatures

  • Wannacry

    WannaCry is a ransomware cryptoworm.

  • Executes dropped EXE 3 IoCs
  • Drops file in System32 directory 6 IoCs
  • Drops file in Windows directory 2 IoCs
  • Modifies data under HKEY_USERS 49 IoCs
  • Suspicious use of WriteProcessMemory 11 IoCs

Processes

  • C:\Windows\system32\rundll32.exe
    rundll32.exe C:\Users\Admin\AppData\Local\Temp\de8456537e95ac3116d46d95e8da3b66af2ab87f8039ba47093cc63a66eaf4ce.dll,#1
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2004
    • C:\Windows\SysWOW64\rundll32.exe
      rundll32.exe C:\Users\Admin\AppData\Local\Temp\de8456537e95ac3116d46d95e8da3b66af2ab87f8039ba47093cc63a66eaf4ce.dll,#1
      2⤵
      • Drops file in Windows directory
      • Suspicious use of WriteProcessMemory
      PID:1496
      • C:\WINDOWS\mssecsvr.exe
        C:\WINDOWS\mssecsvr.exe
        3⤵
        • Executes dropped EXE
        • Drops file in Windows directory
        PID:1980
  • C:\WINDOWS\mssecsvr.exe
    C:\WINDOWS\mssecsvr.exe -m security
    1⤵
    • Executes dropped EXE
    • Drops file in System32 directory
    • Modifies data under HKEY_USERS
    PID:1900
  • C:\WINDOWS\mssecsvr.exe
    C:\WINDOWS\mssecsvr.exe -m security
    1⤵
    • Executes dropped EXE
    • Drops file in System32 directory
    • Modifies data under HKEY_USERS
    PID:912

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\WINDOWS\mssecsvr.exe
    MD5

    fb8acc447fd47ab50876d6962fccf3f5

    SHA1

    4c9e23868bc42466c5fa3a77469ee8f9a30959d6

    SHA256

    cb5fa8e40ebaeeee5a8e6cf113f0abd6124de935916158284fffa70b87c772a8

    SHA512

    e9fd5764560aee54834fce9ab7b5c0a9fdc907ef9602d2d8ed1aee938431f935a64282867b75c82f676f3bcba1de8a0cb33bb5c6ad2123344a74f3baf551c3ae

  • C:\Windows\mssecsvr.exe
    MD5

    fb8acc447fd47ab50876d6962fccf3f5

    SHA1

    4c9e23868bc42466c5fa3a77469ee8f9a30959d6

    SHA256

    cb5fa8e40ebaeeee5a8e6cf113f0abd6124de935916158284fffa70b87c772a8

    SHA512

    e9fd5764560aee54834fce9ab7b5c0a9fdc907ef9602d2d8ed1aee938431f935a64282867b75c82f676f3bcba1de8a0cb33bb5c6ad2123344a74f3baf551c3ae

  • C:\Windows\mssecsvr.exe
    MD5

    fb8acc447fd47ab50876d6962fccf3f5

    SHA1

    4c9e23868bc42466c5fa3a77469ee8f9a30959d6

    SHA256

    cb5fa8e40ebaeeee5a8e6cf113f0abd6124de935916158284fffa70b87c772a8

    SHA512

    e9fd5764560aee54834fce9ab7b5c0a9fdc907ef9602d2d8ed1aee938431f935a64282867b75c82f676f3bcba1de8a0cb33bb5c6ad2123344a74f3baf551c3ae

  • C:\Windows\mssecsvr.exe
    MD5

    fb8acc447fd47ab50876d6962fccf3f5

    SHA1

    4c9e23868bc42466c5fa3a77469ee8f9a30959d6

    SHA256

    cb5fa8e40ebaeeee5a8e6cf113f0abd6124de935916158284fffa70b87c772a8

    SHA512

    e9fd5764560aee54834fce9ab7b5c0a9fdc907ef9602d2d8ed1aee938431f935a64282867b75c82f676f3bcba1de8a0cb33bb5c6ad2123344a74f3baf551c3ae

  • memory/1496-59-0x0000000000000000-mapping.dmp
  • memory/1496-60-0x00000000765F1000-0x00000000765F3000-memory.dmp
    Filesize

    8KB

  • memory/1980-61-0x0000000000000000-mapping.dmp