Analysis
-
max time kernel
150s -
max time network
152s -
platform
windows7_x64 -
resource
win7v20210410 -
submitted
15-05-2021 08:21
Static task
static1
Behavioral task
behavioral1
Sample
4aa86d876c03a70084d8bb7a240ffe06293496d5c4c3f77761360d2beacd2a95.dll
Resource
win7v20210410
Behavioral task
behavioral2
Sample
4aa86d876c03a70084d8bb7a240ffe06293496d5c4c3f77761360d2beacd2a95.dll
Resource
win10v20210408
General
-
Target
4aa86d876c03a70084d8bb7a240ffe06293496d5c4c3f77761360d2beacd2a95.dll
-
Size
5.0MB
-
MD5
36631678ad952e3a0f7dd5bccfa3d6f9
-
SHA1
a08159346ed12fb8c5dee8b1ce4c1fc3fda01254
-
SHA256
4aa86d876c03a70084d8bb7a240ffe06293496d5c4c3f77761360d2beacd2a95
-
SHA512
a64e5af897931edb5cd57b421b922a070e5d3d92482eae4751a06a4d2ffa845f9b6db40cd83e1ceff3b9825c8875a11c77f26490294dba2bde64a6c0636e1768
Malware Config
Signatures
-
Wannacry
WannaCry is a ransomware cryptoworm.
-
Executes dropped EXE 3 IoCs
Processes:
mssecsvr.exemssecsvr.exemssecsvr.exepid process 1988 mssecsvr.exe 1520 mssecsvr.exe 1400 mssecsvr.exe -
Drops file in System32 directory 6 IoCs
Processes:
mssecsvr.exemssecsvr.exedescription ioc process File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Roaming\Microsoft\Windows\Cookies\ZI349TVX.txt mssecsvr.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\Temporary Internet Files\counters.dat mssecsvr.exe File created C:\Windows\SysWOW64\config\systemprofile\AppData\Roaming\Microsoft\Windows\Cookies\TH0R6FPE.txt mssecsvr.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Roaming\Microsoft\Windows\Cookies\TH0R6FPE.txt mssecsvr.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\Temporary Internet Files\counters.dat mssecsvr.exe File created C:\Windows\SysWOW64\config\systemprofile\AppData\Roaming\Microsoft\Windows\Cookies\ZI349TVX.txt mssecsvr.exe -
Drops file in Windows directory 3 IoCs
Processes:
rundll32.exemssecsvr.exemssecsvr.exedescription ioc process File created C:\WINDOWS\mssecsvr.exe rundll32.exe File created C:\WINDOWS\tasksche.exe mssecsvr.exe File created C:\WINDOWS\tasksche.exe mssecsvr.exe -
Modifies data under HKEY_USERS 42 IoCs
Processes:
mssecsvr.exemssecsvr.exedescription ioc process Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\AutoDetect = "1" mssecsvr.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\32-e2-17-db-d2-77\WpadDetectedUrl mssecsvr.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\History\CachePrefix = "Visited:" mssecsvr.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{2A905F01-0A57-4E51-8685-54144DDC3A32}\WpadDecisionTime = 209c4162ab49d701 mssecsvr.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{2A905F01-0A57-4E51-8685-54144DDC3A32}\32-e2-17-db-d2-77 mssecsvr.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\32-e2-17-db-d2-77\WpadDecisionTime = 209c4162ab49d701 mssecsvr.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings mssecsvr.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\SavedLegacySettings = 4600000003000000090000000000000000000000000000000400000000000000000000000000000000000000000000000000000001000000020000000a070028000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 mssecsvr.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\AutoDetect = "1" mssecsvr.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad mssecsvr.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Cookies\CachePrefix = "Cookie:" mssecsvr.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad mssecsvr.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\32-e2-17-db-d2-77 mssecsvr.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\DefaultConnectionSettings = 4600000003000000090000000000000000000000000000000400000000000000000000000000000000000000000000000000000001000000020000000a070028000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 mssecsvr.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections mssecsvr.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ProxyEnable = "0" mssecsvr.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ mssecsvr.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\32-e2-17-db-d2-77\WpadDecisionReason = "1" mssecsvr.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\32-e2-17-db-d2-77\WpadDecision = "0" mssecsvr.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings mssecsvr.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\32-e2-17-db-d2-77\WpadDecisionReason = "1" mssecsvr.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Cookies\CachePrefix = "Cookie:" mssecsvr.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{2A905F01-0A57-4E51-8685-54144DDC3A32}\WpadDecision = "0" mssecsvr.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\32-e2-17-db-d2-77 mssecsvr.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\UNCAsIntranet = "0" mssecsvr.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\History\CachePrefix = "Visited:" mssecsvr.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\32-e2-17-db-d2-77\WpadDecisionTime = 209c4162ab49d701 mssecsvr.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections mssecsvr.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\UNCAsIntranet = "0" mssecsvr.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{2A905F01-0A57-4E51-8685-54144DDC3A32}\32-e2-17-db-d2-77 mssecsvr.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\32-e2-17-db-d2-77\WpadDecision = "0" mssecsvr.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings mssecsvr.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings mssecsvr.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ mssecsvr.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Content\CachePrefix mssecsvr.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{2A905F01-0A57-4E51-8685-54144DDC3A32} mssecsvr.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Content\CachePrefix mssecsvr.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\DefaultConnectionSettings = 4600000002000000090000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 mssecsvr.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ProxyEnable = "0" mssecsvr.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\SavedLegacySettings = 4600000002000000090000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 mssecsvr.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{2A905F01-0A57-4E51-8685-54144DDC3A32}\WpadDecisionReason = "1" mssecsvr.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{2A905F01-0A57-4E51-8685-54144DDC3A32}\WpadNetworkName = "Network" mssecsvr.exe -
Suspicious use of WriteProcessMemory 11 IoCs
Processes:
rundll32.exerundll32.exedescription pid process target process PID 1084 wrote to memory of 1936 1084 rundll32.exe rundll32.exe PID 1084 wrote to memory of 1936 1084 rundll32.exe rundll32.exe PID 1084 wrote to memory of 1936 1084 rundll32.exe rundll32.exe PID 1084 wrote to memory of 1936 1084 rundll32.exe rundll32.exe PID 1084 wrote to memory of 1936 1084 rundll32.exe rundll32.exe PID 1084 wrote to memory of 1936 1084 rundll32.exe rundll32.exe PID 1084 wrote to memory of 1936 1084 rundll32.exe rundll32.exe PID 1936 wrote to memory of 1988 1936 rundll32.exe mssecsvr.exe PID 1936 wrote to memory of 1988 1936 rundll32.exe mssecsvr.exe PID 1936 wrote to memory of 1988 1936 rundll32.exe mssecsvr.exe PID 1936 wrote to memory of 1988 1936 rundll32.exe mssecsvr.exe
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\4aa86d876c03a70084d8bb7a240ffe06293496d5c4c3f77761360d2beacd2a95.dll,#11⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\4aa86d876c03a70084d8bb7a240ffe06293496d5c4c3f77761360d2beacd2a95.dll,#12⤵
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
-
C:\WINDOWS\mssecsvr.exeC:\WINDOWS\mssecsvr.exe3⤵
- Executes dropped EXE
- Drops file in Windows directory
-
C:\WINDOWS\mssecsvr.exeC:\WINDOWS\mssecsvr.exe -m security1⤵
- Executes dropped EXE
- Drops file in System32 directory
- Modifies data under HKEY_USERS
-
C:\WINDOWS\mssecsvr.exeC:\WINDOWS\mssecsvr.exe1⤵
- Executes dropped EXE
- Drops file in System32 directory
- Drops file in Windows directory
- Modifies data under HKEY_USERS
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\WINDOWS\mssecsvr.exeMD5
ea3352c0ca904eda7ee140efe6f3b105
SHA1e64e377ee7e154826cdd00fa8cbf1705b752b6ff
SHA25644eed4ecc2c4a133eb595405934bbcb776431bcb560d4f1e9a52f22d0cc24502
SHA512d9fb1322b6b818ae71e2adc8abc42fab1fe5948c98fdcc366228e14d0bc1ac45c269cb833031d0002b9228bd33befd29c23464ab6ac6d7ed7cfd3ec41deca1a3
-
C:\WINDOWS\tasksche.exeMD5
414f475a0ec8f2bbc2fb09642787f79b
SHA1009b4f39625c50108810a097fd1a78f886b72a18
SHA256d851f22a149609d4c367988f997155b15791e1cae2d86f9af152b470f11bd33a
SHA51219335373509319f2ffa97bb6044c57e7094502e68e56ee73e36746521d918bef324d3c957c1ffab633cf8409cadaf983b544ca77827b2fd56306e22e909bf60d
-
C:\Windows\mssecsvr.exeMD5
ea3352c0ca904eda7ee140efe6f3b105
SHA1e64e377ee7e154826cdd00fa8cbf1705b752b6ff
SHA25644eed4ecc2c4a133eb595405934bbcb776431bcb560d4f1e9a52f22d0cc24502
SHA512d9fb1322b6b818ae71e2adc8abc42fab1fe5948c98fdcc366228e14d0bc1ac45c269cb833031d0002b9228bd33befd29c23464ab6ac6d7ed7cfd3ec41deca1a3
-
C:\Windows\mssecsvr.exeMD5
ea3352c0ca904eda7ee140efe6f3b105
SHA1e64e377ee7e154826cdd00fa8cbf1705b752b6ff
SHA25644eed4ecc2c4a133eb595405934bbcb776431bcb560d4f1e9a52f22d0cc24502
SHA512d9fb1322b6b818ae71e2adc8abc42fab1fe5948c98fdcc366228e14d0bc1ac45c269cb833031d0002b9228bd33befd29c23464ab6ac6d7ed7cfd3ec41deca1a3
-
C:\Windows\mssecsvr.exeMD5
ea3352c0ca904eda7ee140efe6f3b105
SHA1e64e377ee7e154826cdd00fa8cbf1705b752b6ff
SHA25644eed4ecc2c4a133eb595405934bbcb776431bcb560d4f1e9a52f22d0cc24502
SHA512d9fb1322b6b818ae71e2adc8abc42fab1fe5948c98fdcc366228e14d0bc1ac45c269cb833031d0002b9228bd33befd29c23464ab6ac6d7ed7cfd3ec41deca1a3
-
memory/1936-59-0x0000000000000000-mapping.dmp
-
memory/1936-60-0x00000000752F1000-0x00000000752F3000-memory.dmpFilesize
8KB
-
memory/1988-61-0x0000000000000000-mapping.dmp