Analysis
-
max time kernel
150s -
max time network
175s -
platform
windows7_x64 -
resource
win7v20210410 -
submitted
26-07-2021 12:42
Static task
static1
Behavioral task
behavioral1
Sample
042889c7d19b1c7aec30d171c1e147953907146ff5eb81e3bfc29ca83e962658.sample.dll
Resource
win7v20210410
Behavioral task
behavioral2
Sample
042889c7d19b1c7aec30d171c1e147953907146ff5eb81e3bfc29ca83e962658.sample.dll
Resource
win10v20210408
General
-
Target
042889c7d19b1c7aec30d171c1e147953907146ff5eb81e3bfc29ca83e962658.sample.dll
-
Size
5.0MB
-
MD5
3b9fa46d89fd099e914d6275cac9171f
-
SHA1
6236eff5dc07a222bbf60f4e62225f2052b1f55a
-
SHA256
042889c7d19b1c7aec30d171c1e147953907146ff5eb81e3bfc29ca83e962658
-
SHA512
d6548746bd45b2e0151c7f7fd2ea0d1ce983f5e659366777def2d8f10f10322733af168d086a5b3d126e7e108263a5b954652f526d93982e4f9719b3411abd27
Malware Config
Signatures
-
Wannacry
WannaCry is a ransomware cryptoworm.
-
suricata: ET MALWARE Known Sinkhole Response Kryptos Logic
-
suricata: ET MALWARE W32/WannaCry.Ransomware Killswitch Domain HTTP Request 1
-
Executes dropped EXE 3 IoCs
Processes:
mssecsvc.exemssecsvc.exetasksche.exepid process 1824 mssecsvc.exe 1772 mssecsvc.exe 2032 tasksche.exe -
Drops file in System32 directory 1 IoCs
Processes:
mssecsvc.exedescription ioc process File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\Temporary Internet Files\counters.dat mssecsvc.exe -
Drops file in Windows directory 2 IoCs
Processes:
rundll32.exemssecsvc.exedescription ioc process File created C:\WINDOWS\mssecsvc.exe rundll32.exe File created C:\WINDOWS\tasksche.exe mssecsvc.exe -
Modifies data under HKEY_USERS 24 IoCs
Processes:
mssecsvc.exedescription ioc process Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad mssecsvc.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{2A905F01-0A57-4E51-8685-54144DDC3A32} mssecsvc.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{2A905F01-0A57-4E51-8685-54144DDC3A32}\WpadDecisionTime = b04610842082d701 mssecsvc.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{2A905F01-0A57-4E51-8685-54144DDC3A32}\WpadNetworkName = "Network" mssecsvc.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections mssecsvc.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\SavedLegacySettings = 4600000002000000090000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 mssecsvc.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ mssecsvc.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\UNCAsIntranet = "0" mssecsvc.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\fa-ed-a6-6b-0b-a1\WpadDecision = "0" mssecsvc.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\History\CachePrefix = "Visited:" mssecsvc.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\DefaultConnectionSettings = 4600000003000000090000000000000000000000000000000400000000000000000000000000000000000000000000000000000001000000020000000a070018000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 mssecsvc.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{2A905F01-0A57-4E51-8685-54144DDC3A32}\WpadDecisionReason = "1" mssecsvc.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\fa-ed-a6-6b-0b-a1 mssecsvc.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings mssecsvc.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings mssecsvc.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\AutoDetect = "1" mssecsvc.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Cookies\CachePrefix = "Cookie:" mssecsvc.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{2A905F01-0A57-4E51-8685-54144DDC3A32}\fa-ed-a6-6b-0b-a1 mssecsvc.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\fa-ed-a6-6b-0b-a1\WpadDecisionTime = b04610842082d701 mssecsvc.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\DefaultConnectionSettings = 4600000002000000090000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 mssecsvc.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ProxyEnable = "0" mssecsvc.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{2A905F01-0A57-4E51-8685-54144DDC3A32}\WpadDecision = "0" mssecsvc.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\fa-ed-a6-6b-0b-a1\WpadDecisionReason = "1" mssecsvc.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Content\CachePrefix mssecsvc.exe -
Suspicious use of WriteProcessMemory 11 IoCs
Processes:
rundll32.exerundll32.exedescription pid process target process PID 916 wrote to memory of 1664 916 rundll32.exe rundll32.exe PID 916 wrote to memory of 1664 916 rundll32.exe rundll32.exe PID 916 wrote to memory of 1664 916 rundll32.exe rundll32.exe PID 916 wrote to memory of 1664 916 rundll32.exe rundll32.exe PID 916 wrote to memory of 1664 916 rundll32.exe rundll32.exe PID 916 wrote to memory of 1664 916 rundll32.exe rundll32.exe PID 916 wrote to memory of 1664 916 rundll32.exe rundll32.exe PID 1664 wrote to memory of 1824 1664 rundll32.exe mssecsvc.exe PID 1664 wrote to memory of 1824 1664 rundll32.exe mssecsvc.exe PID 1664 wrote to memory of 1824 1664 rundll32.exe mssecsvc.exe PID 1664 wrote to memory of 1824 1664 rundll32.exe mssecsvc.exe
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\042889c7d19b1c7aec30d171c1e147953907146ff5eb81e3bfc29ca83e962658.sample.dll,#11⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\042889c7d19b1c7aec30d171c1e147953907146ff5eb81e3bfc29ca83e962658.sample.dll,#12⤵
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
-
C:\WINDOWS\mssecsvc.exeC:\WINDOWS\mssecsvc.exe3⤵
- Executes dropped EXE
- Drops file in Windows directory
-
C:\WINDOWS\tasksche.exeC:\WINDOWS\tasksche.exe /i4⤵
- Executes dropped EXE
-
C:\WINDOWS\mssecsvc.exeC:\WINDOWS\mssecsvc.exe -m security1⤵
- Executes dropped EXE
- Drops file in System32 directory
- Modifies data under HKEY_USERS
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\WINDOWS\mssecsvc.exeMD5
f08d0f0cda8772605629e99ba5b8a081
SHA199374a3fcbe7a0d383c8fc135fd6eb8107618971
SHA25603000ec3fa1e5f5340b9336c7ec2c38f1048f3d2aa1531fb0985020231de3e0e
SHA51286f0132a0c0248a705d2d25b871526ba98b1174374c728ab11631df490c885bbae0c95eee5ba2fee2bd195ed57c593a4ebaf9b2dba8f1d5920079a6893186973
-
C:\Windows\mssecsvc.exeMD5
f08d0f0cda8772605629e99ba5b8a081
SHA199374a3fcbe7a0d383c8fc135fd6eb8107618971
SHA25603000ec3fa1e5f5340b9336c7ec2c38f1048f3d2aa1531fb0985020231de3e0e
SHA51286f0132a0c0248a705d2d25b871526ba98b1174374c728ab11631df490c885bbae0c95eee5ba2fee2bd195ed57c593a4ebaf9b2dba8f1d5920079a6893186973
-
C:\Windows\mssecsvc.exeMD5
f08d0f0cda8772605629e99ba5b8a081
SHA199374a3fcbe7a0d383c8fc135fd6eb8107618971
SHA25603000ec3fa1e5f5340b9336c7ec2c38f1048f3d2aa1531fb0985020231de3e0e
SHA51286f0132a0c0248a705d2d25b871526ba98b1174374c728ab11631df490c885bbae0c95eee5ba2fee2bd195ed57c593a4ebaf9b2dba8f1d5920079a6893186973
-
C:\Windows\tasksche.exeMD5
0910f614c33699c34cc61ce10fd35675
SHA1113833d7e9ef1e234bdd8750cb2b7a39c93911ac
SHA25668ae02e39a736e0b2464e51b47b5c81fa0d127a15c645ee2297b6aa1e82c2dd5
SHA51205ff393d6962aa998624f7d97fc4b0f2a87686124a261a54239b426231af1d4210f2e3472359fb536f88d5a6e82abd6a188be957a0240694d62a03e398bdd0ca
-
memory/1664-60-0x0000000000000000-mapping.dmp
-
memory/1664-61-0x0000000075011000-0x0000000075013000-memory.dmpFilesize
8KB
-
memory/1824-62-0x0000000000000000-mapping.dmp