Analysis

  • max time kernel
    151s
  • max time network
    156s
  • platform
    windows7_x64
  • resource
    win7-20220414-en
  • submitted
    12-06-2022 12:46

General

  • Target

    Windows/MSSECSVC.exe

  • Size

    3.6MB

  • MD5

    55816e3a47bd0ee742f41153dfcd76ad

  • SHA1

    78dbe08344794c928188a7421c52720844f28b13

  • SHA256

    a52e904523d45013ebb109d088626731400ddd031d25f60ee0c61c19e5c5a167

  • SHA512

    5b3a447a0ae0732bee048a5c03d5656ec6fc8b0a13b6921e537bbb212fe83ce65d518cd1b114648d338445b3ceb3afcb9479b723c79ff292ecd46c0d88019aa8

Malware Config

Signatures

  • Wannacry

    WannaCry is a ransomware cryptoworm.

  • suricata: ET MALWARE Known Sinkhole Response Kryptos Logic

    suricata: ET MALWARE Known Sinkhole Response Kryptos Logic

  • suricata: ET MALWARE W32/WannaCry.Ransomware Killswitch Domain HTTP Request 1

    suricata: ET MALWARE W32/WannaCry.Ransomware Killswitch Domain HTTP Request 1

  • Contacts a large (1293) amount of remote hosts 1 TTPs

    This may indicate a network scan to discover remotely running services.

  • Executes dropped EXE 1 IoCs
  • Drops file in System32 directory 1 IoCs
  • Drops file in Windows directory 1 IoCs
  • Modifies data under HKEY_USERS 24 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\Windows\MSSECSVC.exe
    "C:\Users\Admin\AppData\Local\Temp\Windows\MSSECSVC.exe"
    1⤵
    • Drops file in Windows directory
    PID:1984
    • C:\WINDOWS\tasksche.exe
      C:\WINDOWS\tasksche.exe /i
      2⤵
      • Executes dropped EXE
      PID:700
  • C:\Users\Admin\AppData\Local\Temp\Windows\MSSECSVC.exe
    C:\Users\Admin\AppData\Local\Temp\Windows\MSSECSVC.exe -m security
    1⤵
    • Drops file in System32 directory
    • Modifies data under HKEY_USERS
    PID:1064

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Windows\tasksche.exe

    Filesize

    3.4MB

    MD5

    466b6d86ce08666e933aed703196033f

    SHA1

    683b2dddcd629ec1534bcb411912a5285fb5b989

    SHA256

    982a1485dcd70fbdc0c34f81d1b4a798cc0aca74495b505abfe277a65ef5d783

    SHA512

    d979b4887dbd49aee24e11a20584da9be4d6bdc5eeb57cff9edef1d85916b1936cfe513ac4317c00546497c0b23cd52d664ea6a9752b3ba5e98e9af8d7daf750

  • memory/1984-54-0x0000000076571000-0x0000000076573000-memory.dmp

    Filesize

    8KB