Analysis

  • max time kernel
    78s
  • max time network
    70s
  • platform
    windows7_x64
  • resource
    win7-20220414-en
  • submitted
    12-06-2022 17:09

General

  • Target

    1fac100d4c262c460a3028c417d0793fdc97dee5e4330cf44cb61e3347e58059.dll

  • Size

    5.0MB

  • MD5

    c335ac7e229f289831b9a8d849a5ac8d

  • SHA1

    2a389f32d429343a0bd58bbff71a9931d132dc70

  • SHA256

    1fac100d4c262c460a3028c417d0793fdc97dee5e4330cf44cb61e3347e58059

  • SHA512

    3dc3cf7878cf26831b229adc38402cdfdd7ee0e1aaacff1e17e53325b2184cd22ef78f1551c129927c86dd49fa7eb1347554f78a1528fa7affdc5b7692ef190b

Malware Config

Signatures

  • Wannacry

    WannaCry is a ransomware cryptoworm.

  • suricata: ET MALWARE Known Sinkhole Response Kryptos Logic

    suricata: ET MALWARE Known Sinkhole Response Kryptos Logic

  • suricata: ET MALWARE W32/WannaCry.Ransomware Killswitch Domain HTTP Request 1

    suricata: ET MALWARE W32/WannaCry.Ransomware Killswitch Domain HTTP Request 1

  • Executes dropped EXE 3 IoCs
  • Drops file in System32 directory 1 IoCs
  • Drops file in Windows directory 2 IoCs
  • Modifies data under HKEY_USERS 24 IoCs
  • Suspicious use of WriteProcessMemory 11 IoCs

Processes

  • C:\Windows\system32\rundll32.exe
    rundll32.exe C:\Users\Admin\AppData\Local\Temp\1fac100d4c262c460a3028c417d0793fdc97dee5e4330cf44cb61e3347e58059.dll,#1
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1260
    • C:\Windows\SysWOW64\rundll32.exe
      rundll32.exe C:\Users\Admin\AppData\Local\Temp\1fac100d4c262c460a3028c417d0793fdc97dee5e4330cf44cb61e3347e58059.dll,#1
      2⤵
      • Drops file in Windows directory
      • Suspicious use of WriteProcessMemory
      PID:1656
      • C:\WINDOWS\mssecsvc.exe
        C:\WINDOWS\mssecsvc.exe
        3⤵
        • Executes dropped EXE
        • Drops file in Windows directory
        PID:1928
        • C:\WINDOWS\tasksche.exe
          C:\WINDOWS\tasksche.exe /i
          4⤵
          • Executes dropped EXE
          PID:908
  • C:\WINDOWS\mssecsvc.exe
    C:\WINDOWS\mssecsvc.exe -m security
    1⤵
    • Executes dropped EXE
    • Drops file in System32 directory
    • Modifies data under HKEY_USERS
    PID:1684

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Windows\mssecsvc.exe

    Filesize

    3.6MB

    MD5

    90024d3e79ad84afc0b084f84112eddd

    SHA1

    1c36cf9db5129f930c90c6036a27bd9d46fc9ef0

    SHA256

    5b3d12263a030961985b28b50510e66ff4540d98006ac0b604d7337a73ca7d56

    SHA512

    9ef0db9fab5729524edba55b56a0b7f05ab0881bbb9f3e32175b0921926c58b4f7c4fdcb5e67b1f69931cdac4976a0672df13f6ae9889ac2b595b6e6fd9b2a9d

  • C:\Windows\mssecsvc.exe

    Filesize

    3.6MB

    MD5

    90024d3e79ad84afc0b084f84112eddd

    SHA1

    1c36cf9db5129f930c90c6036a27bd9d46fc9ef0

    SHA256

    5b3d12263a030961985b28b50510e66ff4540d98006ac0b604d7337a73ca7d56

    SHA512

    9ef0db9fab5729524edba55b56a0b7f05ab0881bbb9f3e32175b0921926c58b4f7c4fdcb5e67b1f69931cdac4976a0672df13f6ae9889ac2b595b6e6fd9b2a9d

  • C:\Windows\tasksche.exe

    Filesize

    3.4MB

    MD5

    b3b959b279d90ab707370beca99a316c

    SHA1

    2aed55bc2ece3967405dc479405cf89557582ea2

    SHA256

    3156c6f1e31bcb4ecfd811c18b27fd3195ca93c0ef48bcf50132d64713a7d31c

    SHA512

    499e0133b8f21cb8ed0de09a81d70adbe2d9ff36f5f186140e31844b11793c70f0cb0a8c81d7e7cba309e3073b31ea2da7ede97c29b467c49b5d2b63a68611ba

  • memory/1656-54-0x0000000000000000-mapping.dmp

  • memory/1656-55-0x0000000075361000-0x0000000075363000-memory.dmp

    Filesize

    8KB

  • memory/1928-56-0x0000000000000000-mapping.dmp