Analysis
-
max time kernel
151s -
max time network
156s -
platform
windows10-2004_x64 -
resource
win10v2004-20220414-en -
submitted
14-06-2022 23:03
Static task
static1
Behavioral task
behavioral1
Sample
2c5a1a2aea7f263f2cbb063f45badccd7165b35de48c67247bf8038ff9c2f623.dll
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
2c5a1a2aea7f263f2cbb063f45badccd7165b35de48c67247bf8038ff9c2f623.dll
Resource
win10v2004-20220414-en
General
-
Target
2c5a1a2aea7f263f2cbb063f45badccd7165b35de48c67247bf8038ff9c2f623.dll
-
Size
5.0MB
-
MD5
3340eec1f90de20b798e5f6c2a7b6434
-
SHA1
ba6ab639f7ddf21da263ac9c7a48572c31d87d10
-
SHA256
2c5a1a2aea7f263f2cbb063f45badccd7165b35de48c67247bf8038ff9c2f623
-
SHA512
541fe3301b13d69bf75c738f95919af2cb52e89911c9b9985403179d0d9efe14f8cdfdad8eacc128f8cb4f014a774726db3ab2de36e7c6b335beba53c532ea0d
Malware Config
Signatures
-
Wannacry
WannaCry is a ransomware cryptoworm.
-
suricata: ET MALWARE Known Sinkhole Response Kryptos Logic
suricata: ET MALWARE Known Sinkhole Response Kryptos Logic
-
suricata: ET MALWARE W32/WannaCry.Ransomware Killswitch Domain HTTP Request 1
suricata: ET MALWARE W32/WannaCry.Ransomware Killswitch Domain HTTP Request 1
-
Contacts a large (3293) amount of remote hosts 1 TTPs
This may indicate a network scan to discover remotely running services.
-
Executes dropped EXE 3 IoCs
Processes:
mssecsvc.exemssecsvc.exetasksche.exepid process 776 mssecsvc.exe 2164 mssecsvc.exe 1960 tasksche.exe -
Creates a large amount of network flows 1 TTPs
This may indicate a network scan to discover remotely running services.
-
Drops file in Windows directory 2 IoCs
Processes:
rundll32.exemssecsvc.exedescription ioc process File created C:\WINDOWS\mssecsvc.exe rundll32.exe File created C:\WINDOWS\tasksche.exe mssecsvc.exe -
Modifies data under HKEY_USERS 5 IoCs
Processes:
mssecsvc.exedescription ioc process Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\IntranetName = "1" mssecsvc.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\UNCAsIntranet = "1" mssecsvc.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\AutoDetect = "0" mssecsvc.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ mssecsvc.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ProxyBypass = "1" mssecsvc.exe -
Suspicious use of WriteProcessMemory 6 IoCs
Processes:
rundll32.exerundll32.exedescription pid process target process PID 5004 wrote to memory of 4080 5004 rundll32.exe rundll32.exe PID 5004 wrote to memory of 4080 5004 rundll32.exe rundll32.exe PID 5004 wrote to memory of 4080 5004 rundll32.exe rundll32.exe PID 4080 wrote to memory of 776 4080 rundll32.exe mssecsvc.exe PID 4080 wrote to memory of 776 4080 rundll32.exe mssecsvc.exe PID 4080 wrote to memory of 776 4080 rundll32.exe mssecsvc.exe
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\2c5a1a2aea7f263f2cbb063f45badccd7165b35de48c67247bf8038ff9c2f623.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:5004 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\2c5a1a2aea7f263f2cbb063f45badccd7165b35de48c67247bf8038ff9c2f623.dll,#12⤵
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:4080 -
C:\WINDOWS\mssecsvc.exeC:\WINDOWS\mssecsvc.exe3⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:776 -
C:\WINDOWS\tasksche.exeC:\WINDOWS\tasksche.exe /i4⤵
- Executes dropped EXE
PID:1960
-
C:\WINDOWS\mssecsvc.exeC:\WINDOWS\mssecsvc.exe -m security1⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
PID:2164
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3.6MB
MD54f8187f7307f33cd25935f5e880ee047
SHA1984fd9e94a96d476a85ecb69bd08c390f29a3043
SHA2567a76798a97e062a6dd903570e459fdbb9aa4c24410d6cce8fe0de2e9097df571
SHA5127bfa53a6e63dc596a71191df784e09dd435bff9063fe8042c162d0c09e5f4f5713e39b9d32329eaf68cf4ed7fe1ba9e7703d3871394df8663a1ac1ebc3572815
-
Filesize
3.6MB
MD54f8187f7307f33cd25935f5e880ee047
SHA1984fd9e94a96d476a85ecb69bd08c390f29a3043
SHA2567a76798a97e062a6dd903570e459fdbb9aa4c24410d6cce8fe0de2e9097df571
SHA5127bfa53a6e63dc596a71191df784e09dd435bff9063fe8042c162d0c09e5f4f5713e39b9d32329eaf68cf4ed7fe1ba9e7703d3871394df8663a1ac1ebc3572815
-
Filesize
3.6MB
MD54f8187f7307f33cd25935f5e880ee047
SHA1984fd9e94a96d476a85ecb69bd08c390f29a3043
SHA2567a76798a97e062a6dd903570e459fdbb9aa4c24410d6cce8fe0de2e9097df571
SHA5127bfa53a6e63dc596a71191df784e09dd435bff9063fe8042c162d0c09e5f4f5713e39b9d32329eaf68cf4ed7fe1ba9e7703d3871394df8663a1ac1ebc3572815
-
Filesize
3.4MB
MD5b91800f044097d66a2956440ade809e3
SHA1163381e41d1665d3325f0081b0feb83f399a117f
SHA256324eaf7b3ecae86cfe0f4c27783e777714512b8b2a017314089bf335ecad7fe9
SHA512a191ef5d5493949dcf649e22629d748f2059c1a5d95013ec1bbf9ad835e61e4e9d0cd7ad5df6e8e33c417e412256cb796c2576a5935860dcdc67d2dbb91177a4