Analysis

  • max time kernel
    150s
  • max time network
    155s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220414-en
  • submitted
    16-06-2022 03:34

General

  • Target

    27b656167ee5504bcd296075509bcbdb09b1aba52aec630ec84d23b0a2dbd90e.dll

  • Size

    5.0MB

  • MD5

    118eedee15f92a246867fed1e15bfda1

  • SHA1

    5ff90cf70d36d8be902e23bba87e9df6ccb3dad7

  • SHA256

    27b656167ee5504bcd296075509bcbdb09b1aba52aec630ec84d23b0a2dbd90e

  • SHA512

    7259fcad1c439c2b901203d1f35ed2569dfa6f0018b33c6710343cf731c0a7c09a6aa7a20b37fd57b393c536a3d399da37bc068a1a646f17350c68d959040c8b

Malware Config

Signatures

  • Wannacry

    WannaCry is a ransomware cryptoworm.

  • suricata: ET MALWARE Known Sinkhole Response Kryptos Logic

    suricata: ET MALWARE Known Sinkhole Response Kryptos Logic

  • suricata: ET MALWARE W32/WannaCry.Ransomware Killswitch Domain HTTP Request 1

    suricata: ET MALWARE W32/WannaCry.Ransomware Killswitch Domain HTTP Request 1

  • Contacts a large (3168) amount of remote hosts 1 TTPs

    This may indicate a network scan to discover remotely running services.

  • Executes dropped EXE 3 IoCs
  • Creates a large amount of network flows 1 TTPs

    This may indicate a network scan to discover remotely running services.

  • Drops file in Windows directory 2 IoCs
  • Modifies data under HKEY_USERS 5 IoCs
  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Windows\system32\rundll32.exe
    rundll32.exe C:\Users\Admin\AppData\Local\Temp\27b656167ee5504bcd296075509bcbdb09b1aba52aec630ec84d23b0a2dbd90e.dll,#1
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:4628
    • C:\Windows\SysWOW64\rundll32.exe
      rundll32.exe C:\Users\Admin\AppData\Local\Temp\27b656167ee5504bcd296075509bcbdb09b1aba52aec630ec84d23b0a2dbd90e.dll,#1
      2⤵
      • Drops file in Windows directory
      • Suspicious use of WriteProcessMemory
      PID:4884
      • C:\WINDOWS\mssecsvc.exe
        C:\WINDOWS\mssecsvc.exe
        3⤵
        • Executes dropped EXE
        • Drops file in Windows directory
        PID:2064
        • C:\WINDOWS\tasksche.exe
          C:\WINDOWS\tasksche.exe /i
          4⤵
          • Executes dropped EXE
          PID:1608
  • C:\WINDOWS\mssecsvc.exe
    C:\WINDOWS\mssecsvc.exe -m security
    1⤵
    • Executes dropped EXE
    • Modifies data under HKEY_USERS
    PID:3104

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\WINDOWS\mssecsvc.exe
    Filesize

    3.6MB

    MD5

    661fdd674e5b970bd6c16b79157dca7b

    SHA1

    4845c77b316f47a4a4451f49af0557bfcb9414c7

    SHA256

    f7bc720a877190d678b5aed7c5f17c6a08ee44d3c7b81f8bf951dc309ed242d0

    SHA512

    f6e2f9ca3bebf7913d20431fec77f557c1a23950b9001496fa99fd6d1a207cabbca2f0ab78d05c6c8ff5d2b35c49287edc01c797b4e557b0e45cecea32ea2083

  • C:\Windows\mssecsvc.exe
    Filesize

    3.6MB

    MD5

    661fdd674e5b970bd6c16b79157dca7b

    SHA1

    4845c77b316f47a4a4451f49af0557bfcb9414c7

    SHA256

    f7bc720a877190d678b5aed7c5f17c6a08ee44d3c7b81f8bf951dc309ed242d0

    SHA512

    f6e2f9ca3bebf7913d20431fec77f557c1a23950b9001496fa99fd6d1a207cabbca2f0ab78d05c6c8ff5d2b35c49287edc01c797b4e557b0e45cecea32ea2083

  • C:\Windows\mssecsvc.exe
    Filesize

    3.6MB

    MD5

    661fdd674e5b970bd6c16b79157dca7b

    SHA1

    4845c77b316f47a4a4451f49af0557bfcb9414c7

    SHA256

    f7bc720a877190d678b5aed7c5f17c6a08ee44d3c7b81f8bf951dc309ed242d0

    SHA512

    f6e2f9ca3bebf7913d20431fec77f557c1a23950b9001496fa99fd6d1a207cabbca2f0ab78d05c6c8ff5d2b35c49287edc01c797b4e557b0e45cecea32ea2083

  • C:\Windows\tasksche.exe
    Filesize

    3.4MB

    MD5

    f7a6deedaa31614b07e5407e02404a77

    SHA1

    39396676c7c3b17737d3d54104e391c9b3980469

    SHA256

    bc063fe618ebd42fd8750193a963f9296301f34d979dc0fd89624caf7bb5c3d0

    SHA512

    93edd5f22678c76271f24d62aa3d7623294279f74d905a18c470c28ad6fe6262080f852daf8f6d328d9e2008688a346b738022429aae06cacbb9c5de46ab157a

  • memory/2064-131-0x0000000000000000-mapping.dmp
  • memory/4884-130-0x0000000000000000-mapping.dmp