Analysis

  • max time kernel
    42s
  • max time network
    46s
  • platform
    windows7_x64
  • resource
    win7-20220414-en
  • submitted
    16-06-2022 04:54

General

  • Target

    276c1f2820466b60541694851bd5546b5c109e04fa6c99822f2649d89f970b5c.dll

  • Size

    5.0MB

  • MD5

    cb99dbcc738243976831a1a5af249010

  • SHA1

    11b3de1c41e9d87610011145d0f81eeb5c44a8ca

  • SHA256

    276c1f2820466b60541694851bd5546b5c109e04fa6c99822f2649d89f970b5c

  • SHA512

    3a24cb1d1fcf846efa62c458eabef31368a5fab5470ba3902e7e377524607a250be5aa0ecd1d46f08cb3754344edb87d4185e9c0cf9a2d0282b40b18effe447e

Malware Config

Signatures

  • Wannacry

    WannaCry is a ransomware cryptoworm.

  • suricata: ET MALWARE Known Sinkhole Response Kryptos Logic

    suricata: ET MALWARE Known Sinkhole Response Kryptos Logic

  • suricata: ET MALWARE W32/WannaCry.Ransomware Killswitch Domain HTTP Request 1

    suricata: ET MALWARE W32/WannaCry.Ransomware Killswitch Domain HTTP Request 1

  • Executes dropped EXE 3 IoCs
  • Drops file in System32 directory 1 IoCs
  • Drops file in Windows directory 2 IoCs
  • Modifies data under HKEY_USERS 24 IoCs
  • Suspicious use of WriteProcessMemory 11 IoCs

Processes

  • C:\Windows\system32\rundll32.exe
    rundll32.exe C:\Users\Admin\AppData\Local\Temp\276c1f2820466b60541694851bd5546b5c109e04fa6c99822f2649d89f970b5c.dll,#1
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1612
    • C:\Windows\SysWOW64\rundll32.exe
      rundll32.exe C:\Users\Admin\AppData\Local\Temp\276c1f2820466b60541694851bd5546b5c109e04fa6c99822f2649d89f970b5c.dll,#1
      2⤵
      • Drops file in Windows directory
      • Suspicious use of WriteProcessMemory
      PID:1304
      • C:\WINDOWS\mssecsvc.exe
        C:\WINDOWS\mssecsvc.exe
        3⤵
        • Executes dropped EXE
        • Drops file in Windows directory
        PID:1812
        • C:\WINDOWS\tasksche.exe
          C:\WINDOWS\tasksche.exe /i
          4⤵
          • Executes dropped EXE
          PID:872
  • C:\WINDOWS\mssecsvc.exe
    C:\WINDOWS\mssecsvc.exe -m security
    1⤵
    • Executes dropped EXE
    • Drops file in System32 directory
    • Modifies data under HKEY_USERS
    PID:1364

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Windows\mssecsvc.exe
    Filesize

    3.6MB

    MD5

    1c2cbf9b0ccb996cd409d5e04f984c8b

    SHA1

    b917edbc6195f05bd90f018304a5801b4ca24592

    SHA256

    780a9129e626c4867bc6534ad94aca8f52a904b25f840f3ffdba03258d23cfc2

    SHA512

    30a91b10aa74ad5a1f293364fce07ba9ac031b5fc5ea3798de02593f1eb9fbf1147a847b2ad0fc7cd59d428cabd3f261b06bd1e8676f137b30b81b75fd87248a

  • C:\Windows\mssecsvc.exe
    Filesize

    3.6MB

    MD5

    1c2cbf9b0ccb996cd409d5e04f984c8b

    SHA1

    b917edbc6195f05bd90f018304a5801b4ca24592

    SHA256

    780a9129e626c4867bc6534ad94aca8f52a904b25f840f3ffdba03258d23cfc2

    SHA512

    30a91b10aa74ad5a1f293364fce07ba9ac031b5fc5ea3798de02593f1eb9fbf1147a847b2ad0fc7cd59d428cabd3f261b06bd1e8676f137b30b81b75fd87248a

  • C:\Windows\tasksche.exe
    Filesize

    3.4MB

    MD5

    a3237e084ef19e3276e890d4c407c394

    SHA1

    50c0a4b38fb2d8f9ca5cbc70a40e8f0f29eb98e6

    SHA256

    545e161df72ba71155cfb65abbefb621ee54317593cfe5ce586794112185b2da

    SHA512

    2bfa2262d440c88a2fcd232df61d33cdfc89acde14980bcfaf1c646b1fcad18a44170b1f700604bea9d6940bee33998b27e1cde91385c36df2ef7390bb8792da

  • memory/1304-54-0x0000000000000000-mapping.dmp
  • memory/1304-55-0x0000000076531000-0x0000000076533000-memory.dmp
    Filesize

    8KB

  • memory/1812-56-0x0000000000000000-mapping.dmp