Analysis
-
max time kernel
151s -
max time network
155s -
platform
windows7_x64 -
resource
win7-20220414-en -
submitted
19-06-2022 18:43
Static task
static1
Behavioral task
behavioral1
Sample
3523eaea635d4f782c31bddf9faa325b926c7cd6248ba5472c3742c8d136d99c.dll
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
3523eaea635d4f782c31bddf9faa325b926c7cd6248ba5472c3742c8d136d99c.dll
Resource
win10v2004-20220414-en
General
-
Target
3523eaea635d4f782c31bddf9faa325b926c7cd6248ba5472c3742c8d136d99c.dll
-
Size
5.0MB
-
MD5
450f9c7181311b782c0308b98f0aeb49
-
SHA1
346f9b7b2f91d3d16759d0de5345e54e467d77cf
-
SHA256
3523eaea635d4f782c31bddf9faa325b926c7cd6248ba5472c3742c8d136d99c
-
SHA512
4de16f91d36ab4be5df34e5b4cd0331c964e1faa82e1a5f25f69b33a7eb10973f0ffa692b63527fc4d412086354f712a5d64038ef4a94957e76d29270b236a69
Malware Config
Signatures
-
Wannacry
WannaCry is a ransomware cryptoworm.
-
suricata: ET MALWARE Known Sinkhole Response Kryptos Logic
suricata: ET MALWARE Known Sinkhole Response Kryptos Logic
-
suricata: ET MALWARE W32/WannaCry.Ransomware Killswitch Domain HTTP Request 1
suricata: ET MALWARE W32/WannaCry.Ransomware Killswitch Domain HTTP Request 1
-
Contacts a large (1261) amount of remote hosts 1 TTPs
This may indicate a network scan to discover remotely running services.
-
Executes dropped EXE 3 IoCs
Processes:
mssecsvc.exemssecsvc.exetasksche.exepid process 1004 mssecsvc.exe 2028 mssecsvc.exe 1164 tasksche.exe -
Drops file in System32 directory 1 IoCs
Processes:
mssecsvc.exedescription ioc process File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\Temporary Internet Files\counters.dat mssecsvc.exe -
Drops file in Windows directory 2 IoCs
Processes:
mssecsvc.exerundll32.exedescription ioc process File created C:\WINDOWS\tasksche.exe mssecsvc.exe File created C:\WINDOWS\mssecsvc.exe rundll32.exe -
Modifies data under HKEY_USERS 24 IoCs
Processes:
mssecsvc.exedescription ioc process Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ mssecsvc.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\AutoDetect = "1" mssecsvc.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{D4C42536-CA93-4EE8-A0D6-3B049F0140A0}\WpadDecision = "0" mssecsvc.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\1e-50-06-f6-a6-4d\WpadDecisionReason = "1" mssecsvc.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings mssecsvc.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad mssecsvc.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\DefaultConnectionSettings = 4600000003000000090000000000000000000000000000000400000000000000000000000000000000000000000000000000000001000000020000000a7f00aa000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 mssecsvc.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{D4C42536-CA93-4EE8-A0D6-3B049F0140A0} mssecsvc.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{D4C42536-CA93-4EE8-A0D6-3B049F0140A0}\WpadNetworkName = "Network 2" mssecsvc.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\1e-50-06-f6-a6-4d mssecsvc.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\UNCAsIntranet = "0" mssecsvc.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\SavedLegacySettings = 4600000002000000090000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 mssecsvc.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Content\CachePrefix mssecsvc.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\History\CachePrefix = "Visited:" mssecsvc.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{D4C42536-CA93-4EE8-A0D6-3B049F0140A0}\WpadDecisionReason = "1" mssecsvc.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{D4C42536-CA93-4EE8-A0D6-3B049F0140A0}\WpadDecisionTime = 6024b7611d84d801 mssecsvc.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections mssecsvc.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings mssecsvc.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ProxyEnable = "0" mssecsvc.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Cookies\CachePrefix = "Cookie:" mssecsvc.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{D4C42536-CA93-4EE8-A0D6-3B049F0140A0}\1e-50-06-f6-a6-4d mssecsvc.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\1e-50-06-f6-a6-4d\WpadDecisionTime = 6024b7611d84d801 mssecsvc.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\1e-50-06-f6-a6-4d\WpadDecision = "0" mssecsvc.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\DefaultConnectionSettings = 4600000002000000090000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 mssecsvc.exe -
Suspicious use of WriteProcessMemory 11 IoCs
Processes:
rundll32.exerundll32.exedescription pid process target process PID 1972 wrote to memory of 1700 1972 rundll32.exe rundll32.exe PID 1972 wrote to memory of 1700 1972 rundll32.exe rundll32.exe PID 1972 wrote to memory of 1700 1972 rundll32.exe rundll32.exe PID 1972 wrote to memory of 1700 1972 rundll32.exe rundll32.exe PID 1972 wrote to memory of 1700 1972 rundll32.exe rundll32.exe PID 1972 wrote to memory of 1700 1972 rundll32.exe rundll32.exe PID 1972 wrote to memory of 1700 1972 rundll32.exe rundll32.exe PID 1700 wrote to memory of 1004 1700 rundll32.exe mssecsvc.exe PID 1700 wrote to memory of 1004 1700 rundll32.exe mssecsvc.exe PID 1700 wrote to memory of 1004 1700 rundll32.exe mssecsvc.exe PID 1700 wrote to memory of 1004 1700 rundll32.exe mssecsvc.exe
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\3523eaea635d4f782c31bddf9faa325b926c7cd6248ba5472c3742c8d136d99c.dll,#11⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\3523eaea635d4f782c31bddf9faa325b926c7cd6248ba5472c3742c8d136d99c.dll,#12⤵
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
-
C:\WINDOWS\mssecsvc.exeC:\WINDOWS\mssecsvc.exe3⤵
- Executes dropped EXE
- Drops file in Windows directory
-
C:\WINDOWS\tasksche.exeC:\WINDOWS\tasksche.exe /i4⤵
- Executes dropped EXE
-
C:\WINDOWS\mssecsvc.exeC:\WINDOWS\mssecsvc.exe -m security1⤵
- Executes dropped EXE
- Drops file in System32 directory
- Modifies data under HKEY_USERS
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\WINDOWS\mssecsvc.exeFilesize
3.6MB
MD50f5f0bd6d2a65a8dc9e7bb4ef4a88bce
SHA1e89db64e255166ab3dc278497466371b5937d2f4
SHA25626581e2669cf618ee9f940dd8d6e136d7f0fe1bb79f9d52a86ebdce2b2c7b97f
SHA512374f090fa41c353384cbafaa36630ba4713891987b766b810806df6ed08283f9f94b5c26c5fc2bef6196d522c107a5126a50a8bb5c7361bae13e350741efdfaa
-
C:\Windows\mssecsvc.exeFilesize
3.6MB
MD50f5f0bd6d2a65a8dc9e7bb4ef4a88bce
SHA1e89db64e255166ab3dc278497466371b5937d2f4
SHA25626581e2669cf618ee9f940dd8d6e136d7f0fe1bb79f9d52a86ebdce2b2c7b97f
SHA512374f090fa41c353384cbafaa36630ba4713891987b766b810806df6ed08283f9f94b5c26c5fc2bef6196d522c107a5126a50a8bb5c7361bae13e350741efdfaa
-
C:\Windows\mssecsvc.exeFilesize
3.6MB
MD50f5f0bd6d2a65a8dc9e7bb4ef4a88bce
SHA1e89db64e255166ab3dc278497466371b5937d2f4
SHA25626581e2669cf618ee9f940dd8d6e136d7f0fe1bb79f9d52a86ebdce2b2c7b97f
SHA512374f090fa41c353384cbafaa36630ba4713891987b766b810806df6ed08283f9f94b5c26c5fc2bef6196d522c107a5126a50a8bb5c7361bae13e350741efdfaa
-
C:\Windows\tasksche.exeFilesize
3.4MB
MD51115646e655f3b67437fc86a3d73053f
SHA14797c909a1de48b1f509e4ff996226251232a6ff
SHA256329a77b46bf97b3fc8f7733605d92ef7f888980172174d3c7230384980add132
SHA512ca8cd6ab6beb57c1a07ea215d11622011d288b1318ca12a5d08124f163da30833f4e574fdc52e99ca5f8c2b2d040b5f88e9cdca4909d32b9e6739de4b0b1e154
-
memory/1004-56-0x0000000000000000-mapping.dmp
-
memory/1700-54-0x0000000000000000-mapping.dmp
-
memory/1700-55-0x0000000075F21000-0x0000000075F23000-memory.dmpFilesize
8KB