Analysis

  • max time kernel
    151s
  • max time network
    158s
  • platform
    windows7_x64
  • resource
    win7-20220414-en
  • submitted
    20-06-2022 04:36

General

  • Target

    32e43652533f32ad08ba96a0a896c05ce865c01880641ff21008a61169a50038.dll

  • Size

    5.0MB

  • MD5

    64c3e9f584a0b0fdfaf114c3c78273d9

  • SHA1

    df7a6be71e6eba5d703bb1f226feb4012b2bf432

  • SHA256

    32e43652533f32ad08ba96a0a896c05ce865c01880641ff21008a61169a50038

  • SHA512

    f899df01222018f14e7575954c271d4c7120d11b23e2314d59ec5ae9793c60634a66309777449fc084f3d8d5586790f659a509fcedf4a503391527789fed0576

Malware Config

Signatures

  • Wannacry

    WannaCry is a ransomware cryptoworm.

  • Contacts a large (1262) amount of remote hosts 1 TTPs

    This may indicate a network scan to discover remotely running services.

  • Executes dropped EXE 3 IoCs
  • Drops file in System32 directory 1 IoCs
  • Drops file in Windows directory 4 IoCs
  • Modifies data under HKEY_USERS 24 IoCs
  • Suspicious use of WriteProcessMemory 18 IoCs

Processes

  • C:\Windows\system32\rundll32.exe
    rundll32.exe C:\Users\Admin\AppData\Local\Temp\32e43652533f32ad08ba96a0a896c05ce865c01880641ff21008a61169a50038.dll,#1
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1664
    • C:\Windows\SysWOW64\rundll32.exe
      rundll32.exe C:\Users\Admin\AppData\Local\Temp\32e43652533f32ad08ba96a0a896c05ce865c01880641ff21008a61169a50038.dll,#1
      2⤵
      • Drops file in Windows directory
      • Suspicious use of WriteProcessMemory
      PID:1888
      • C:\WINDOWS\mssecsvr.exe
        C:\WINDOWS\mssecsvr.exe
        3⤵
        • Executes dropped EXE
        • Drops file in Windows directory
        • Suspicious use of WriteProcessMemory
        PID:2032
        • C:\WINDOWS\tasksche.exe
          C:\WINDOWS\tasksche.exe /i
          4⤵
          • Executes dropped EXE
          • Drops file in Windows directory
          PID:1752
  • C:\WINDOWS\mssecsvr.exe
    C:\WINDOWS\mssecsvr.exe -m security
    1⤵
    • Executes dropped EXE
    • Drops file in System32 directory
    • Modifies data under HKEY_USERS
    PID:936

Network

MITRE ATT&CK Matrix ATT&CK v6

Discovery

Network Service Scanning

1
T1046

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\WINDOWS\mssecsvr.exe
    Filesize

    2.2MB

    MD5

    582a6a9581116c1b670aa804ef41d1d8

    SHA1

    46bd1026ac63d9b22d6dd8935f23cb2eb8057ed2

    SHA256

    c1500978e57d8b886e4bd0782b8679045bef80537ca993fc76ce81103c7f0beb

    SHA512

    600f4ef787e9497e34d5e42e82815c8efaec0ba37872246dd66edcefd3a02dad8206b0e91f27ac73be9d7e44512c8f10db042fc34012828fd35884f2e4227807

  • C:\WINDOWS\tasksche.exe
    Filesize

    2.0MB

    MD5

    d7421e05d407fc58d2b5524c8ca6d566

    SHA1

    ef787a0c924ce046e5b0e0ae918b8f7c9afcf76f

    SHA256

    1f834385decc777c41a193e77be01215495bccd0c9ce4f6c08f9a60824021da3

    SHA512

    84a78f6826c50bb1357d1fdfe2cf09a8c8772404d0483c21572313f5bd3c16466c038667231ee2fc21ae19bb31651249d0e073a4e87eb64b026dd033e1f6c158

  • C:\Windows\mssecsvr.exe
    Filesize

    2.2MB

    MD5

    582a6a9581116c1b670aa804ef41d1d8

    SHA1

    46bd1026ac63d9b22d6dd8935f23cb2eb8057ed2

    SHA256

    c1500978e57d8b886e4bd0782b8679045bef80537ca993fc76ce81103c7f0beb

    SHA512

    600f4ef787e9497e34d5e42e82815c8efaec0ba37872246dd66edcefd3a02dad8206b0e91f27ac73be9d7e44512c8f10db042fc34012828fd35884f2e4227807

  • C:\Windows\mssecsvr.exe
    Filesize

    2.2MB

    MD5

    582a6a9581116c1b670aa804ef41d1d8

    SHA1

    46bd1026ac63d9b22d6dd8935f23cb2eb8057ed2

    SHA256

    c1500978e57d8b886e4bd0782b8679045bef80537ca993fc76ce81103c7f0beb

    SHA512

    600f4ef787e9497e34d5e42e82815c8efaec0ba37872246dd66edcefd3a02dad8206b0e91f27ac73be9d7e44512c8f10db042fc34012828fd35884f2e4227807

  • C:\Windows\tasksche.exe
    Filesize

    2.0MB

    MD5

    d7421e05d407fc58d2b5524c8ca6d566

    SHA1

    ef787a0c924ce046e5b0e0ae918b8f7c9afcf76f

    SHA256

    1f834385decc777c41a193e77be01215495bccd0c9ce4f6c08f9a60824021da3

    SHA512

    84a78f6826c50bb1357d1fdfe2cf09a8c8772404d0483c21572313f5bd3c16466c038667231ee2fc21ae19bb31651249d0e073a4e87eb64b026dd033e1f6c158

  • memory/1752-62-0x0000000000000000-mapping.dmp
  • memory/1888-54-0x0000000000000000-mapping.dmp
  • memory/1888-55-0x00000000755B1000-0x00000000755B3000-memory.dmp
    Filesize

    8KB

  • memory/2032-56-0x0000000000000000-mapping.dmp