Analysis
-
max time kernel
57s -
max time network
53s -
platform
windows7_x64 -
resource
win7-20220414-en -
submitted
07-07-2022 21:57
Static task
static1
Behavioral task
behavioral1
Sample
43bc632541b8b3c8d71d0211e969072173dfbf44d6d3f8e149b89742a0e61952.dll
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
43bc632541b8b3c8d71d0211e969072173dfbf44d6d3f8e149b89742a0e61952.dll
Resource
win10v2004-20220414-en
General
-
Target
43bc632541b8b3c8d71d0211e969072173dfbf44d6d3f8e149b89742a0e61952.dll
-
Size
5.0MB
-
MD5
65047d9e2f90ed75a133096d982c44b5
-
SHA1
51fa0dd51eb722be4c07daf5c4879a92552b88c5
-
SHA256
43bc632541b8b3c8d71d0211e969072173dfbf44d6d3f8e149b89742a0e61952
-
SHA512
b033bc9c3b28bb738bd80f01888998503b277ab8ff6cb058da5c0ca9ed581b4b83a68280b4622699c806af41801e71e3b9301896209eda01d829c2ad53d57d9f
Malware Config
Signatures
-
Wannacry
WannaCry is a ransomware cryptoworm.
-
suricata: ET MALWARE Known Sinkhole Response Kryptos Logic
suricata: ET MALWARE Known Sinkhole Response Kryptos Logic
-
suricata: ET MALWARE W32/WannaCry.Ransomware Killswitch Domain HTTP Request 1
suricata: ET MALWARE W32/WannaCry.Ransomware Killswitch Domain HTTP Request 1
-
Executes dropped EXE 3 IoCs
Processes:
mssecsvc.exemssecsvc.exetasksche.exepid process 1180 mssecsvc.exe 1772 mssecsvc.exe 1820 tasksche.exe -
Drops file in System32 directory 1 IoCs
Processes:
mssecsvc.exedescription ioc process File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\Temporary Internet Files\counters.dat mssecsvc.exe -
Drops file in Windows directory 2 IoCs
Processes:
rundll32.exemssecsvc.exedescription ioc process File created C:\WINDOWS\mssecsvc.exe rundll32.exe File created C:\WINDOWS\tasksche.exe mssecsvc.exe -
Modifies data under HKEY_USERS 24 IoCs
Processes:
mssecsvc.exedescription ioc process Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad mssecsvc.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\DefaultConnectionSettings = 4600000003000000090000000000000000000000000000000400000000000000000000000000000000000000000000000000000001000000020000000a7f009d000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 mssecsvc.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\46-b2-4c-05-48-fb mssecsvc.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{8D91D596-DE99-47D5-B728-EF2B098C1211}\46-b2-4c-05-48-fb mssecsvc.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings mssecsvc.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ProxyEnable = "0" mssecsvc.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ mssecsvc.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Content\CachePrefix mssecsvc.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\46-b2-4c-05-48-fb\WpadDecision = "0" mssecsvc.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\History\CachePrefix = "Visited:" mssecsvc.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{8D91D596-DE99-47D5-B728-EF2B098C1211} mssecsvc.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{8D91D596-DE99-47D5-B728-EF2B098C1211}\WpadDecisionTime = 10d621506392d801 mssecsvc.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{8D91D596-DE99-47D5-B728-EF2B098C1211}\WpadDecision = "0" mssecsvc.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\DefaultConnectionSettings = 4600000002000000090000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 mssecsvc.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\SavedLegacySettings = 4600000002000000090000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 mssecsvc.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\AutoDetect = "1" mssecsvc.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{8D91D596-DE99-47D5-B728-EF2B098C1211}\WpadDecisionReason = "1" mssecsvc.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{8D91D596-DE99-47D5-B728-EF2B098C1211}\WpadNetworkName = "Network 3" mssecsvc.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\46-b2-4c-05-48-fb\WpadDecisionReason = "1" mssecsvc.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\46-b2-4c-05-48-fb\WpadDecisionTime = 10d621506392d801 mssecsvc.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections mssecsvc.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings mssecsvc.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\UNCAsIntranet = "0" mssecsvc.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Cookies\CachePrefix = "Cookie:" mssecsvc.exe -
Suspicious use of WriteProcessMemory 11 IoCs
Processes:
rundll32.exerundll32.exedescription pid process target process PID 888 wrote to memory of 880 888 rundll32.exe rundll32.exe PID 888 wrote to memory of 880 888 rundll32.exe rundll32.exe PID 888 wrote to memory of 880 888 rundll32.exe rundll32.exe PID 888 wrote to memory of 880 888 rundll32.exe rundll32.exe PID 888 wrote to memory of 880 888 rundll32.exe rundll32.exe PID 888 wrote to memory of 880 888 rundll32.exe rundll32.exe PID 888 wrote to memory of 880 888 rundll32.exe rundll32.exe PID 880 wrote to memory of 1180 880 rundll32.exe mssecsvc.exe PID 880 wrote to memory of 1180 880 rundll32.exe mssecsvc.exe PID 880 wrote to memory of 1180 880 rundll32.exe mssecsvc.exe PID 880 wrote to memory of 1180 880 rundll32.exe mssecsvc.exe
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\43bc632541b8b3c8d71d0211e969072173dfbf44d6d3f8e149b89742a0e61952.dll,#11⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\43bc632541b8b3c8d71d0211e969072173dfbf44d6d3f8e149b89742a0e61952.dll,#12⤵
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
-
C:\WINDOWS\mssecsvc.exeC:\WINDOWS\mssecsvc.exe3⤵
- Executes dropped EXE
- Drops file in Windows directory
-
C:\WINDOWS\tasksche.exeC:\WINDOWS\tasksche.exe /i4⤵
- Executes dropped EXE
-
C:\WINDOWS\mssecsvc.exeC:\WINDOWS\mssecsvc.exe -m security1⤵
- Executes dropped EXE
- Drops file in System32 directory
- Modifies data under HKEY_USERS
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Windows\mssecsvc.exeFilesize
3.6MB
MD5ca6d77065035c6ee7aa8d2eb34ca35a2
SHA1a69dedc475948bb39db22bfbcf5c8a3cd49ce3eb
SHA25617f19aff17388788f96f0ae974617e039e34ac8b0afaf285c6c10bf4e0b6aa22
SHA51216f3185b4f6328ff313c1f88b52e0807fe13d27b0e40ceae10ca4c3e0b6e4fe988c88abac784a8a959853431664e0c995fa1a9e22411032fe7727c7001799b41
-
C:\Windows\mssecsvc.exeFilesize
3.6MB
MD5ca6d77065035c6ee7aa8d2eb34ca35a2
SHA1a69dedc475948bb39db22bfbcf5c8a3cd49ce3eb
SHA25617f19aff17388788f96f0ae974617e039e34ac8b0afaf285c6c10bf4e0b6aa22
SHA51216f3185b4f6328ff313c1f88b52e0807fe13d27b0e40ceae10ca4c3e0b6e4fe988c88abac784a8a959853431664e0c995fa1a9e22411032fe7727c7001799b41
-
C:\Windows\tasksche.exeFilesize
3.4MB
MD57fd7470ed9e7ea088461057519eb9be1
SHA12f6a64d7d5b86eb23b7dc76fcf4919c1992dfb9f
SHA2568c64e3c0db08c83c9456d10e867fb054df0c15070b30039dae2ac51679c4b45f
SHA512994669dfa46d17bad945dbe7804046393bedf0881f0ce34851a7f90927b04b82ddddf0521f8ff9672c5e76d83d0f2947df1e272e5175210211e63e1e41b6b5d7
-
memory/880-54-0x0000000000000000-mapping.dmp
-
memory/880-55-0x00000000750C1000-0x00000000750C3000-memory.dmpFilesize
8KB
-
memory/1180-56-0x0000000000000000-mapping.dmp