Analysis

  • max time kernel
    57s
  • max time network
    53s
  • platform
    windows7_x64
  • resource
    win7-20220414-en
  • submitted
    07-07-2022 21:57

General

  • Target

    43bc632541b8b3c8d71d0211e969072173dfbf44d6d3f8e149b89742a0e61952.dll

  • Size

    5.0MB

  • MD5

    65047d9e2f90ed75a133096d982c44b5

  • SHA1

    51fa0dd51eb722be4c07daf5c4879a92552b88c5

  • SHA256

    43bc632541b8b3c8d71d0211e969072173dfbf44d6d3f8e149b89742a0e61952

  • SHA512

    b033bc9c3b28bb738bd80f01888998503b277ab8ff6cb058da5c0ca9ed581b4b83a68280b4622699c806af41801e71e3b9301896209eda01d829c2ad53d57d9f

Malware Config

Signatures

  • Wannacry

    WannaCry is a ransomware cryptoworm.

  • suricata: ET MALWARE Known Sinkhole Response Kryptos Logic

    suricata: ET MALWARE Known Sinkhole Response Kryptos Logic

  • suricata: ET MALWARE W32/WannaCry.Ransomware Killswitch Domain HTTP Request 1

    suricata: ET MALWARE W32/WannaCry.Ransomware Killswitch Domain HTTP Request 1

  • Executes dropped EXE 3 IoCs
  • Drops file in System32 directory 1 IoCs
  • Drops file in Windows directory 2 IoCs
  • Modifies data under HKEY_USERS 24 IoCs
  • Suspicious use of WriteProcessMemory 11 IoCs

Processes

  • C:\Windows\system32\rundll32.exe
    rundll32.exe C:\Users\Admin\AppData\Local\Temp\43bc632541b8b3c8d71d0211e969072173dfbf44d6d3f8e149b89742a0e61952.dll,#1
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:888
    • C:\Windows\SysWOW64\rundll32.exe
      rundll32.exe C:\Users\Admin\AppData\Local\Temp\43bc632541b8b3c8d71d0211e969072173dfbf44d6d3f8e149b89742a0e61952.dll,#1
      2⤵
      • Drops file in Windows directory
      • Suspicious use of WriteProcessMemory
      PID:880
      • C:\WINDOWS\mssecsvc.exe
        C:\WINDOWS\mssecsvc.exe
        3⤵
        • Executes dropped EXE
        • Drops file in Windows directory
        PID:1180
        • C:\WINDOWS\tasksche.exe
          C:\WINDOWS\tasksche.exe /i
          4⤵
          • Executes dropped EXE
          PID:1820
  • C:\WINDOWS\mssecsvc.exe
    C:\WINDOWS\mssecsvc.exe -m security
    1⤵
    • Executes dropped EXE
    • Drops file in System32 directory
    • Modifies data under HKEY_USERS
    PID:1772

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Windows\mssecsvc.exe
    Filesize

    3.6MB

    MD5

    ca6d77065035c6ee7aa8d2eb34ca35a2

    SHA1

    a69dedc475948bb39db22bfbcf5c8a3cd49ce3eb

    SHA256

    17f19aff17388788f96f0ae974617e039e34ac8b0afaf285c6c10bf4e0b6aa22

    SHA512

    16f3185b4f6328ff313c1f88b52e0807fe13d27b0e40ceae10ca4c3e0b6e4fe988c88abac784a8a959853431664e0c995fa1a9e22411032fe7727c7001799b41

  • C:\Windows\mssecsvc.exe
    Filesize

    3.6MB

    MD5

    ca6d77065035c6ee7aa8d2eb34ca35a2

    SHA1

    a69dedc475948bb39db22bfbcf5c8a3cd49ce3eb

    SHA256

    17f19aff17388788f96f0ae974617e039e34ac8b0afaf285c6c10bf4e0b6aa22

    SHA512

    16f3185b4f6328ff313c1f88b52e0807fe13d27b0e40ceae10ca4c3e0b6e4fe988c88abac784a8a959853431664e0c995fa1a9e22411032fe7727c7001799b41

  • C:\Windows\tasksche.exe
    Filesize

    3.4MB

    MD5

    7fd7470ed9e7ea088461057519eb9be1

    SHA1

    2f6a64d7d5b86eb23b7dc76fcf4919c1992dfb9f

    SHA256

    8c64e3c0db08c83c9456d10e867fb054df0c15070b30039dae2ac51679c4b45f

    SHA512

    994669dfa46d17bad945dbe7804046393bedf0881f0ce34851a7f90927b04b82ddddf0521f8ff9672c5e76d83d0f2947df1e272e5175210211e63e1e41b6b5d7

  • memory/880-54-0x0000000000000000-mapping.dmp
  • memory/880-55-0x00000000750C1000-0x00000000750C3000-memory.dmp
    Filesize

    8KB

  • memory/1180-56-0x0000000000000000-mapping.dmp