Analysis
-
max time kernel
172s -
max time network
193s -
platform
windows10-2004_x64 -
resource
win10v2004-20220414-en -
submitted
07-07-2022 21:57
Static task
static1
Behavioral task
behavioral1
Sample
43bc632541b8b3c8d71d0211e969072173dfbf44d6d3f8e149b89742a0e61952.dll
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
43bc632541b8b3c8d71d0211e969072173dfbf44d6d3f8e149b89742a0e61952.dll
Resource
win10v2004-20220414-en
General
-
Target
43bc632541b8b3c8d71d0211e969072173dfbf44d6d3f8e149b89742a0e61952.dll
-
Size
5.0MB
-
MD5
65047d9e2f90ed75a133096d982c44b5
-
SHA1
51fa0dd51eb722be4c07daf5c4879a92552b88c5
-
SHA256
43bc632541b8b3c8d71d0211e969072173dfbf44d6d3f8e149b89742a0e61952
-
SHA512
b033bc9c3b28bb738bd80f01888998503b277ab8ff6cb058da5c0ca9ed581b4b83a68280b4622699c806af41801e71e3b9301896209eda01d829c2ad53d57d9f
Malware Config
Signatures
-
Wannacry
WannaCry is a ransomware cryptoworm.
-
suricata: ET MALWARE Known Sinkhole Response Kryptos Logic
suricata: ET MALWARE Known Sinkhole Response Kryptos Logic
-
suricata: ET MALWARE W32/WannaCry.Ransomware Killswitch Domain HTTP Request 1
suricata: ET MALWARE W32/WannaCry.Ransomware Killswitch Domain HTTP Request 1
-
Contacts a large (2335) amount of remote hosts 1 TTPs
This may indicate a network scan to discover remotely running services.
-
Executes dropped EXE 3 IoCs
Processes:
mssecsvc.exemssecsvc.exetasksche.exepid process 1048 mssecsvc.exe 4196 mssecsvc.exe 4604 tasksche.exe -
Drops file in Windows directory 2 IoCs
Processes:
rundll32.exemssecsvc.exedescription ioc process File created C:\WINDOWS\mssecsvc.exe rundll32.exe File created C:\WINDOWS\tasksche.exe mssecsvc.exe -
Modifies data under HKEY_USERS 5 IoCs
Processes:
mssecsvc.exedescription ioc process Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ProxyBypass = "1" mssecsvc.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\IntranetName = "1" mssecsvc.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\UNCAsIntranet = "1" mssecsvc.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\AutoDetect = "0" mssecsvc.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ mssecsvc.exe -
Suspicious use of WriteProcessMemory 6 IoCs
Processes:
rundll32.exerundll32.exedescription pid process target process PID 3704 wrote to memory of 2364 3704 rundll32.exe rundll32.exe PID 3704 wrote to memory of 2364 3704 rundll32.exe rundll32.exe PID 3704 wrote to memory of 2364 3704 rundll32.exe rundll32.exe PID 2364 wrote to memory of 1048 2364 rundll32.exe mssecsvc.exe PID 2364 wrote to memory of 1048 2364 rundll32.exe mssecsvc.exe PID 2364 wrote to memory of 1048 2364 rundll32.exe mssecsvc.exe
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\43bc632541b8b3c8d71d0211e969072173dfbf44d6d3f8e149b89742a0e61952.dll,#11⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\43bc632541b8b3c8d71d0211e969072173dfbf44d6d3f8e149b89742a0e61952.dll,#12⤵
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
-
C:\WINDOWS\mssecsvc.exeC:\WINDOWS\mssecsvc.exe3⤵
- Executes dropped EXE
- Drops file in Windows directory
-
C:\WINDOWS\tasksche.exeC:\WINDOWS\tasksche.exe /i4⤵
- Executes dropped EXE
-
C:\WINDOWS\mssecsvc.exeC:\WINDOWS\mssecsvc.exe -m security1⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\WINDOWS\mssecsvc.exeFilesize
3.6MB
MD5ca6d77065035c6ee7aa8d2eb34ca35a2
SHA1a69dedc475948bb39db22bfbcf5c8a3cd49ce3eb
SHA25617f19aff17388788f96f0ae974617e039e34ac8b0afaf285c6c10bf4e0b6aa22
SHA51216f3185b4f6328ff313c1f88b52e0807fe13d27b0e40ceae10ca4c3e0b6e4fe988c88abac784a8a959853431664e0c995fa1a9e22411032fe7727c7001799b41
-
C:\Windows\mssecsvc.exeFilesize
3.6MB
MD5ca6d77065035c6ee7aa8d2eb34ca35a2
SHA1a69dedc475948bb39db22bfbcf5c8a3cd49ce3eb
SHA25617f19aff17388788f96f0ae974617e039e34ac8b0afaf285c6c10bf4e0b6aa22
SHA51216f3185b4f6328ff313c1f88b52e0807fe13d27b0e40ceae10ca4c3e0b6e4fe988c88abac784a8a959853431664e0c995fa1a9e22411032fe7727c7001799b41
-
C:\Windows\mssecsvc.exeFilesize
3.6MB
MD5ca6d77065035c6ee7aa8d2eb34ca35a2
SHA1a69dedc475948bb39db22bfbcf5c8a3cd49ce3eb
SHA25617f19aff17388788f96f0ae974617e039e34ac8b0afaf285c6c10bf4e0b6aa22
SHA51216f3185b4f6328ff313c1f88b52e0807fe13d27b0e40ceae10ca4c3e0b6e4fe988c88abac784a8a959853431664e0c995fa1a9e22411032fe7727c7001799b41
-
C:\Windows\tasksche.exeFilesize
3.4MB
MD57fd7470ed9e7ea088461057519eb9be1
SHA12f6a64d7d5b86eb23b7dc76fcf4919c1992dfb9f
SHA2568c64e3c0db08c83c9456d10e867fb054df0c15070b30039dae2ac51679c4b45f
SHA512994669dfa46d17bad945dbe7804046393bedf0881f0ce34851a7f90927b04b82ddddf0521f8ff9672c5e76d83d0f2947df1e272e5175210211e63e1e41b6b5d7
-
memory/1048-131-0x0000000000000000-mapping.dmp
-
memory/2364-130-0x0000000000000000-mapping.dmp