Analysis

  • max time kernel
    151s
  • max time network
    153s
  • platform
    windows7_x64
  • resource
    win7-20220718-en
  • resource tags

    arch:x64arch:x86image:win7-20220718-enlocale:en-usos:windows7-x64system
  • submitted
    19-07-2022 23:44

General

  • Target

    cd59384c604a5f9e447adc1e97e95291.dll

  • Size

    5.0MB

  • MD5

    cd59384c604a5f9e447adc1e97e95291

  • SHA1

    098bfc9ba19f826f33c16697a0af3a8d805e922a

  • SHA256

    7d0e5ba752f278eade0152fc94f590d565f3f96737620f4084534de58d4f8187

  • SHA512

    72fa297ac5b4616edf42349c564cff26cac5efddfdd0a9daa96c2aa70779247e43cccee1797d7856d09a4a8c356868587bc7496fa854d8bb615b2d4ecab4f342

Malware Config

Signatures

  • Wannacry

    WannaCry is a ransomware cryptoworm.

  • Contacts a large (1254) amount of remote hosts 1 TTPs

    This may indicate a network scan to discover remotely running services.

  • Executes dropped EXE 3 IoCs
  • Drops file in System32 directory 1 IoCs
  • Drops file in Windows directory 2 IoCs
  • Modifies data under HKEY_USERS 24 IoCs
  • Suspicious use of WriteProcessMemory 15 IoCs

Processes

  • C:\Windows\system32\rundll32.exe
    rundll32.exe C:\Users\Admin\AppData\Local\Temp\cd59384c604a5f9e447adc1e97e95291.dll,#1
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:892
    • C:\Windows\SysWOW64\rundll32.exe
      rundll32.exe C:\Users\Admin\AppData\Local\Temp\cd59384c604a5f9e447adc1e97e95291.dll,#1
      2⤵
      • Drops file in Windows directory
      • Suspicious use of WriteProcessMemory
      PID:880
      • C:\WINDOWS\mssecsvc.exe
        C:\WINDOWS\mssecsvc.exe
        3⤵
        • Executes dropped EXE
        • Drops file in Windows directory
        • Suspicious use of WriteProcessMemory
        PID:1928
        • C:\WINDOWS\tasksche.exe
          C:\WINDOWS\tasksche.exe /i
          4⤵
          • Executes dropped EXE
          PID:1920
  • C:\WINDOWS\mssecsvc.exe
    C:\WINDOWS\mssecsvc.exe -m security
    1⤵
    • Executes dropped EXE
    • Drops file in System32 directory
    • Modifies data under HKEY_USERS
    PID:1208

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\WINDOWS\mssecsvc.exe
    Filesize

    3.6MB

    MD5

    747ff3b923618f9c579309bc33fe9f64

    SHA1

    8a44b79f0042393ffc568ba16968e02f8b20d5cd

    SHA256

    4651c4359c600dc9fbd92e744352a63bbe7e345db8d05857879b925dbb13c679

    SHA512

    5a4495b2b925872c24dd1daeb87b0fabfaf229cc3b4fade9db76ca92c4ca743f6263b6b00e50986add57440b6e05ff5f230fc9c041b86a9353dff715250bc525

  • C:\Windows\mssecsvc.exe
    Filesize

    3.6MB

    MD5

    747ff3b923618f9c579309bc33fe9f64

    SHA1

    8a44b79f0042393ffc568ba16968e02f8b20d5cd

    SHA256

    4651c4359c600dc9fbd92e744352a63bbe7e345db8d05857879b925dbb13c679

    SHA512

    5a4495b2b925872c24dd1daeb87b0fabfaf229cc3b4fade9db76ca92c4ca743f6263b6b00e50986add57440b6e05ff5f230fc9c041b86a9353dff715250bc525

  • C:\Windows\mssecsvc.exe
    Filesize

    3.6MB

    MD5

    747ff3b923618f9c579309bc33fe9f64

    SHA1

    8a44b79f0042393ffc568ba16968e02f8b20d5cd

    SHA256

    4651c4359c600dc9fbd92e744352a63bbe7e345db8d05857879b925dbb13c679

    SHA512

    5a4495b2b925872c24dd1daeb87b0fabfaf229cc3b4fade9db76ca92c4ca743f6263b6b00e50986add57440b6e05ff5f230fc9c041b86a9353dff715250bc525

  • C:\Windows\tasksche.exe
    Filesize

    3.4MB

    MD5

    c8e7ed224160ab24e4232f5e6fd8bc08

    SHA1

    8bcbe1b427c7c65810d25d5e1bd6788073ab037d

    SHA256

    7176e96fab482a3569ae24b2dbdb81720cfc354199923294aafca76d7be28c8b

    SHA512

    dd063fc9a0ba9b0743eea55f6f040ed350598e0adb3545054727b52ddac6aef02f6dd5fbc395520a0d21da18b85a6b69d353bcb1fe3413f1f67ec18e26d89cb8

  • memory/880-54-0x0000000000000000-mapping.dmp
  • memory/880-55-0x0000000075831000-0x0000000075833000-memory.dmp
    Filesize

    8KB

  • memory/1920-62-0x0000000000000000-mapping.dmp
  • memory/1928-56-0x0000000000000000-mapping.dmp