Analysis
-
max time kernel
152s -
max time network
155s -
platform
windows10-2004_x64 -
resource
win10v2004-20220718-en -
resource tags
arch:x64arch:x86image:win10v2004-20220718-enlocale:en-usos:windows10-2004-x64system -
submitted
20-07-2022 00:15
Static task
static1
Behavioral task
behavioral1
Sample
ad84accbc8a5107e950afac47e171157.dll
Resource
win7-20220718-en
Behavioral task
behavioral2
Sample
ad84accbc8a5107e950afac47e171157.dll
Resource
win10v2004-20220718-en
General
-
Target
ad84accbc8a5107e950afac47e171157.dll
-
Size
5.0MB
-
MD5
ad84accbc8a5107e950afac47e171157
-
SHA1
e8f49ebc884bdab46ae1984145a1f680efd2c4e2
-
SHA256
36dc0aae52946e3f9530c53925301bb8dbfa8216291705d99ef913d55f6ec1c9
-
SHA512
88f0edb164c7164a8b5377b4e079ab4adc49d00a8b1f9a1424a5a0838ee4dc23ca37b9e72b4cae801d3b7663229274bfeb93d95d5118869b2fbcef72fe257482
Malware Config
Signatures
-
Wannacry
WannaCry is a ransomware cryptoworm.
-
Contacts a large (3060) amount of remote hosts 1 TTPs
This may indicate a network scan to discover remotely running services.
-
Executes dropped EXE 3 IoCs
Processes:
mssecsvc.exemssecsvc.exetasksche.exepid process 1864 mssecsvc.exe 3392 mssecsvc.exe 4568 tasksche.exe -
Creates a large amount of network flows 1 TTPs
This may indicate a network scan to discover remotely running services.
-
Drops file in Windows directory 2 IoCs
Processes:
rundll32.exemssecsvc.exedescription ioc process File created C:\WINDOWS\mssecsvc.exe rundll32.exe File created C:\WINDOWS\tasksche.exe mssecsvc.exe -
Modifies data under HKEY_USERS 5 IoCs
Processes:
mssecsvc.exedescription ioc process Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ mssecsvc.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ProxyBypass = "1" mssecsvc.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\IntranetName = "1" mssecsvc.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\UNCAsIntranet = "1" mssecsvc.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\AutoDetect = "0" mssecsvc.exe -
Suspicious use of WriteProcessMemory 6 IoCs
Processes:
rundll32.exerundll32.exedescription pid process target process PID 3060 wrote to memory of 1732 3060 rundll32.exe rundll32.exe PID 3060 wrote to memory of 1732 3060 rundll32.exe rundll32.exe PID 3060 wrote to memory of 1732 3060 rundll32.exe rundll32.exe PID 1732 wrote to memory of 1864 1732 rundll32.exe mssecsvc.exe PID 1732 wrote to memory of 1864 1732 rundll32.exe mssecsvc.exe PID 1732 wrote to memory of 1864 1732 rundll32.exe mssecsvc.exe
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\ad84accbc8a5107e950afac47e171157.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:3060 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\ad84accbc8a5107e950afac47e171157.dll,#12⤵
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:1732 -
C:\WINDOWS\mssecsvc.exeC:\WINDOWS\mssecsvc.exe3⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:1864 -
C:\WINDOWS\tasksche.exeC:\WINDOWS\tasksche.exe /i4⤵
- Executes dropped EXE
PID:4568
-
C:\WINDOWS\mssecsvc.exeC:\WINDOWS\mssecsvc.exe -m security1⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
PID:3392
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\WINDOWS\mssecsvc.exeFilesize
3.6MB
MD5e26d6e03d069f978ed0f0496b29f20ec
SHA108af161b24769aa76cfdf47d5b1ff450a00da34a
SHA256c229bc5acb17f06a2e7fa20f2843d47266e29b41333ea6e2fbcadec414eec6e8
SHA51231cf304e8306856842b91df5c4ee4865262b0067db58e1fadf04dd08f48dd9a32d6c358a371011cb9a1db13c4e3ca96316acc893b73450bf183ba753843be03c
-
C:\Windows\mssecsvc.exeFilesize
3.6MB
MD5e26d6e03d069f978ed0f0496b29f20ec
SHA108af161b24769aa76cfdf47d5b1ff450a00da34a
SHA256c229bc5acb17f06a2e7fa20f2843d47266e29b41333ea6e2fbcadec414eec6e8
SHA51231cf304e8306856842b91df5c4ee4865262b0067db58e1fadf04dd08f48dd9a32d6c358a371011cb9a1db13c4e3ca96316acc893b73450bf183ba753843be03c
-
C:\Windows\mssecsvc.exeFilesize
3.6MB
MD5e26d6e03d069f978ed0f0496b29f20ec
SHA108af161b24769aa76cfdf47d5b1ff450a00da34a
SHA256c229bc5acb17f06a2e7fa20f2843d47266e29b41333ea6e2fbcadec414eec6e8
SHA51231cf304e8306856842b91df5c4ee4865262b0067db58e1fadf04dd08f48dd9a32d6c358a371011cb9a1db13c4e3ca96316acc893b73450bf183ba753843be03c
-
C:\Windows\tasksche.exeFilesize
3.4MB
MD54092e892c5561b86a96dbcdad7f5b7e9
SHA131c342e36ee94801e7437fc23accbf08a2812297
SHA256a055ef139ccc99822e7b331218319cb205801d21b20484c1e7d200b6df40c2ef
SHA512e8d5ffbdd445e1aab3df3cfb75c96cc7929e3780e2406a403d871c89a75ffe85325e3ce853d23e881638234c75e25a3d8c5761caa8b41aa869121f7af914af5f
-
memory/1732-130-0x0000000000000000-mapping.dmp
-
memory/1864-131-0x0000000000000000-mapping.dmp