Analysis

  • max time kernel
    151s
  • max time network
    153s
  • platform
    windows7_x64
  • resource
    win7-20220718-en
  • resource tags

    arch:x64arch:x86image:win7-20220718-enlocale:en-usos:windows7-x64system
  • submitted
    20-07-2022 00:22

General

  • Target

    9a1768e5531d0852278b95e4d0137977.dll

  • Size

    5.0MB

  • MD5

    9a1768e5531d0852278b95e4d0137977

  • SHA1

    2ca173481b3a44682b197f0c4e409bdf901dd5c9

  • SHA256

    4535103ddced2d2d756b4886c0950c0fe39fca42eb94d1970086337ded31e406

  • SHA512

    ae016884b0b40abd14e667b376c44877fdca7b731f993e7fc3ac72bad61575d123ae88b3865f02cb706b05c9dac840f207f9380340de631fb59ed70e1c2829ce

Malware Config

Signatures

  • Wannacry

    WannaCry is a ransomware cryptoworm.

  • Contacts a large (1163) amount of remote hosts 1 TTPs

    This may indicate a network scan to discover remotely running services.

  • Executes dropped EXE 3 IoCs
  • Drops file in System32 directory 1 IoCs
  • Drops file in Windows directory 4 IoCs
  • Modifies data under HKEY_USERS 24 IoCs
  • Suspicious use of WriteProcessMemory 18 IoCs

Processes

  • C:\Windows\system32\rundll32.exe
    rundll32.exe C:\Users\Admin\AppData\Local\Temp\9a1768e5531d0852278b95e4d0137977.dll,#1
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1988
    • C:\Windows\SysWOW64\rundll32.exe
      rundll32.exe C:\Users\Admin\AppData\Local\Temp\9a1768e5531d0852278b95e4d0137977.dll,#1
      2⤵
      • Drops file in Windows directory
      • Suspicious use of WriteProcessMemory
      PID:2024
      • C:\WINDOWS\mssecsvr.exe
        C:\WINDOWS\mssecsvr.exe
        3⤵
        • Executes dropped EXE
        • Drops file in Windows directory
        • Suspicious use of WriteProcessMemory
        PID:2028
        • C:\WINDOWS\tasksche.exe
          C:\WINDOWS\tasksche.exe /i
          4⤵
          • Executes dropped EXE
          • Drops file in Windows directory
          PID:984
  • C:\WINDOWS\mssecsvr.exe
    C:\WINDOWS\mssecsvr.exe -m security
    1⤵
    • Executes dropped EXE
    • Drops file in System32 directory
    • Modifies data under HKEY_USERS
    PID:1292

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\WINDOWS\mssecsvr.exe
    Filesize

    2.2MB

    MD5

    071fc5dc89181e747fda2d9687719b69

    SHA1

    7844483273dc0db64e69c2063594d81f84a9b5bd

    SHA256

    d280ce9769d1ed1445e1f7dc9e25d194fe29496d0805438889d1fbcfaaa9280c

    SHA512

    ee6dab69db9b30e3e07587f213d54a64faf5b4fdf7f85dd9fbc72f49d6c845785b3a09b3ff0fea1d5edd28cae9522a30270f9d336e5e46ce802e4b89d333267d

  • C:\WINDOWS\tasksche.exe
    Filesize

    2.0MB

    MD5

    78ebac0bca8b8ecdcb7e591f4a72eeb6

    SHA1

    2b5df3a69b4a17debf2ab2b2b64a7655734c66d2

    SHA256

    065bafabd37cb31e9fea599e9f9dd56dddd76b772e02d0561dd8d18b8c83cedc

    SHA512

    ee7c82d50d65f32cb55e04413de3ffc1288c3d1db863a18bf6d5d6e9f5f4f441de34c56b561097ec46089eab16a2a4994e759d43fa24898680ad3496022193ea

  • C:\Windows\mssecsvr.exe
    Filesize

    2.2MB

    MD5

    071fc5dc89181e747fda2d9687719b69

    SHA1

    7844483273dc0db64e69c2063594d81f84a9b5bd

    SHA256

    d280ce9769d1ed1445e1f7dc9e25d194fe29496d0805438889d1fbcfaaa9280c

    SHA512

    ee6dab69db9b30e3e07587f213d54a64faf5b4fdf7f85dd9fbc72f49d6c845785b3a09b3ff0fea1d5edd28cae9522a30270f9d336e5e46ce802e4b89d333267d

  • C:\Windows\mssecsvr.exe
    Filesize

    2.2MB

    MD5

    071fc5dc89181e747fda2d9687719b69

    SHA1

    7844483273dc0db64e69c2063594d81f84a9b5bd

    SHA256

    d280ce9769d1ed1445e1f7dc9e25d194fe29496d0805438889d1fbcfaaa9280c

    SHA512

    ee6dab69db9b30e3e07587f213d54a64faf5b4fdf7f85dd9fbc72f49d6c845785b3a09b3ff0fea1d5edd28cae9522a30270f9d336e5e46ce802e4b89d333267d

  • C:\Windows\tasksche.exe
    Filesize

    2.0MB

    MD5

    78ebac0bca8b8ecdcb7e591f4a72eeb6

    SHA1

    2b5df3a69b4a17debf2ab2b2b64a7655734c66d2

    SHA256

    065bafabd37cb31e9fea599e9f9dd56dddd76b772e02d0561dd8d18b8c83cedc

    SHA512

    ee7c82d50d65f32cb55e04413de3ffc1288c3d1db863a18bf6d5d6e9f5f4f441de34c56b561097ec46089eab16a2a4994e759d43fa24898680ad3496022193ea

  • memory/984-62-0x0000000000000000-mapping.dmp
  • memory/2024-54-0x0000000000000000-mapping.dmp
  • memory/2024-55-0x0000000075731000-0x0000000075733000-memory.dmp
    Filesize

    8KB

  • memory/2028-56-0x0000000000000000-mapping.dmp