Analysis
-
max time kernel
150s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20220718-en -
resource tags
arch:x64arch:x86image:win10v2004-20220718-enlocale:en-usos:windows10-2004-x64system -
submitted
20-07-2022 01:39
Static task
static1
Behavioral task
behavioral1
Sample
a49f1950d6e7ba759eb5b582fd93615e.dll
Resource
win7-20220715-en
Behavioral task
behavioral2
Sample
a49f1950d6e7ba759eb5b582fd93615e.dll
Resource
win10v2004-20220718-en
General
-
Target
a49f1950d6e7ba759eb5b582fd93615e.dll
-
Size
5.0MB
-
MD5
a49f1950d6e7ba759eb5b582fd93615e
-
SHA1
f2046042d74f5ce2f9c53231d75ff89ac93a39aa
-
SHA256
74f4a8e66cd56e53ca9a343cb189fab9af688f3840a20faa7503f3d37e29f482
-
SHA512
24ffb245dfb168cd7675ab9f24f0a58183e9e2107917f1e82eb1720f69f5ea0e9221a271e7335c918903dd2fe6443cc44874ea9d361660819f42fa9c8f5c1993
Malware Config
Signatures
-
Wannacry
WannaCry is a ransomware cryptoworm.
-
Contacts a large (3288) amount of remote hosts 1 TTPs
This may indicate a network scan to discover remotely running services.
-
Executes dropped EXE 3 IoCs
Processes:
mssecsvc.exemssecsvc.exetasksche.exepid process 1972 mssecsvc.exe 4640 mssecsvc.exe 1640 tasksche.exe -
Creates a large amount of network flows 1 TTPs
This may indicate a network scan to discover remotely running services.
-
Drops file in Windows directory 2 IoCs
Processes:
rundll32.exemssecsvc.exedescription ioc process File created C:\WINDOWS\mssecsvc.exe rundll32.exe File created C:\WINDOWS\tasksche.exe mssecsvc.exe -
Modifies data under HKEY_USERS 5 IoCs
Processes:
mssecsvc.exedescription ioc process Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\IntranetName = "1" mssecsvc.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\UNCAsIntranet = "1" mssecsvc.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\AutoDetect = "0" mssecsvc.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ mssecsvc.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ProxyBypass = "1" mssecsvc.exe -
Suspicious use of WriteProcessMemory 6 IoCs
Processes:
rundll32.exerundll32.exedescription pid process target process PID 1680 wrote to memory of 5032 1680 rundll32.exe rundll32.exe PID 1680 wrote to memory of 5032 1680 rundll32.exe rundll32.exe PID 1680 wrote to memory of 5032 1680 rundll32.exe rundll32.exe PID 5032 wrote to memory of 1972 5032 rundll32.exe mssecsvc.exe PID 5032 wrote to memory of 1972 5032 rundll32.exe mssecsvc.exe PID 5032 wrote to memory of 1972 5032 rundll32.exe mssecsvc.exe
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\a49f1950d6e7ba759eb5b582fd93615e.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1680 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\a49f1950d6e7ba759eb5b582fd93615e.dll,#12⤵
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:5032 -
C:\WINDOWS\mssecsvc.exeC:\WINDOWS\mssecsvc.exe3⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:1972 -
C:\WINDOWS\tasksche.exeC:\WINDOWS\tasksche.exe /i4⤵
- Executes dropped EXE
PID:1640
-
C:\WINDOWS\mssecsvc.exeC:\WINDOWS\mssecsvc.exe -m security1⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
PID:4640
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3.6MB
MD54f2082112f45afcef2d9fd4fa5673e58
SHA15f926f458f621394c1cfce65d72d34a32846dd50
SHA2561a6f8a619fde4602f18002572865b5e8b4afad43c32a49e6d0a409739cdeab79
SHA512a34e897d7200bf90793bb70de0303ea464f22d22eb842040f2cf7e74078502d33067b69a87e82205ab751ed5c2cd4390715c35202c9dba9de76f61187ec1acf7
-
Filesize
3.6MB
MD54f2082112f45afcef2d9fd4fa5673e58
SHA15f926f458f621394c1cfce65d72d34a32846dd50
SHA2561a6f8a619fde4602f18002572865b5e8b4afad43c32a49e6d0a409739cdeab79
SHA512a34e897d7200bf90793bb70de0303ea464f22d22eb842040f2cf7e74078502d33067b69a87e82205ab751ed5c2cd4390715c35202c9dba9de76f61187ec1acf7
-
Filesize
3.6MB
MD54f2082112f45afcef2d9fd4fa5673e58
SHA15f926f458f621394c1cfce65d72d34a32846dd50
SHA2561a6f8a619fde4602f18002572865b5e8b4afad43c32a49e6d0a409739cdeab79
SHA512a34e897d7200bf90793bb70de0303ea464f22d22eb842040f2cf7e74078502d33067b69a87e82205ab751ed5c2cd4390715c35202c9dba9de76f61187ec1acf7
-
Filesize
3.4MB
MD5a35f182e6d53b2961fee59261746f726
SHA151cd13eff08eca6a84e43717a7b09eff658cc437
SHA256ca61efd76013c26beb9c1c51ecb105f990199709a3709a0413620f924b1c1aaf
SHA5129e840a3599d0dc63e16b037b431b0e9aa3649fa1966b75bc9f0c890b89022390b4312f00a194e5b99a9751b883f2e9e6c6896fc57f520ddc7661791be850e060