Analysis
-
max time kernel
151s -
max time network
154s -
platform
windows10-2004_x64 -
resource
win10v2004-20220414-en -
resource tags
arch:x64arch:x86image:win10v2004-20220414-enlocale:en-usos:windows10-2004-x64system -
submitted
20-07-2022 01:43
Static task
static1
Behavioral task
behavioral1
Sample
578faa50a3077ece4cdee7cffa2ab0ce.dll
Resource
win7-20220718-en
Behavioral task
behavioral2
Sample
578faa50a3077ece4cdee7cffa2ab0ce.dll
Resource
win10v2004-20220414-en
General
-
Target
578faa50a3077ece4cdee7cffa2ab0ce.dll
-
Size
5.0MB
-
MD5
578faa50a3077ece4cdee7cffa2ab0ce
-
SHA1
7aee2447567695ea6e557910e196e691137ecc06
-
SHA256
d40f08d685dd1eb56588e26f957f1f8a9edca5108ec544b49cdb0f2a7ef63088
-
SHA512
dc2b246a17282430347a1dd6aaeeb2848c199918860735121d2aaf2ef605fd07a49431fd360bbda452bf2036feb67059c3e15118f38f08fe5d2e5a9dbff21b5e
Malware Config
Signatures
-
Wannacry
WannaCry is a ransomware cryptoworm.
-
Contacts a large (3182) amount of remote hosts 1 TTPs
This may indicate a network scan to discover remotely running services.
-
Executes dropped EXE 3 IoCs
Processes:
mssecsvc.exemssecsvc.exetasksche.exepid process 4728 mssecsvc.exe 1724 mssecsvc.exe 4740 tasksche.exe -
Creates a large amount of network flows 1 TTPs
This may indicate a network scan to discover remotely running services.
-
Drops file in Windows directory 2 IoCs
Processes:
rundll32.exemssecsvc.exedescription ioc process File created C:\WINDOWS\mssecsvc.exe rundll32.exe File created C:\WINDOWS\tasksche.exe mssecsvc.exe -
Modifies data under HKEY_USERS 5 IoCs
Processes:
mssecsvc.exedescription ioc process Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ProxyBypass = "1" mssecsvc.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\IntranetName = "1" mssecsvc.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\UNCAsIntranet = "1" mssecsvc.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\AutoDetect = "0" mssecsvc.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ mssecsvc.exe -
Suspicious use of WriteProcessMemory 6 IoCs
Processes:
rundll32.exerundll32.exedescription pid process target process PID 4176 wrote to memory of 5100 4176 rundll32.exe rundll32.exe PID 4176 wrote to memory of 5100 4176 rundll32.exe rundll32.exe PID 4176 wrote to memory of 5100 4176 rundll32.exe rundll32.exe PID 5100 wrote to memory of 4728 5100 rundll32.exe mssecsvc.exe PID 5100 wrote to memory of 4728 5100 rundll32.exe mssecsvc.exe PID 5100 wrote to memory of 4728 5100 rundll32.exe mssecsvc.exe
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\578faa50a3077ece4cdee7cffa2ab0ce.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:4176 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\578faa50a3077ece4cdee7cffa2ab0ce.dll,#12⤵
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:5100 -
C:\WINDOWS\mssecsvc.exeC:\WINDOWS\mssecsvc.exe3⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:4728 -
C:\WINDOWS\tasksche.exeC:\WINDOWS\tasksche.exe /i4⤵
- Executes dropped EXE
PID:4740
-
C:\WINDOWS\mssecsvc.exeC:\WINDOWS\mssecsvc.exe -m security1⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
PID:1724
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3.6MB
MD5aa6dceaa71386d5c7594856429223c8d
SHA16dba170ec0004fb6951f4260059f5b038bce77f2
SHA25690068ef120ee87d69f75fb29e2440d42cae87428b790ef50510952487c926b1f
SHA512c6cf4d6947d252f24682255ec01a2acf2d3226eb00c07ef98c9856314d2ed939e80a4548b2cba169de4f6b74e7ee45b3bcf16ea98e65c95175cf76065d4e4064
-
Filesize
3.6MB
MD5aa6dceaa71386d5c7594856429223c8d
SHA16dba170ec0004fb6951f4260059f5b038bce77f2
SHA25690068ef120ee87d69f75fb29e2440d42cae87428b790ef50510952487c926b1f
SHA512c6cf4d6947d252f24682255ec01a2acf2d3226eb00c07ef98c9856314d2ed939e80a4548b2cba169de4f6b74e7ee45b3bcf16ea98e65c95175cf76065d4e4064
-
Filesize
3.6MB
MD5aa6dceaa71386d5c7594856429223c8d
SHA16dba170ec0004fb6951f4260059f5b038bce77f2
SHA25690068ef120ee87d69f75fb29e2440d42cae87428b790ef50510952487c926b1f
SHA512c6cf4d6947d252f24682255ec01a2acf2d3226eb00c07ef98c9856314d2ed939e80a4548b2cba169de4f6b74e7ee45b3bcf16ea98e65c95175cf76065d4e4064
-
Filesize
3.4MB
MD56a7a4f797977e9246f8a448c842eee34
SHA1f82dd7f17ba1a5163eb49b90be53c35bc7249308
SHA2568e3f98bd9a2e58120986ad4d692ece036d7cadf4c171cdd9f469990cf9d62cf5
SHA51272ccd69a8e0dae286f9a84a9c8aeba2e5cc05710a08234e2c4ead82e8cf6150dcdb5ab34729b806a91010ae5d4eea0c43e4ed70771430b60e5e55ec3c6796709