Analysis
-
max time kernel
155s -
max time network
159s -
platform
windows7_x64 -
resource
win7-20220718-en -
resource tags
arch:x64arch:x86image:win7-20220718-enlocale:en-usos:windows7-x64system -
submitted
20-07-2022 01:42
Static task
static1
Behavioral task
behavioral1
Sample
c0c6cdd528c438532fe16b19c5302bf5.dll
Resource
win7-20220718-en
Behavioral task
behavioral2
Sample
c0c6cdd528c438532fe16b19c5302bf5.dll
Resource
win10v2004-20220414-en
General
-
Target
c0c6cdd528c438532fe16b19c5302bf5.dll
-
Size
5.0MB
-
MD5
c0c6cdd528c438532fe16b19c5302bf5
-
SHA1
2cda06ec3ed843e1c5778a91b8a2a3c1740f1a0e
-
SHA256
7632930b27dfc20a2bd82a937b3dbf3edd5d8108c14f7fc9d083d5476a4b3fa0
-
SHA512
9f5abda38300187b723ca90e113068f16f0a4b0ee1d0b00de0c6211ee339f2802883284b74f3755f64480e1c71fe01b58fb5e7009c094774fa2577983d67c301
Malware Config
Signatures
-
Wannacry
WannaCry is a ransomware cryptoworm.
-
Contacts a large (1197) amount of remote hosts 1 TTPs
This may indicate a network scan to discover remotely running services.
-
Executes dropped EXE 5 IoCs
Processes:
mssecsvc.exemssecsvcmgr.exemssecsvc.exemssecsvcmgr.exetasksche.exepid process 2028 mssecsvc.exe 904 mssecsvcmgr.exe 1148 mssecsvc.exe 676 mssecsvcmgr.exe 1784 tasksche.exe -
Processes:
resource yara_rule C:\Windows\mssecsvcmgr.exe upx behavioral1/memory/904-61-0x0000000000400000-0x0000000000454000-memory.dmp upx C:\WINDOWS\mssecsvcmgr.exe upx C:\Windows\mssecsvcmgr.exe upx -
Drops file in System32 directory 1 IoCs
Processes:
mssecsvc.exedescription ioc process File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\Temporary Internet Files\counters.dat mssecsvc.exe -
Drops file in Windows directory 4 IoCs
Processes:
rundll32.exemssecsvc.exemssecsvc.exedescription ioc process File created C:\WINDOWS\mssecsvc.exe rundll32.exe File created C:\WINDOWS\mssecsvcmgr.exe mssecsvc.exe File opened for modification C:\WINDOWS\mssecsvcmgr.exe mssecsvc.exe File created C:\WINDOWS\tasksche.exe mssecsvc.exe -
Modifies data under HKEY_USERS 24 IoCs
Processes:
mssecsvc.exedescription ioc process Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ mssecsvc.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{780329E7-A59F-40F9-8B06-5587950E6EE3}\4a-bc-40-ce-d2-8e mssecsvc.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\4a-bc-40-ce-d2-8e\WpadDecisionReason = "1" mssecsvc.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\4a-bc-40-ce-d2-8e mssecsvc.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections mssecsvc.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\AutoDetect = "1" mssecsvc.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Cookies\CachePrefix = "Cookie:" mssecsvc.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\History\CachePrefix = "Visited:" mssecsvc.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\DefaultConnectionSettings = 4600000003000000090000000000000000000000000000000400000000000000000000000000000000000000000000000000000001000000020000000a7f00d1000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 mssecsvc.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{780329E7-A59F-40F9-8B06-5587950E6EE3}\WpadNetworkName = "Network 3" mssecsvc.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings mssecsvc.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings mssecsvc.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\UNCAsIntranet = "0" mssecsvc.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{780329E7-A59F-40F9-8B06-5587950E6EE3}\WpadDecisionReason = "1" mssecsvc.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\4a-bc-40-ce-d2-8e\WpadDecision = "0" mssecsvc.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{780329E7-A59F-40F9-8B06-5587950E6EE3}\WpadDecisionTime = 009a1cbbea9bd801 mssecsvc.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{780329E7-A59F-40F9-8B06-5587950E6EE3}\WpadDecision = "0" mssecsvc.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\DefaultConnectionSettings = 4600000002000000090000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 mssecsvc.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ProxyEnable = "0" mssecsvc.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\SavedLegacySettings = 4600000002000000090000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 mssecsvc.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Content\CachePrefix mssecsvc.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad mssecsvc.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{780329E7-A59F-40F9-8B06-5587950E6EE3} mssecsvc.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\4a-bc-40-ce-d2-8e\WpadDecisionTime = 009a1cbbea9bd801 mssecsvc.exe -
Suspicious use of WriteProcessMemory 19 IoCs
Processes:
rundll32.exerundll32.exemssecsvc.exemssecsvc.exedescription pid process target process PID 1988 wrote to memory of 2024 1988 rundll32.exe rundll32.exe PID 1988 wrote to memory of 2024 1988 rundll32.exe rundll32.exe PID 1988 wrote to memory of 2024 1988 rundll32.exe rundll32.exe PID 1988 wrote to memory of 2024 1988 rundll32.exe rundll32.exe PID 1988 wrote to memory of 2024 1988 rundll32.exe rundll32.exe PID 1988 wrote to memory of 2024 1988 rundll32.exe rundll32.exe PID 1988 wrote to memory of 2024 1988 rundll32.exe rundll32.exe PID 2024 wrote to memory of 2028 2024 rundll32.exe mssecsvc.exe PID 2024 wrote to memory of 2028 2024 rundll32.exe mssecsvc.exe PID 2024 wrote to memory of 2028 2024 rundll32.exe mssecsvc.exe PID 2024 wrote to memory of 2028 2024 rundll32.exe mssecsvc.exe PID 2028 wrote to memory of 904 2028 mssecsvc.exe mssecsvcmgr.exe PID 2028 wrote to memory of 904 2028 mssecsvc.exe mssecsvcmgr.exe PID 2028 wrote to memory of 904 2028 mssecsvc.exe mssecsvcmgr.exe PID 2028 wrote to memory of 904 2028 mssecsvc.exe mssecsvcmgr.exe PID 1148 wrote to memory of 676 1148 mssecsvc.exe mssecsvcmgr.exe PID 1148 wrote to memory of 676 1148 mssecsvc.exe mssecsvcmgr.exe PID 1148 wrote to memory of 676 1148 mssecsvc.exe mssecsvcmgr.exe PID 1148 wrote to memory of 676 1148 mssecsvc.exe mssecsvcmgr.exe
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\c0c6cdd528c438532fe16b19c5302bf5.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1988 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\c0c6cdd528c438532fe16b19c5302bf5.dll,#12⤵
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:2024 -
C:\WINDOWS\mssecsvc.exeC:\WINDOWS\mssecsvc.exe3⤵
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:2028 -
C:\WINDOWS\mssecsvcmgr.exeC:\WINDOWS\mssecsvcmgr.exe4⤵
- Executes dropped EXE
PID:904 -
C:\WINDOWS\tasksche.exeC:\WINDOWS\tasksche.exe /i4⤵
- Executes dropped EXE
PID:1784
-
C:\WINDOWS\mssecsvc.exeC:\WINDOWS\mssecsvc.exe -m security1⤵
- Executes dropped EXE
- Drops file in System32 directory
- Drops file in Windows directory
- Modifies data under HKEY_USERS
- Suspicious use of WriteProcessMemory
PID:1148 -
C:\WINDOWS\mssecsvcmgr.exeC:\WINDOWS\mssecsvcmgr.exe2⤵
- Executes dropped EXE
PID:676
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3.7MB
MD5e8ac4e9a26b8207b69884e4e2f30475d
SHA1a060c2acc1e903e12ed52f96d1b5f7777bf18b28
SHA25652752ecd2284e0565634dec194b9a917341996647d46e25b295139808c180b85
SHA512845ee5ae658f0c4f80dadd70b6fa6d0fc26f8e55eb8110a119c2b428c9db6b6f207ebf49831556bf34a4dd4ca8ff02a72cc6fcf81cd3b726068130b36f8d6d83
-
Filesize
103KB
MD539ba7f790512d1af40cc864189175cb7
SHA1da5f35bed908b1a0d08b7639d76cf2d711789e29
SHA256b7bf5c2afcbb6f664966c7b2cd72ac8cc26f95199ff49a490550858e83a91e75
SHA5120b59b197cf1123bacd7badb5b359ec17c45d99e297893a28b5130a724d6ba12465f361d7872ab3ebc527ae317735c1182d3d71bcd53b4773dbca3cd82ea1d76e
-
Filesize
3.7MB
MD5e8ac4e9a26b8207b69884e4e2f30475d
SHA1a060c2acc1e903e12ed52f96d1b5f7777bf18b28
SHA25652752ecd2284e0565634dec194b9a917341996647d46e25b295139808c180b85
SHA512845ee5ae658f0c4f80dadd70b6fa6d0fc26f8e55eb8110a119c2b428c9db6b6f207ebf49831556bf34a4dd4ca8ff02a72cc6fcf81cd3b726068130b36f8d6d83
-
Filesize
3.7MB
MD5e8ac4e9a26b8207b69884e4e2f30475d
SHA1a060c2acc1e903e12ed52f96d1b5f7777bf18b28
SHA25652752ecd2284e0565634dec194b9a917341996647d46e25b295139808c180b85
SHA512845ee5ae658f0c4f80dadd70b6fa6d0fc26f8e55eb8110a119c2b428c9db6b6f207ebf49831556bf34a4dd4ca8ff02a72cc6fcf81cd3b726068130b36f8d6d83
-
Filesize
103KB
MD539ba7f790512d1af40cc864189175cb7
SHA1da5f35bed908b1a0d08b7639d76cf2d711789e29
SHA256b7bf5c2afcbb6f664966c7b2cd72ac8cc26f95199ff49a490550858e83a91e75
SHA5120b59b197cf1123bacd7badb5b359ec17c45d99e297893a28b5130a724d6ba12465f361d7872ab3ebc527ae317735c1182d3d71bcd53b4773dbca3cd82ea1d76e
-
Filesize
103KB
MD539ba7f790512d1af40cc864189175cb7
SHA1da5f35bed908b1a0d08b7639d76cf2d711789e29
SHA256b7bf5c2afcbb6f664966c7b2cd72ac8cc26f95199ff49a490550858e83a91e75
SHA5120b59b197cf1123bacd7badb5b359ec17c45d99e297893a28b5130a724d6ba12465f361d7872ab3ebc527ae317735c1182d3d71bcd53b4773dbca3cd82ea1d76e
-
Filesize
3.4MB
MD53233aced9279ef54267c479bba665b90
SHA10b2cc142386641901511269503cdf6f641fad305
SHA256f60f8a6bcaf1384a0d6a76d3e88007a8604560b263d2b8aeee06fd74c9ee5b3b
SHA51255f25c51ffb89d46f2a7d2ed9b67701e178bd68e74b71d757d5fa14bd9530a427104fc36116633033ead762ecf7960ab96429f5b0a085a701001c6832ba4555e