Analysis
-
max time kernel
151s -
max time network
153s -
platform
windows7_x64 -
resource
win7-20220718-en -
resource tags
arch:x64arch:x86image:win7-20220718-enlocale:en-usos:windows7-x64system -
submitted
20-07-2022 01:45
Static task
static1
Behavioral task
behavioral1
Sample
50a4daa7e9c1fc8a4b62457f9d7538c9.dll
Resource
win7-20220718-en
Behavioral task
behavioral2
Sample
50a4daa7e9c1fc8a4b62457f9d7538c9.dll
Resource
win10v2004-20220718-en
General
-
Target
50a4daa7e9c1fc8a4b62457f9d7538c9.dll
-
Size
5.0MB
-
MD5
50a4daa7e9c1fc8a4b62457f9d7538c9
-
SHA1
e2ab9e97df6457e299155213b88f53c22d55c6c4
-
SHA256
a917952029deb1a0e3492291a08303bfd0da6f93480bb1da9a878b15e609bfc7
-
SHA512
cda68bb356406414ee36534b0fb7c4a18919dbee9d489a5437c7b9f3bf32350df1bc08418a91181461ced9b99517715d104e46dc5f2f4c3b2e4408bb393ebbf4
Malware Config
Signatures
-
Wannacry
WannaCry is a ransomware cryptoworm.
-
Contacts a large (1190) amount of remote hosts 1 TTPs
This may indicate a network scan to discover remotely running services.
-
Executes dropped EXE 2 IoCs
Processes:
mssecsvr.exemssecsvr.exepid process 2036 mssecsvr.exe 904 mssecsvr.exe -
Drops file in System32 directory 1 IoCs
Processes:
mssecsvr.exedescription ioc process File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\Temporary Internet Files\counters.dat mssecsvr.exe -
Drops file in Windows directory 2 IoCs
Processes:
rundll32.exemssecsvr.exedescription ioc process File created C:\WINDOWS\mssecsvr.exe rundll32.exe File created C:\WINDOWS\tasksche.exe mssecsvr.exe -
Modifies data under HKEY_USERS 24 IoCs
Processes:
mssecsvr.exedescription ioc process Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ProxyEnable = "0" mssecsvr.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ mssecsvr.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Content\CachePrefix mssecsvr.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad mssecsvr.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\8a-3a-e4-6c-9a-8f\WpadDecision = "0" mssecsvr.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings mssecsvr.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings mssecsvr.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\UNCAsIntranet = "0" mssecsvr.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\AutoDetect = "1" mssecsvr.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Cookies\CachePrefix = "Cookie:" mssecsvr.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\History\CachePrefix = "Visited:" mssecsvr.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{2416CCD9-80FE-4F92-8545-C9B01F27B9D0}\WpadDecisionReason = "1" mssecsvr.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{2416CCD9-80FE-4F92-8545-C9B01F27B9D0}\WpadDecisionTime = 807e2c23eb9bd801 mssecsvr.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{2416CCD9-80FE-4F92-8545-C9B01F27B9D0}\WpadNetworkName = "Network 3" mssecsvr.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\8a-3a-e4-6c-9a-8f mssecsvr.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\8a-3a-e4-6c-9a-8f\WpadDecisionReason = "1" mssecsvr.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\8a-3a-e4-6c-9a-8f\WpadDecisionTime = 807e2c23eb9bd801 mssecsvr.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\DefaultConnectionSettings = 4600000002000000090000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 mssecsvr.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\SavedLegacySettings = 4600000002000000090000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 mssecsvr.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{2416CCD9-80FE-4F92-8545-C9B01F27B9D0}\8a-3a-e4-6c-9a-8f mssecsvr.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections mssecsvr.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\DefaultConnectionSettings = 4600000003000000090000000000000000000000000000000400000000000000000000000000000000000000000000000000000001000000020000000a7f00b8000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 mssecsvr.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{2416CCD9-80FE-4F92-8545-C9B01F27B9D0} mssecsvr.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{2416CCD9-80FE-4F92-8545-C9B01F27B9D0}\WpadDecision = "0" mssecsvr.exe -
Suspicious use of WriteProcessMemory 11 IoCs
Processes:
rundll32.exerundll32.exedescription pid process target process PID 1180 wrote to memory of 1916 1180 rundll32.exe rundll32.exe PID 1180 wrote to memory of 1916 1180 rundll32.exe rundll32.exe PID 1180 wrote to memory of 1916 1180 rundll32.exe rundll32.exe PID 1180 wrote to memory of 1916 1180 rundll32.exe rundll32.exe PID 1180 wrote to memory of 1916 1180 rundll32.exe rundll32.exe PID 1180 wrote to memory of 1916 1180 rundll32.exe rundll32.exe PID 1180 wrote to memory of 1916 1180 rundll32.exe rundll32.exe PID 1916 wrote to memory of 2036 1916 rundll32.exe mssecsvr.exe PID 1916 wrote to memory of 2036 1916 rundll32.exe mssecsvr.exe PID 1916 wrote to memory of 2036 1916 rundll32.exe mssecsvr.exe PID 1916 wrote to memory of 2036 1916 rundll32.exe mssecsvr.exe
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\50a4daa7e9c1fc8a4b62457f9d7538c9.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1180 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\50a4daa7e9c1fc8a4b62457f9d7538c9.dll,#12⤵
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:1916 -
C:\WINDOWS\mssecsvr.exeC:\WINDOWS\mssecsvr.exe3⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:2036
-
C:\WINDOWS\mssecsvr.exeC:\WINDOWS\mssecsvr.exe -m security1⤵
- Executes dropped EXE
- Drops file in System32 directory
- Modifies data under HKEY_USERS
PID:904
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2.2MB
MD55317fdfcd2406217ec66a3cb4b5a8413
SHA13a54316147d3f50932c1ce4f794ce0ce1b7b9a7f
SHA2564438ad009cf422c890195912636ed52e48773d36e7dc0a34519d7324d3392328
SHA512e8860f047f8b20a027413edacf68ead9fba01f23a60a11cd33274416c37d1f44291febbf915ba3fd1383812a35a7e7ae50f048711e99433232683ec873523687
-
Filesize
2.2MB
MD55317fdfcd2406217ec66a3cb4b5a8413
SHA13a54316147d3f50932c1ce4f794ce0ce1b7b9a7f
SHA2564438ad009cf422c890195912636ed52e48773d36e7dc0a34519d7324d3392328
SHA512e8860f047f8b20a027413edacf68ead9fba01f23a60a11cd33274416c37d1f44291febbf915ba3fd1383812a35a7e7ae50f048711e99433232683ec873523687
-
Filesize
2.2MB
MD55317fdfcd2406217ec66a3cb4b5a8413
SHA13a54316147d3f50932c1ce4f794ce0ce1b7b9a7f
SHA2564438ad009cf422c890195912636ed52e48773d36e7dc0a34519d7324d3392328
SHA512e8860f047f8b20a027413edacf68ead9fba01f23a60a11cd33274416c37d1f44291febbf915ba3fd1383812a35a7e7ae50f048711e99433232683ec873523687