Analysis
-
max time kernel
151s -
max time network
153s -
platform
windows7_x64 -
resource
win7-20220718-en -
resource tags
arch:x64arch:x86image:win7-20220718-enlocale:en-usos:windows7-x64system -
submitted
20-07-2022 01:48
Static task
static1
Behavioral task
behavioral1
Sample
541244c6529f99813eae1f884512a978.dll
Resource
win7-20220718-en
Behavioral task
behavioral2
Sample
541244c6529f99813eae1f884512a978.dll
Resource
win10v2004-20220718-en
General
-
Target
541244c6529f99813eae1f884512a978.dll
-
Size
5.0MB
-
MD5
541244c6529f99813eae1f884512a978
-
SHA1
7a5fa963919ee42a7901134f79cd4c7415df1492
-
SHA256
867150935ecc2ec3dc3051d0446cf1325c5e5d17e26340727c828cdefe61c03e
-
SHA512
aea44567a73a99928453e047ad2c8c18ec10a946e1d3c2fbc075a0dde206dd33c3dcb93977740a83140128fe0eb79fb2c5262ca73d196d8df4f64b4bdb0cb207
Malware Config
Signatures
-
Wannacry
WannaCry is a ransomware cryptoworm.
-
Contacts a large (1271) amount of remote hosts 1 TTPs
This may indicate a network scan to discover remotely running services.
-
Executes dropped EXE 2 IoCs
Processes:
mssecsvr.exemssecsvr.exepid process 1016 mssecsvr.exe 968 mssecsvr.exe -
Drops file in System32 directory 1 IoCs
Processes:
mssecsvr.exedescription ioc process File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\Temporary Internet Files\counters.dat mssecsvr.exe -
Drops file in Windows directory 2 IoCs
Processes:
rundll32.exemssecsvr.exedescription ioc process File created C:\WINDOWS\mssecsvr.exe rundll32.exe File created C:\WINDOWS\tasksche.exe mssecsvr.exe -
Modifies data under HKEY_USERS 24 IoCs
Processes:
mssecsvr.exedescription ioc process Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings mssecsvr.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\DefaultConnectionSettings = 4600000002000000090000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 mssecsvr.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ProxyEnable = "0" mssecsvr.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{C8490C58-6392-42BA-A4F6-9BFA049C02B9}\WpadDecision = "0" mssecsvr.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{C8490C58-6392-42BA-A4F6-9BFA049C02B9}\WpadNetworkName = "Network 3" mssecsvr.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections mssecsvr.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings mssecsvr.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ mssecsvr.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{C8490C58-6392-42BA-A4F6-9BFA049C02B9} mssecsvr.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\ca-73-de-ca-c2-7d mssecsvr.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\ca-73-de-ca-c2-7d\WpadDecisionReason = "1" mssecsvr.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\ca-73-de-ca-c2-7d\WpadDecisionTime = 702db18beb9bd801 mssecsvr.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\UNCAsIntranet = "0" mssecsvr.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Content\CachePrefix mssecsvr.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Cookies\CachePrefix = "Cookie:" mssecsvr.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad mssecsvr.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\DefaultConnectionSettings = 4600000003000000090000000000000000000000000000000400000000000000000000000000000000000000000000000000000001000000020000000a7f00c4000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 mssecsvr.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{C8490C58-6392-42BA-A4F6-9BFA049C02B9}\ca-73-de-ca-c2-7d mssecsvr.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\ca-73-de-ca-c2-7d\WpadDecision = "0" mssecsvr.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\SavedLegacySettings = 4600000002000000090000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 mssecsvr.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\AutoDetect = "1" mssecsvr.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\History\CachePrefix = "Visited:" mssecsvr.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{C8490C58-6392-42BA-A4F6-9BFA049C02B9}\WpadDecisionReason = "1" mssecsvr.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{C8490C58-6392-42BA-A4F6-9BFA049C02B9}\WpadDecisionTime = 702db18beb9bd801 mssecsvr.exe -
Suspicious use of WriteProcessMemory 11 IoCs
Processes:
rundll32.exerundll32.exedescription pid process target process PID 1892 wrote to memory of 1676 1892 rundll32.exe rundll32.exe PID 1892 wrote to memory of 1676 1892 rundll32.exe rundll32.exe PID 1892 wrote to memory of 1676 1892 rundll32.exe rundll32.exe PID 1892 wrote to memory of 1676 1892 rundll32.exe rundll32.exe PID 1892 wrote to memory of 1676 1892 rundll32.exe rundll32.exe PID 1892 wrote to memory of 1676 1892 rundll32.exe rundll32.exe PID 1892 wrote to memory of 1676 1892 rundll32.exe rundll32.exe PID 1676 wrote to memory of 1016 1676 rundll32.exe mssecsvr.exe PID 1676 wrote to memory of 1016 1676 rundll32.exe mssecsvr.exe PID 1676 wrote to memory of 1016 1676 rundll32.exe mssecsvr.exe PID 1676 wrote to memory of 1016 1676 rundll32.exe mssecsvr.exe
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\541244c6529f99813eae1f884512a978.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1892 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\541244c6529f99813eae1f884512a978.dll,#12⤵
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:1676 -
C:\WINDOWS\mssecsvr.exeC:\WINDOWS\mssecsvr.exe3⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:1016
-
C:\WINDOWS\mssecsvr.exeC:\WINDOWS\mssecsvr.exe -m security1⤵
- Executes dropped EXE
- Drops file in System32 directory
- Modifies data under HKEY_USERS
PID:968
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2.2MB
MD50276eefd8c4aa0251f91970d6b5c7b06
SHA1b0e9fb5611be918bfb22687d124917d17afeb925
SHA256e88ddba41c108036ae73061fd536e1a3f6e4719cbf9cbc9078cf59f62c6da470
SHA51236d81e55f973286f3680701bb4c38ec7f49099bcdff12832e1a5c1362b331023511f2a883d2438a9fbf7e6f50dc9f8ff4507d850ec5be4af804fd31b446c126d
-
Filesize
2.2MB
MD50276eefd8c4aa0251f91970d6b5c7b06
SHA1b0e9fb5611be918bfb22687d124917d17afeb925
SHA256e88ddba41c108036ae73061fd536e1a3f6e4719cbf9cbc9078cf59f62c6da470
SHA51236d81e55f973286f3680701bb4c38ec7f49099bcdff12832e1a5c1362b331023511f2a883d2438a9fbf7e6f50dc9f8ff4507d850ec5be4af804fd31b446c126d
-
Filesize
2.2MB
MD50276eefd8c4aa0251f91970d6b5c7b06
SHA1b0e9fb5611be918bfb22687d124917d17afeb925
SHA256e88ddba41c108036ae73061fd536e1a3f6e4719cbf9cbc9078cf59f62c6da470
SHA51236d81e55f973286f3680701bb4c38ec7f49099bcdff12832e1a5c1362b331023511f2a883d2438a9fbf7e6f50dc9f8ff4507d850ec5be4af804fd31b446c126d