Analysis
-
max time kernel
150s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20220718-en -
resource tags
arch:x64arch:x86image:win10v2004-20220718-enlocale:en-usos:windows10-2004-x64system -
submitted
20-07-2022 01:48
Static task
static1
Behavioral task
behavioral1
Sample
541244c6529f99813eae1f884512a978.dll
Resource
win7-20220718-en
Behavioral task
behavioral2
Sample
541244c6529f99813eae1f884512a978.dll
Resource
win10v2004-20220718-en
General
-
Target
541244c6529f99813eae1f884512a978.dll
-
Size
5.0MB
-
MD5
541244c6529f99813eae1f884512a978
-
SHA1
7a5fa963919ee42a7901134f79cd4c7415df1492
-
SHA256
867150935ecc2ec3dc3051d0446cf1325c5e5d17e26340727c828cdefe61c03e
-
SHA512
aea44567a73a99928453e047ad2c8c18ec10a946e1d3c2fbc075a0dde206dd33c3dcb93977740a83140128fe0eb79fb2c5262ca73d196d8df4f64b4bdb0cb207
Malware Config
Signatures
-
Wannacry
WannaCry is a ransomware cryptoworm.
-
Contacts a large (3043) amount of remote hosts 1 TTPs
This may indicate a network scan to discover remotely running services.
-
Executes dropped EXE 2 IoCs
Processes:
mssecsvr.exemssecsvr.exepid process 452 mssecsvr.exe 4180 mssecsvr.exe -
Creates a large amount of network flows 1 TTPs
This may indicate a network scan to discover remotely running services.
-
Drops file in Windows directory 2 IoCs
Processes:
mssecsvr.exerundll32.exedescription ioc process File created C:\WINDOWS\tasksche.exe mssecsvr.exe File created C:\WINDOWS\mssecsvr.exe rundll32.exe -
Modifies data under HKEY_USERS 5 IoCs
Processes:
mssecsvr.exedescription ioc process Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ProxyBypass = "1" mssecsvr.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\IntranetName = "1" mssecsvr.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\UNCAsIntranet = "1" mssecsvr.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\AutoDetect = "0" mssecsvr.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ mssecsvr.exe -
Suspicious use of WriteProcessMemory 6 IoCs
Processes:
rundll32.exerundll32.exedescription pid process target process PID 384 wrote to memory of 3080 384 rundll32.exe rundll32.exe PID 384 wrote to memory of 3080 384 rundll32.exe rundll32.exe PID 384 wrote to memory of 3080 384 rundll32.exe rundll32.exe PID 3080 wrote to memory of 452 3080 rundll32.exe mssecsvr.exe PID 3080 wrote to memory of 452 3080 rundll32.exe mssecsvr.exe PID 3080 wrote to memory of 452 3080 rundll32.exe mssecsvr.exe
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\541244c6529f99813eae1f884512a978.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:384 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\541244c6529f99813eae1f884512a978.dll,#12⤵
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:3080 -
C:\WINDOWS\mssecsvr.exeC:\WINDOWS\mssecsvr.exe3⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:452
-
C:\WINDOWS\mssecsvr.exeC:\WINDOWS\mssecsvr.exe -m security1⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
PID:4180
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2.2MB
MD50276eefd8c4aa0251f91970d6b5c7b06
SHA1b0e9fb5611be918bfb22687d124917d17afeb925
SHA256e88ddba41c108036ae73061fd536e1a3f6e4719cbf9cbc9078cf59f62c6da470
SHA51236d81e55f973286f3680701bb4c38ec7f49099bcdff12832e1a5c1362b331023511f2a883d2438a9fbf7e6f50dc9f8ff4507d850ec5be4af804fd31b446c126d
-
Filesize
2.2MB
MD50276eefd8c4aa0251f91970d6b5c7b06
SHA1b0e9fb5611be918bfb22687d124917d17afeb925
SHA256e88ddba41c108036ae73061fd536e1a3f6e4719cbf9cbc9078cf59f62c6da470
SHA51236d81e55f973286f3680701bb4c38ec7f49099bcdff12832e1a5c1362b331023511f2a883d2438a9fbf7e6f50dc9f8ff4507d850ec5be4af804fd31b446c126d
-
Filesize
2.2MB
MD50276eefd8c4aa0251f91970d6b5c7b06
SHA1b0e9fb5611be918bfb22687d124917d17afeb925
SHA256e88ddba41c108036ae73061fd536e1a3f6e4719cbf9cbc9078cf59f62c6da470
SHA51236d81e55f973286f3680701bb4c38ec7f49099bcdff12832e1a5c1362b331023511f2a883d2438a9fbf7e6f50dc9f8ff4507d850ec5be4af804fd31b446c126d