Analysis

  • max time kernel
    150s
  • max time network
    153s
  • platform
    windows7_x64
  • resource
    win7-20220718-en
  • resource tags

    arch:x64arch:x86image:win7-20220718-enlocale:en-usos:windows7-x64system
  • submitted
    20-07-2022 00:59

General

  • Target

    509c4f643012e458fe01eb3d8903daec.dll

  • Size

    5.0MB

  • MD5

    509c4f643012e458fe01eb3d8903daec

  • SHA1

    ce4ac99b7876155ac3e2fe3bf63f9a8e6a388caf

  • SHA256

    a868d77d1824dfc85a1fd1a1a1cf7750a183193ef88705da725555961800e0c3

  • SHA512

    97de19178385e7d9cc2f5e72410b95e257afea1c0a0d7d4936f3c20f7754bad1caa1c593161dbf40e273b9dd55794be85bbbf16b48ee4d932d4ab1057d50cbd0

Malware Config

Signatures

  • Wannacry

    WannaCry is a ransomware cryptoworm.

  • Contacts a large (1200) amount of remote hosts 1 TTPs

    This may indicate a network scan to discover remotely running services.

  • Executes dropped EXE 2 IoCs
  • Drops file in System32 directory 1 IoCs
  • Drops file in Windows directory 2 IoCs
  • Modifies data under HKEY_USERS 24 IoCs
  • Suspicious use of WriteProcessMemory 11 IoCs

Processes

  • C:\Windows\system32\rundll32.exe
    rundll32.exe C:\Users\Admin\AppData\Local\Temp\509c4f643012e458fe01eb3d8903daec.dll,#1
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2020
    • C:\Windows\SysWOW64\rundll32.exe
      rundll32.exe C:\Users\Admin\AppData\Local\Temp\509c4f643012e458fe01eb3d8903daec.dll,#1
      2⤵
      • Drops file in Windows directory
      • Suspicious use of WriteProcessMemory
      PID:1648
      • C:\WINDOWS\mssecsvr.exe
        C:\WINDOWS\mssecsvr.exe
        3⤵
        • Executes dropped EXE
        • Drops file in Windows directory
        PID:1996
  • C:\WINDOWS\mssecsvr.exe
    C:\WINDOWS\mssecsvr.exe -m security
    1⤵
    • Executes dropped EXE
    • Drops file in System32 directory
    • Modifies data under HKEY_USERS
    PID:1536

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\WINDOWS\mssecsvr.exe
    Filesize

    2.2MB

    MD5

    d496a21f0f27b8acba1030e145fce2c1

    SHA1

    e811e36c029e2621f5d4ab2a8cf8eb269f41b43f

    SHA256

    5c7b038ff7d32047e2b4c48726b95d3befa54cd60b1a1884e78aab3733ef748c

    SHA512

    53e10e8ddc8c13350b499f1607f79a6ff2b0f7f65e370cbddccdfa46a6f12608b0c9a2d99111b3eaaf599743e6059a779ca543d76b8b848db759252a8d1a2079

  • C:\Windows\mssecsvr.exe
    Filesize

    2.2MB

    MD5

    d496a21f0f27b8acba1030e145fce2c1

    SHA1

    e811e36c029e2621f5d4ab2a8cf8eb269f41b43f

    SHA256

    5c7b038ff7d32047e2b4c48726b95d3befa54cd60b1a1884e78aab3733ef748c

    SHA512

    53e10e8ddc8c13350b499f1607f79a6ff2b0f7f65e370cbddccdfa46a6f12608b0c9a2d99111b3eaaf599743e6059a779ca543d76b8b848db759252a8d1a2079

  • C:\Windows\mssecsvr.exe
    Filesize

    2.2MB

    MD5

    d496a21f0f27b8acba1030e145fce2c1

    SHA1

    e811e36c029e2621f5d4ab2a8cf8eb269f41b43f

    SHA256

    5c7b038ff7d32047e2b4c48726b95d3befa54cd60b1a1884e78aab3733ef748c

    SHA512

    53e10e8ddc8c13350b499f1607f79a6ff2b0f7f65e370cbddccdfa46a6f12608b0c9a2d99111b3eaaf599743e6059a779ca543d76b8b848db759252a8d1a2079

  • memory/1648-54-0x0000000000000000-mapping.dmp
  • memory/1648-55-0x0000000075BF1000-0x0000000075BF3000-memory.dmp
    Filesize

    8KB

  • memory/1996-56-0x0000000000000000-mapping.dmp