Analysis

  • max time kernel
    150s
  • max time network
    153s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220718-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220718-enlocale:en-usos:windows10-2004-x64system
  • submitted
    20-07-2022 01:13

General

  • Target

    bbe2afa97b110302be0e9e52be6d6f64.dll

  • Size

    5.0MB

  • MD5

    bbe2afa97b110302be0e9e52be6d6f64

  • SHA1

    e46ddb727ba325e31940cccb1b36d385aed7a716

  • SHA256

    178fe955a6c0412daaf5a36485281a168ab40df284b451dad6c84043a6a5c0d6

  • SHA512

    c42ad5ed9e8a61ef54c23be342101bf443cd155a5975ada6f253254491efad9d630664fc932ae9e6d5f86c58011998931076003b0ad50d6eb5ccd0944ad9fa83

Malware Config

Signatures

  • Wannacry

    WannaCry is a ransomware cryptoworm.

  • Contacts a large (3252) amount of remote hosts 1 TTPs

    This may indicate a network scan to discover remotely running services.

  • Executes dropped EXE 3 IoCs
  • Creates a large amount of network flows 1 TTPs

    This may indicate a network scan to discover remotely running services.

  • Drops file in Windows directory 2 IoCs
  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Windows\system32\rundll32.exe
    rundll32.exe C:\Users\Admin\AppData\Local\Temp\bbe2afa97b110302be0e9e52be6d6f64.dll,#1
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:620
    • C:\Windows\SysWOW64\rundll32.exe
      rundll32.exe C:\Users\Admin\AppData\Local\Temp\bbe2afa97b110302be0e9e52be6d6f64.dll,#1
      2⤵
      • Drops file in Windows directory
      • Suspicious use of WriteProcessMemory
      PID:2336
      • C:\WINDOWS\mssecsvc.exe
        C:\WINDOWS\mssecsvc.exe
        3⤵
        • Executes dropped EXE
        • Drops file in Windows directory
        PID:4660
        • C:\WINDOWS\tasksche.exe
          C:\WINDOWS\tasksche.exe /i
          4⤵
          • Executes dropped EXE
          PID:1116
  • C:\WINDOWS\mssecsvc.exe
    C:\WINDOWS\mssecsvc.exe -m security
    1⤵
    • Executes dropped EXE
    PID:2196

Network

MITRE ATT&CK Matrix ATT&CK v6

Discovery

Network Service Scanning

2
T1046

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\WINDOWS\mssecsvc.exe
    Filesize

    3.6MB

    MD5

    ee521250e09469441951e0525349070b

    SHA1

    30c0f52ced45273a2eb4c425aa2537f2cf0434c2

    SHA256

    273685e728bd39d0597f32579dc98262dee0811dbf3cc69e109face6f898e1f3

    SHA512

    b8dab73a2a6b6977138b2c78cbcab54c87d63b6eb80bd20cbf46df36611099bd11018d863c541aa8e2f50a4935f1dcc374dd765dc9b8e72b2d4d23ba9dc64c42

  • C:\Windows\mssecsvc.exe
    Filesize

    3.6MB

    MD5

    ee521250e09469441951e0525349070b

    SHA1

    30c0f52ced45273a2eb4c425aa2537f2cf0434c2

    SHA256

    273685e728bd39d0597f32579dc98262dee0811dbf3cc69e109face6f898e1f3

    SHA512

    b8dab73a2a6b6977138b2c78cbcab54c87d63b6eb80bd20cbf46df36611099bd11018d863c541aa8e2f50a4935f1dcc374dd765dc9b8e72b2d4d23ba9dc64c42

  • C:\Windows\mssecsvc.exe
    Filesize

    3.6MB

    MD5

    ee521250e09469441951e0525349070b

    SHA1

    30c0f52ced45273a2eb4c425aa2537f2cf0434c2

    SHA256

    273685e728bd39d0597f32579dc98262dee0811dbf3cc69e109face6f898e1f3

    SHA512

    b8dab73a2a6b6977138b2c78cbcab54c87d63b6eb80bd20cbf46df36611099bd11018d863c541aa8e2f50a4935f1dcc374dd765dc9b8e72b2d4d23ba9dc64c42

  • C:\Windows\tasksche.exe
    Filesize

    3.4MB

    MD5

    f75ccfcc8fde211afcd7c0fbb87d3b74

    SHA1

    23b4793ab44814c53cc0f86e10978b1ac09236c4

    SHA256

    0e789b3bd7a770c0c77c354bd5b848cffaf38f1ffde622cb5b47cda14c59b2a2

    SHA512

    43c81a0bbbcf54eb84c11f4ba886a3e118e02570995ab6861d3e7a4784e88dca783f5c3a80d8be97c47a442c244ad1f557d5fcd637f2347acfd0a7c1e6c4c3b3

  • memory/2336-130-0x0000000000000000-mapping.dmp
  • memory/4660-131-0x0000000000000000-mapping.dmp