Analysis

  • max time kernel
    150s
  • max time network
    153s
  • platform
    windows7_x64
  • resource
    win7-20220718-en
  • resource tags

    arch:x64arch:x86image:win7-20220718-enlocale:en-usos:windows7-x64system
  • submitted
    20-07-2022 01:16

General

  • Target

    226bc9bf49ebc95bfcf27565897de584.dll

  • Size

    5.0MB

  • MD5

    226bc9bf49ebc95bfcf27565897de584

  • SHA1

    083d6f6cf152a6c23d5184a632a10336f584586c

  • SHA256

    50601aefc90eeec3293a8ff01cdc838eb467b39baa4d821b488bde72a0cff2d0

  • SHA512

    cf963c0f3fdaf2e438fe52d479a33e3daecda14b4013d9fc9f3168d2102b9597ea1ccfdcb12d789bc5c61537eecd0ec3113a71d036d7494533a2e1f86fef61a1

Malware Config

Signatures

  • Wannacry

    WannaCry is a ransomware cryptoworm.

  • Contacts a large (1274) amount of remote hosts 1 TTPs

    This may indicate a network scan to discover remotely running services.

  • Executes dropped EXE 2 IoCs
  • Drops file in System32 directory 1 IoCs
  • Drops file in Windows directory 2 IoCs
  • Modifies data under HKEY_USERS 24 IoCs
  • Suspicious use of WriteProcessMemory 11 IoCs

Processes

  • C:\Windows\system32\rundll32.exe
    rundll32.exe C:\Users\Admin\AppData\Local\Temp\226bc9bf49ebc95bfcf27565897de584.dll,#1
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1920
    • C:\Windows\SysWOW64\rundll32.exe
      rundll32.exe C:\Users\Admin\AppData\Local\Temp\226bc9bf49ebc95bfcf27565897de584.dll,#1
      2⤵
      • Drops file in Windows directory
      • Suspicious use of WriteProcessMemory
      PID:896
      • C:\WINDOWS\mssecsvr.exe
        C:\WINDOWS\mssecsvr.exe
        3⤵
        • Executes dropped EXE
        • Drops file in Windows directory
        PID:1452
  • C:\WINDOWS\mssecsvr.exe
    C:\WINDOWS\mssecsvr.exe -m security
    1⤵
    • Executes dropped EXE
    • Drops file in System32 directory
    • Modifies data under HKEY_USERS
    PID:1408

Network

MITRE ATT&CK Matrix ATT&CK v6

Discovery

Network Service Scanning

1
T1046

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\WINDOWS\mssecsvr.exe
    Filesize

    2.2MB

    MD5

    fc24c0d4be45c404a3f1df284dd4587c

    SHA1

    287ffd59c71e9bca5d40d0c23498564e8bd13465

    SHA256

    274e1b4dff5c9312061a6c6ccfd7bc7d21f26b4202baac5f5c78be2670b7f767

    SHA512

    e04ae529de12b4808fd86b43774cdaa70ef57f6c124a50e2d9ad5ab77cd8c76927574b08accb9c72156b26941363b30e8dcbeb9d3626f1a41b0f2083862f2c72

  • C:\Windows\mssecsvr.exe
    Filesize

    2.2MB

    MD5

    fc24c0d4be45c404a3f1df284dd4587c

    SHA1

    287ffd59c71e9bca5d40d0c23498564e8bd13465

    SHA256

    274e1b4dff5c9312061a6c6ccfd7bc7d21f26b4202baac5f5c78be2670b7f767

    SHA512

    e04ae529de12b4808fd86b43774cdaa70ef57f6c124a50e2d9ad5ab77cd8c76927574b08accb9c72156b26941363b30e8dcbeb9d3626f1a41b0f2083862f2c72

  • C:\Windows\mssecsvr.exe
    Filesize

    2.2MB

    MD5

    fc24c0d4be45c404a3f1df284dd4587c

    SHA1

    287ffd59c71e9bca5d40d0c23498564e8bd13465

    SHA256

    274e1b4dff5c9312061a6c6ccfd7bc7d21f26b4202baac5f5c78be2670b7f767

    SHA512

    e04ae529de12b4808fd86b43774cdaa70ef57f6c124a50e2d9ad5ab77cd8c76927574b08accb9c72156b26941363b30e8dcbeb9d3626f1a41b0f2083862f2c72

  • memory/896-54-0x0000000000000000-mapping.dmp
  • memory/896-55-0x0000000075BB1000-0x0000000075BB3000-memory.dmp
    Filesize

    8KB

  • memory/1452-56-0x0000000000000000-mapping.dmp