Analysis
-
max time kernel
151s -
max time network
154s -
platform
windows10-2004_x64 -
resource
win10v2004-20220414-en -
resource tags
arch:x64arch:x86image:win10v2004-20220414-enlocale:en-usos:windows10-2004-x64system -
submitted
20-07-2022 01:34
Static task
static1
Behavioral task
behavioral1
Sample
4cc25b97bb799e0c360bead0b3691b1f.dll
Resource
win7-20220718-en
Behavioral task
behavioral2
Sample
4cc25b97bb799e0c360bead0b3691b1f.dll
Resource
win10v2004-20220414-en
General
-
Target
4cc25b97bb799e0c360bead0b3691b1f.dll
-
Size
5.0MB
-
MD5
4cc25b97bb799e0c360bead0b3691b1f
-
SHA1
c731f3dd7dce8fd91b43222da11ec89241fcc804
-
SHA256
b449d6bc93e72b048050ac5ba066eaec553512b56c1f4873e53fa70660b85d96
-
SHA512
a34c49780f39a86dd7e1dc4532517d415a64d090e46912052df88fcf9365f095cffed343e4e9c84a2fa4c6333abfde208492fd0e5292a524a1e5a9425d599c90
Malware Config
Signatures
-
Wannacry
WannaCry is a ransomware cryptoworm.
-
Contacts a large (3333) amount of remote hosts 1 TTPs
This may indicate a network scan to discover remotely running services.
-
Executes dropped EXE 3 IoCs
Processes:
mssecsvc.exemssecsvc.exetasksche.exepid process 752 mssecsvc.exe 2540 mssecsvc.exe 4132 tasksche.exe -
Creates a large amount of network flows 1 TTPs
This may indicate a network scan to discover remotely running services.
-
Drops file in Windows directory 2 IoCs
Processes:
rundll32.exemssecsvc.exedescription ioc process File created C:\WINDOWS\mssecsvc.exe rundll32.exe File created C:\WINDOWS\tasksche.exe mssecsvc.exe -
Modifies data under HKEY_USERS 5 IoCs
Processes:
mssecsvc.exedescription ioc process Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ProxyBypass = "1" mssecsvc.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\IntranetName = "1" mssecsvc.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\UNCAsIntranet = "1" mssecsvc.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\AutoDetect = "0" mssecsvc.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ mssecsvc.exe -
Suspicious use of WriteProcessMemory 6 IoCs
Processes:
rundll32.exerundll32.exedescription pid process target process PID 2496 wrote to memory of 4080 2496 rundll32.exe rundll32.exe PID 2496 wrote to memory of 4080 2496 rundll32.exe rundll32.exe PID 2496 wrote to memory of 4080 2496 rundll32.exe rundll32.exe PID 4080 wrote to memory of 752 4080 rundll32.exe mssecsvc.exe PID 4080 wrote to memory of 752 4080 rundll32.exe mssecsvc.exe PID 4080 wrote to memory of 752 4080 rundll32.exe mssecsvc.exe
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\4cc25b97bb799e0c360bead0b3691b1f.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:2496 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\4cc25b97bb799e0c360bead0b3691b1f.dll,#12⤵
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:4080 -
C:\WINDOWS\mssecsvc.exeC:\WINDOWS\mssecsvc.exe3⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:752 -
C:\WINDOWS\tasksche.exeC:\WINDOWS\tasksche.exe /i4⤵
- Executes dropped EXE
PID:4132
-
C:\WINDOWS\mssecsvc.exeC:\WINDOWS\mssecsvc.exe -m security1⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
PID:2540
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\WINDOWS\mssecsvc.exeFilesize
3.6MB
MD5084db088c44555d4ccea92651f54cd8e
SHA1b33e3326a90ccc8784e42e167832bb5e4df99bf4
SHA256403df523df248c6e8a0f39db5194791a1e8bdcee1a41c038fee652b684287be4
SHA51274bdb19b9b0ed1bc2cf1cfd9a5644ef02a778f353843b522393c3b111b5ba80884065181f2e5e25c310c4110d726d37e3cb09a5d164bb3202c3e55f5b09d3559
-
C:\Windows\mssecsvc.exeFilesize
3.6MB
MD5084db088c44555d4ccea92651f54cd8e
SHA1b33e3326a90ccc8784e42e167832bb5e4df99bf4
SHA256403df523df248c6e8a0f39db5194791a1e8bdcee1a41c038fee652b684287be4
SHA51274bdb19b9b0ed1bc2cf1cfd9a5644ef02a778f353843b522393c3b111b5ba80884065181f2e5e25c310c4110d726d37e3cb09a5d164bb3202c3e55f5b09d3559
-
C:\Windows\mssecsvc.exeFilesize
3.6MB
MD5084db088c44555d4ccea92651f54cd8e
SHA1b33e3326a90ccc8784e42e167832bb5e4df99bf4
SHA256403df523df248c6e8a0f39db5194791a1e8bdcee1a41c038fee652b684287be4
SHA51274bdb19b9b0ed1bc2cf1cfd9a5644ef02a778f353843b522393c3b111b5ba80884065181f2e5e25c310c4110d726d37e3cb09a5d164bb3202c3e55f5b09d3559
-
C:\Windows\tasksche.exeFilesize
3.4MB
MD5ca73ed13ce5d8f9b98eafe046d5b2def
SHA1be99e6616e5edd99f7886cd4f89a62f39c3b1e42
SHA256eabb80333df9e51a08be9422133f02592ead62fd677963a7e0ab00aaf56dfc98
SHA51218cfa57c894cf8dfb27d96655953c84133ba5ac755625157592644dd16d9476be458a51f61018b1a1485092b1f4ad9365cb2fb9ccc5a38f0324a1c568a7f31d4
-
memory/752-131-0x0000000000000000-mapping.dmp
-
memory/4080-130-0x0000000000000000-mapping.dmp