Analysis

  • max time kernel
    151s
  • max time network
    154s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220414-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220414-enlocale:en-usos:windows10-2004-x64system
  • submitted
    20-07-2022 01:34

General

  • Target

    4cc25b97bb799e0c360bead0b3691b1f.dll

  • Size

    5.0MB

  • MD5

    4cc25b97bb799e0c360bead0b3691b1f

  • SHA1

    c731f3dd7dce8fd91b43222da11ec89241fcc804

  • SHA256

    b449d6bc93e72b048050ac5ba066eaec553512b56c1f4873e53fa70660b85d96

  • SHA512

    a34c49780f39a86dd7e1dc4532517d415a64d090e46912052df88fcf9365f095cffed343e4e9c84a2fa4c6333abfde208492fd0e5292a524a1e5a9425d599c90

Malware Config

Signatures

  • Wannacry

    WannaCry is a ransomware cryptoworm.

  • Contacts a large (3333) amount of remote hosts 1 TTPs

    This may indicate a network scan to discover remotely running services.

  • Executes dropped EXE 3 IoCs
  • Creates a large amount of network flows 1 TTPs

    This may indicate a network scan to discover remotely running services.

  • Drops file in Windows directory 2 IoCs
  • Modifies data under HKEY_USERS 5 IoCs
  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Windows\system32\rundll32.exe
    rundll32.exe C:\Users\Admin\AppData\Local\Temp\4cc25b97bb799e0c360bead0b3691b1f.dll,#1
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2496
    • C:\Windows\SysWOW64\rundll32.exe
      rundll32.exe C:\Users\Admin\AppData\Local\Temp\4cc25b97bb799e0c360bead0b3691b1f.dll,#1
      2⤵
      • Drops file in Windows directory
      • Suspicious use of WriteProcessMemory
      PID:4080
      • C:\WINDOWS\mssecsvc.exe
        C:\WINDOWS\mssecsvc.exe
        3⤵
        • Executes dropped EXE
        • Drops file in Windows directory
        PID:752
        • C:\WINDOWS\tasksche.exe
          C:\WINDOWS\tasksche.exe /i
          4⤵
          • Executes dropped EXE
          PID:4132
  • C:\WINDOWS\mssecsvc.exe
    C:\WINDOWS\mssecsvc.exe -m security
    1⤵
    • Executes dropped EXE
    • Modifies data under HKEY_USERS
    PID:2540

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\WINDOWS\mssecsvc.exe
    Filesize

    3.6MB

    MD5

    084db088c44555d4ccea92651f54cd8e

    SHA1

    b33e3326a90ccc8784e42e167832bb5e4df99bf4

    SHA256

    403df523df248c6e8a0f39db5194791a1e8bdcee1a41c038fee652b684287be4

    SHA512

    74bdb19b9b0ed1bc2cf1cfd9a5644ef02a778f353843b522393c3b111b5ba80884065181f2e5e25c310c4110d726d37e3cb09a5d164bb3202c3e55f5b09d3559

  • C:\Windows\mssecsvc.exe
    Filesize

    3.6MB

    MD5

    084db088c44555d4ccea92651f54cd8e

    SHA1

    b33e3326a90ccc8784e42e167832bb5e4df99bf4

    SHA256

    403df523df248c6e8a0f39db5194791a1e8bdcee1a41c038fee652b684287be4

    SHA512

    74bdb19b9b0ed1bc2cf1cfd9a5644ef02a778f353843b522393c3b111b5ba80884065181f2e5e25c310c4110d726d37e3cb09a5d164bb3202c3e55f5b09d3559

  • C:\Windows\mssecsvc.exe
    Filesize

    3.6MB

    MD5

    084db088c44555d4ccea92651f54cd8e

    SHA1

    b33e3326a90ccc8784e42e167832bb5e4df99bf4

    SHA256

    403df523df248c6e8a0f39db5194791a1e8bdcee1a41c038fee652b684287be4

    SHA512

    74bdb19b9b0ed1bc2cf1cfd9a5644ef02a778f353843b522393c3b111b5ba80884065181f2e5e25c310c4110d726d37e3cb09a5d164bb3202c3e55f5b09d3559

  • C:\Windows\tasksche.exe
    Filesize

    3.4MB

    MD5

    ca73ed13ce5d8f9b98eafe046d5b2def

    SHA1

    be99e6616e5edd99f7886cd4f89a62f39c3b1e42

    SHA256

    eabb80333df9e51a08be9422133f02592ead62fd677963a7e0ab00aaf56dfc98

    SHA512

    18cfa57c894cf8dfb27d96655953c84133ba5ac755625157592644dd16d9476be458a51f61018b1a1485092b1f4ad9365cb2fb9ccc5a38f0324a1c568a7f31d4

  • memory/752-131-0x0000000000000000-mapping.dmp
  • memory/4080-130-0x0000000000000000-mapping.dmp