Analysis
-
max time kernel
170s -
max time network
176s -
platform
windows7_x64 -
resource
win7-20220718-en -
resource tags
arch:x64arch:x86image:win7-20220718-enlocale:en-usos:windows7-x64system -
submitted
20-07-2022 02:37
Static task
static1
Behavioral task
behavioral1
Sample
bfe40cccbc006ac527ad7b89f3474f3b.dll
Resource
win7-20220718-en
Behavioral task
behavioral2
Sample
bfe40cccbc006ac527ad7b89f3474f3b.dll
Resource
win10v2004-20220718-en
General
-
Target
bfe40cccbc006ac527ad7b89f3474f3b.dll
-
Size
5.0MB
-
MD5
bfe40cccbc006ac527ad7b89f3474f3b
-
SHA1
90a498067a926950fd01acf217ed12c10b8951a5
-
SHA256
455185e7bdfab196c09c07c41eedebe9094b2230a6c7cea089b581ecb05f3b71
-
SHA512
1ffce6d265f827c0faceeb4efcb82052e138f7a46357a35f6aedccbbd5ba9c68d8b107c71bdad7b3874e5f88b0ce56bbb6eb94e3903490c5e6878b184a881796
Malware Config
Signatures
-
Wannacry
WannaCry is a ransomware cryptoworm.
-
Contacts a large (1265) amount of remote hosts 1 TTPs
This may indicate a network scan to discover remotely running services.
-
Executes dropped EXE 2 IoCs
Processes:
mssecsvr.exemssecsvr.exepid process 1332 mssecsvr.exe 1768 mssecsvr.exe -
Drops file in System32 directory 1 IoCs
Processes:
mssecsvr.exedescription ioc process File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\Temporary Internet Files\counters.dat mssecsvr.exe -
Drops file in Windows directory 2 IoCs
Processes:
rundll32.exemssecsvr.exedescription ioc process File created C:\WINDOWS\mssecsvr.exe rundll32.exe File created C:\WINDOWS\tasksche.exe mssecsvr.exe -
Modifies data under HKEY_USERS 24 IoCs
Processes:
mssecsvr.exedescription ioc process Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections mssecsvr.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\AutoDetect = "1" mssecsvr.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Content\CachePrefix mssecsvr.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Cookies\CachePrefix = "Cookie:" mssecsvr.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\DefaultConnectionSettings = 4600000003000000090000000000000000000000000000000400000000000000000000000000000000000000000000000000000001000000020000000a7f00b7000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 mssecsvr.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\DefaultConnectionSettings = 4600000002000000090000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 mssecsvr.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ mssecsvr.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{09198BD8-AAE4-4499-87F6-CDDADBEAFAA8}\WpadDecisionReason = "1" mssecsvr.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{09198BD8-AAE4-4499-87F6-CDDADBEAFAA8}\06-b3-e2-21-6b-68 mssecsvr.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\06-b3-e2-21-6b-68\WpadDecisionReason = "1" mssecsvr.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings mssecsvr.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\SavedLegacySettings = 4600000002000000090000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 mssecsvr.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\History\CachePrefix = "Visited:" mssecsvr.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad mssecsvr.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{09198BD8-AAE4-4499-87F6-CDDADBEAFAA8} mssecsvr.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{09198BD8-AAE4-4499-87F6-CDDADBEAFAA8}\WpadDecisionTime = a02a4776f29bd801 mssecsvr.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{09198BD8-AAE4-4499-87F6-CDDADBEAFAA8}\WpadDecision = "0" mssecsvr.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\06-b3-e2-21-6b-68\WpadDecisionTime = a02a4776f29bd801 mssecsvr.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings mssecsvr.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ProxyEnable = "0" mssecsvr.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\UNCAsIntranet = "0" mssecsvr.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{09198BD8-AAE4-4499-87F6-CDDADBEAFAA8}\WpadNetworkName = "Network 3" mssecsvr.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\06-b3-e2-21-6b-68 mssecsvr.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\06-b3-e2-21-6b-68\WpadDecision = "0" mssecsvr.exe -
Suspicious use of WriteProcessMemory 11 IoCs
Processes:
rundll32.exerundll32.exedescription pid process target process PID 324 wrote to memory of 2008 324 rundll32.exe rundll32.exe PID 324 wrote to memory of 2008 324 rundll32.exe rundll32.exe PID 324 wrote to memory of 2008 324 rundll32.exe rundll32.exe PID 324 wrote to memory of 2008 324 rundll32.exe rundll32.exe PID 324 wrote to memory of 2008 324 rundll32.exe rundll32.exe PID 324 wrote to memory of 2008 324 rundll32.exe rundll32.exe PID 324 wrote to memory of 2008 324 rundll32.exe rundll32.exe PID 2008 wrote to memory of 1332 2008 rundll32.exe mssecsvr.exe PID 2008 wrote to memory of 1332 2008 rundll32.exe mssecsvr.exe PID 2008 wrote to memory of 1332 2008 rundll32.exe mssecsvr.exe PID 2008 wrote to memory of 1332 2008 rundll32.exe mssecsvr.exe
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\bfe40cccbc006ac527ad7b89f3474f3b.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:324 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\bfe40cccbc006ac527ad7b89f3474f3b.dll,#12⤵
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:2008 -
C:\WINDOWS\mssecsvr.exeC:\WINDOWS\mssecsvr.exe3⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:1332
-
C:\WINDOWS\mssecsvr.exeC:\WINDOWS\mssecsvr.exe -m security1⤵
- Executes dropped EXE
- Drops file in System32 directory
- Modifies data under HKEY_USERS
PID:1768
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3.6MB
MD54e07145d88c956d214aee28e90bb824c
SHA143d1623c5c50b16fb225ae08612e748b02a6ae55
SHA25681874cf0cdf5f05c2375d9c56894f9a1515f296833f99be77ae496ac0dca212e
SHA51252d0833d4e744f55f0fe8be17c8ba39c0a58c685b0eb029f4657aec681b2103e8fb1c960b2854d3bc29d9e8102efae3f53db1e7aba71dbbf7f52e60a45ad2350
-
Filesize
3.6MB
MD54e07145d88c956d214aee28e90bb824c
SHA143d1623c5c50b16fb225ae08612e748b02a6ae55
SHA25681874cf0cdf5f05c2375d9c56894f9a1515f296833f99be77ae496ac0dca212e
SHA51252d0833d4e744f55f0fe8be17c8ba39c0a58c685b0eb029f4657aec681b2103e8fb1c960b2854d3bc29d9e8102efae3f53db1e7aba71dbbf7f52e60a45ad2350
-
Filesize
3.6MB
MD54e07145d88c956d214aee28e90bb824c
SHA143d1623c5c50b16fb225ae08612e748b02a6ae55
SHA25681874cf0cdf5f05c2375d9c56894f9a1515f296833f99be77ae496ac0dca212e
SHA51252d0833d4e744f55f0fe8be17c8ba39c0a58c685b0eb029f4657aec681b2103e8fb1c960b2854d3bc29d9e8102efae3f53db1e7aba71dbbf7f52e60a45ad2350