Analysis
-
max time kernel
150s -
max time network
154s -
platform
windows10-2004_x64 -
resource
win10v2004-20220718-en -
resource tags
arch:x64arch:x86image:win10v2004-20220718-enlocale:en-usos:windows10-2004-x64system -
submitted
20-07-2022 02:37
Static task
static1
Behavioral task
behavioral1
Sample
bfe40cccbc006ac527ad7b89f3474f3b.dll
Resource
win7-20220718-en
Behavioral task
behavioral2
Sample
bfe40cccbc006ac527ad7b89f3474f3b.dll
Resource
win10v2004-20220718-en
General
-
Target
bfe40cccbc006ac527ad7b89f3474f3b.dll
-
Size
5.0MB
-
MD5
bfe40cccbc006ac527ad7b89f3474f3b
-
SHA1
90a498067a926950fd01acf217ed12c10b8951a5
-
SHA256
455185e7bdfab196c09c07c41eedebe9094b2230a6c7cea089b581ecb05f3b71
-
SHA512
1ffce6d265f827c0faceeb4efcb82052e138f7a46357a35f6aedccbbd5ba9c68d8b107c71bdad7b3874e5f88b0ce56bbb6eb94e3903490c5e6878b184a881796
Malware Config
Signatures
-
Wannacry
WannaCry is a ransomware cryptoworm.
-
Contacts a large (3329) amount of remote hosts 1 TTPs
This may indicate a network scan to discover remotely running services.
-
Executes dropped EXE 2 IoCs
Processes:
mssecsvr.exemssecsvr.exepid process 4660 mssecsvr.exe 2196 mssecsvr.exe -
Creates a large amount of network flows 1 TTPs
This may indicate a network scan to discover remotely running services.
-
Drops file in Windows directory 2 IoCs
Processes:
rundll32.exemssecsvr.exedescription ioc process File created C:\WINDOWS\mssecsvr.exe rundll32.exe File created C:\WINDOWS\tasksche.exe mssecsvr.exe -
Modifies data under HKEY_USERS 5 IoCs
Processes:
mssecsvr.exedescription ioc process Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ mssecsvr.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ProxyBypass = "1" mssecsvr.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\IntranetName = "1" mssecsvr.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\UNCAsIntranet = "1" mssecsvr.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\AutoDetect = "0" mssecsvr.exe -
Suspicious use of WriteProcessMemory 6 IoCs
Processes:
rundll32.exerundll32.exedescription pid process target process PID 620 wrote to memory of 2336 620 rundll32.exe rundll32.exe PID 620 wrote to memory of 2336 620 rundll32.exe rundll32.exe PID 620 wrote to memory of 2336 620 rundll32.exe rundll32.exe PID 2336 wrote to memory of 4660 2336 rundll32.exe mssecsvr.exe PID 2336 wrote to memory of 4660 2336 rundll32.exe mssecsvr.exe PID 2336 wrote to memory of 4660 2336 rundll32.exe mssecsvr.exe
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\bfe40cccbc006ac527ad7b89f3474f3b.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:620 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\bfe40cccbc006ac527ad7b89f3474f3b.dll,#12⤵
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:2336 -
C:\WINDOWS\mssecsvr.exeC:\WINDOWS\mssecsvr.exe3⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:4660
-
C:\WINDOWS\mssecsvr.exeC:\WINDOWS\mssecsvr.exe -m security1⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
PID:2196
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3.6MB
MD54e07145d88c956d214aee28e90bb824c
SHA143d1623c5c50b16fb225ae08612e748b02a6ae55
SHA25681874cf0cdf5f05c2375d9c56894f9a1515f296833f99be77ae496ac0dca212e
SHA51252d0833d4e744f55f0fe8be17c8ba39c0a58c685b0eb029f4657aec681b2103e8fb1c960b2854d3bc29d9e8102efae3f53db1e7aba71dbbf7f52e60a45ad2350
-
Filesize
3.6MB
MD54e07145d88c956d214aee28e90bb824c
SHA143d1623c5c50b16fb225ae08612e748b02a6ae55
SHA25681874cf0cdf5f05c2375d9c56894f9a1515f296833f99be77ae496ac0dca212e
SHA51252d0833d4e744f55f0fe8be17c8ba39c0a58c685b0eb029f4657aec681b2103e8fb1c960b2854d3bc29d9e8102efae3f53db1e7aba71dbbf7f52e60a45ad2350
-
Filesize
3.6MB
MD54e07145d88c956d214aee28e90bb824c
SHA143d1623c5c50b16fb225ae08612e748b02a6ae55
SHA25681874cf0cdf5f05c2375d9c56894f9a1515f296833f99be77ae496ac0dca212e
SHA51252d0833d4e744f55f0fe8be17c8ba39c0a58c685b0eb029f4657aec681b2103e8fb1c960b2854d3bc29d9e8102efae3f53db1e7aba71dbbf7f52e60a45ad2350