Analysis

  • max time kernel
    151s
  • max time network
    154s
  • platform
    windows7_x64
  • resource
    win7-20220715-en
  • resource tags

    arch:x64arch:x86image:win7-20220715-enlocale:en-usos:windows7-x64system
  • submitted
    20-07-2022 02:38

General

  • Target

    07813c26f199fef5b9963f31c3ab3077.dll

  • Size

    5.0MB

  • MD5

    07813c26f199fef5b9963f31c3ab3077

  • SHA1

    6319cd8890da043cf36832e4d895033b4e502ec9

  • SHA256

    eedd33dfe6084c4fb8ff22594c5b4e6c35ff76170efa2caf12556a3ae427bf7f

  • SHA512

    61793cbf78eecd5c7e05446f86d0a8e4b4170e28652f4d19894741c52d943eb675a274357eb20d08bdcfdaaeb06b070891bcb017efe3ec63ccdf2578bf80a239

Malware Config

Signatures

  • Wannacry

    WannaCry is a ransomware cryptoworm.

  • Contacts a large (1261) amount of remote hosts 1 TTPs

    This may indicate a network scan to discover remotely running services.

  • Executes dropped EXE 2 IoCs
  • Drops file in System32 directory 1 IoCs
  • Drops file in Windows directory 2 IoCs
  • Modifies data under HKEY_USERS 24 IoCs
  • Suspicious use of WriteProcessMemory 11 IoCs

Processes

  • C:\Windows\system32\rundll32.exe
    rundll32.exe C:\Users\Admin\AppData\Local\Temp\07813c26f199fef5b9963f31c3ab3077.dll,#1
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1476
    • C:\Windows\SysWOW64\rundll32.exe
      rundll32.exe C:\Users\Admin\AppData\Local\Temp\07813c26f199fef5b9963f31c3ab3077.dll,#1
      2⤵
      • Drops file in Windows directory
      • Suspicious use of WriteProcessMemory
      PID:1916
      • C:\WINDOWS\mssecsvr.exe
        C:\WINDOWS\mssecsvr.exe
        3⤵
        • Executes dropped EXE
        • Drops file in Windows directory
        PID:944
  • C:\WINDOWS\mssecsvr.exe
    C:\WINDOWS\mssecsvr.exe -m security
    1⤵
    • Executes dropped EXE
    • Drops file in System32 directory
    • Modifies data under HKEY_USERS
    PID:844

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\WINDOWS\mssecsvr.exe

    Filesize

    3.6MB

    MD5

    289caf2bf72f4dceb04c65bf03d7bab1

    SHA1

    4daa3f803e95a784b47bac4d96f56b879812a85a

    SHA256

    b668a57b5eda98b43fed817821414f1d0b63bb8cdd481808d49e48b956bd75b6

    SHA512

    6029ad714e89d81dd797905b5d33962d023f935ae8d845e38d7e2071074c0f747db5870189a9e14c196062d9b3e3edf1edc7458ffc90ebf1717571f84e6b4c20

  • C:\Windows\mssecsvr.exe

    Filesize

    3.6MB

    MD5

    289caf2bf72f4dceb04c65bf03d7bab1

    SHA1

    4daa3f803e95a784b47bac4d96f56b879812a85a

    SHA256

    b668a57b5eda98b43fed817821414f1d0b63bb8cdd481808d49e48b956bd75b6

    SHA512

    6029ad714e89d81dd797905b5d33962d023f935ae8d845e38d7e2071074c0f747db5870189a9e14c196062d9b3e3edf1edc7458ffc90ebf1717571f84e6b4c20

  • C:\Windows\mssecsvr.exe

    Filesize

    3.6MB

    MD5

    289caf2bf72f4dceb04c65bf03d7bab1

    SHA1

    4daa3f803e95a784b47bac4d96f56b879812a85a

    SHA256

    b668a57b5eda98b43fed817821414f1d0b63bb8cdd481808d49e48b956bd75b6

    SHA512

    6029ad714e89d81dd797905b5d33962d023f935ae8d845e38d7e2071074c0f747db5870189a9e14c196062d9b3e3edf1edc7458ffc90ebf1717571f84e6b4c20

  • memory/944-56-0x0000000000000000-mapping.dmp

  • memory/1916-54-0x0000000000000000-mapping.dmp

  • memory/1916-55-0x00000000768C1000-0x00000000768C3000-memory.dmp

    Filesize

    8KB