Analysis

  • max time kernel
    151s
  • max time network
    155s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220715-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220715-enlocale:en-usos:windows10-2004-x64system
  • submitted
    20-07-2022 02:38

General

  • Target

    07813c26f199fef5b9963f31c3ab3077.dll

  • Size

    5.0MB

  • MD5

    07813c26f199fef5b9963f31c3ab3077

  • SHA1

    6319cd8890da043cf36832e4d895033b4e502ec9

  • SHA256

    eedd33dfe6084c4fb8ff22594c5b4e6c35ff76170efa2caf12556a3ae427bf7f

  • SHA512

    61793cbf78eecd5c7e05446f86d0a8e4b4170e28652f4d19894741c52d943eb675a274357eb20d08bdcfdaaeb06b070891bcb017efe3ec63ccdf2578bf80a239

Malware Config

Signatures

  • Wannacry

    WannaCry is a ransomware cryptoworm.

  • Contacts a large (3153) amount of remote hosts 1 TTPs

    This may indicate a network scan to discover remotely running services.

  • Executes dropped EXE 2 IoCs
  • Creates a large amount of network flows 1 TTPs

    This may indicate a network scan to discover remotely running services.

  • Drops file in Windows directory 2 IoCs
  • Modifies data under HKEY_USERS 5 IoCs
  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Windows\system32\rundll32.exe
    rundll32.exe C:\Users\Admin\AppData\Local\Temp\07813c26f199fef5b9963f31c3ab3077.dll,#1
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:4564
    • C:\Windows\SysWOW64\rundll32.exe
      rundll32.exe C:\Users\Admin\AppData\Local\Temp\07813c26f199fef5b9963f31c3ab3077.dll,#1
      2⤵
      • Drops file in Windows directory
      • Suspicious use of WriteProcessMemory
      PID:2228
      • C:\WINDOWS\mssecsvr.exe
        C:\WINDOWS\mssecsvr.exe
        3⤵
        • Executes dropped EXE
        • Drops file in Windows directory
        PID:3428
  • C:\WINDOWS\mssecsvr.exe
    C:\WINDOWS\mssecsvr.exe -m security
    1⤵
    • Executes dropped EXE
    • Modifies data under HKEY_USERS
    PID:4428

Network

MITRE ATT&CK Matrix ATT&CK v6

Discovery

Network Service Scanning

2
T1046

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\WINDOWS\mssecsvr.exe
    Filesize

    3.6MB

    MD5

    289caf2bf72f4dceb04c65bf03d7bab1

    SHA1

    4daa3f803e95a784b47bac4d96f56b879812a85a

    SHA256

    b668a57b5eda98b43fed817821414f1d0b63bb8cdd481808d49e48b956bd75b6

    SHA512

    6029ad714e89d81dd797905b5d33962d023f935ae8d845e38d7e2071074c0f747db5870189a9e14c196062d9b3e3edf1edc7458ffc90ebf1717571f84e6b4c20

  • C:\Windows\mssecsvr.exe
    Filesize

    3.6MB

    MD5

    289caf2bf72f4dceb04c65bf03d7bab1

    SHA1

    4daa3f803e95a784b47bac4d96f56b879812a85a

    SHA256

    b668a57b5eda98b43fed817821414f1d0b63bb8cdd481808d49e48b956bd75b6

    SHA512

    6029ad714e89d81dd797905b5d33962d023f935ae8d845e38d7e2071074c0f747db5870189a9e14c196062d9b3e3edf1edc7458ffc90ebf1717571f84e6b4c20

  • C:\Windows\mssecsvr.exe
    Filesize

    3.6MB

    MD5

    289caf2bf72f4dceb04c65bf03d7bab1

    SHA1

    4daa3f803e95a784b47bac4d96f56b879812a85a

    SHA256

    b668a57b5eda98b43fed817821414f1d0b63bb8cdd481808d49e48b956bd75b6

    SHA512

    6029ad714e89d81dd797905b5d33962d023f935ae8d845e38d7e2071074c0f747db5870189a9e14c196062d9b3e3edf1edc7458ffc90ebf1717571f84e6b4c20

  • memory/2228-130-0x0000000000000000-mapping.dmp
  • memory/3428-131-0x0000000000000000-mapping.dmp