Analysis
-
max time kernel
151s -
max time network
155s -
platform
windows7_x64 -
resource
win7-20220715-en -
resource tags
arch:x64arch:x86image:win7-20220715-enlocale:en-usos:windows7-x64system -
submitted
20-07-2022 02:44
Static task
static1
Behavioral task
behavioral1
Sample
9a14a942a549ab228d6e3415b2a0133b.dll
Resource
win7-20220715-en
Behavioral task
behavioral2
Sample
9a14a942a549ab228d6e3415b2a0133b.dll
Resource
win10v2004-20220414-en
General
-
Target
9a14a942a549ab228d6e3415b2a0133b.dll
-
Size
5.0MB
-
MD5
9a14a942a549ab228d6e3415b2a0133b
-
SHA1
448617e6e41a7e73163a12eace27019f94695932
-
SHA256
8837f653df7ca3316c21ff0fe7e4e0094b8e84ee53f95222a927132a8f67782c
-
SHA512
2994e31e9f16ad5fb67305971bff022c7e225054595f30384dfc315344aac98d7ffb07828a822ae8deacd371e836c3d3c5f3f4c0343b01dd1dc81630533ad2a0
Malware Config
Signatures
-
Wannacry
WannaCry is a ransomware cryptoworm.
-
Contacts a large (1225) amount of remote hosts 1 TTPs
This may indicate a network scan to discover remotely running services.
-
Executes dropped EXE 2 IoCs
Processes:
mssecsvr.exemssecsvr.exepid process 1940 mssecsvr.exe 1384 mssecsvr.exe -
Drops file in System32 directory 1 IoCs
Processes:
mssecsvr.exedescription ioc process File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\Temporary Internet Files\counters.dat mssecsvr.exe -
Drops file in Windows directory 2 IoCs
Processes:
rundll32.exemssecsvr.exedescription ioc process File created C:\WINDOWS\mssecsvr.exe rundll32.exe File created C:\WINDOWS\tasksche.exe mssecsvr.exe -
Modifies data under HKEY_USERS 1 IoCs
Processes:
mssecsvr.exedescription ioc process Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings mssecsvr.exe -
Suspicious use of WriteProcessMemory 11 IoCs
Processes:
rundll32.exerundll32.exedescription pid process target process PID 576 wrote to memory of 1108 576 rundll32.exe rundll32.exe PID 576 wrote to memory of 1108 576 rundll32.exe rundll32.exe PID 576 wrote to memory of 1108 576 rundll32.exe rundll32.exe PID 576 wrote to memory of 1108 576 rundll32.exe rundll32.exe PID 576 wrote to memory of 1108 576 rundll32.exe rundll32.exe PID 576 wrote to memory of 1108 576 rundll32.exe rundll32.exe PID 576 wrote to memory of 1108 576 rundll32.exe rundll32.exe PID 1108 wrote to memory of 1940 1108 rundll32.exe mssecsvr.exe PID 1108 wrote to memory of 1940 1108 rundll32.exe mssecsvr.exe PID 1108 wrote to memory of 1940 1108 rundll32.exe mssecsvr.exe PID 1108 wrote to memory of 1940 1108 rundll32.exe mssecsvr.exe
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\9a14a942a549ab228d6e3415b2a0133b.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:576 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\9a14a942a549ab228d6e3415b2a0133b.dll,#12⤵
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:1108 -
C:\WINDOWS\mssecsvr.exeC:\WINDOWS\mssecsvr.exe3⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:1940
-
C:\WINDOWS\mssecsvr.exeC:\WINDOWS\mssecsvr.exe -m security1⤵
- Executes dropped EXE
- Drops file in System32 directory
- Modifies data under HKEY_USERS
PID:1384
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2.2MB
MD5213f29ca85a360f2f1b2b3411cb6b890
SHA1597497de8ee139df2e75559867ad4a15d1bc8cf9
SHA25641e55c6f480c8e57bf3aacc8b17ff8c6cf27fdbaac75f861411a27a698c54dc1
SHA512574296f6a27c678552619fd38346153b9a8799c6f603036f2b16800345d98ff917f1d3333e828dba5f626e1d6151bd85c5975e2b3eac60299dff10b1b1d4c4b3
-
Filesize
2.2MB
MD5213f29ca85a360f2f1b2b3411cb6b890
SHA1597497de8ee139df2e75559867ad4a15d1bc8cf9
SHA25641e55c6f480c8e57bf3aacc8b17ff8c6cf27fdbaac75f861411a27a698c54dc1
SHA512574296f6a27c678552619fd38346153b9a8799c6f603036f2b16800345d98ff917f1d3333e828dba5f626e1d6151bd85c5975e2b3eac60299dff10b1b1d4c4b3
-
Filesize
2.2MB
MD5213f29ca85a360f2f1b2b3411cb6b890
SHA1597497de8ee139df2e75559867ad4a15d1bc8cf9
SHA25641e55c6f480c8e57bf3aacc8b17ff8c6cf27fdbaac75f861411a27a698c54dc1
SHA512574296f6a27c678552619fd38346153b9a8799c6f603036f2b16800345d98ff917f1d3333e828dba5f626e1d6151bd85c5975e2b3eac60299dff10b1b1d4c4b3