Analysis
-
max time kernel
151s -
max time network
157s -
platform
windows10-2004_x64 -
resource
win10v2004-20220414-en -
resource tags
arch:x64arch:x86image:win10v2004-20220414-enlocale:en-usos:windows10-2004-x64system -
submitted
20-07-2022 02:44
Static task
static1
Behavioral task
behavioral1
Sample
9a14a942a549ab228d6e3415b2a0133b.dll
Resource
win7-20220715-en
Behavioral task
behavioral2
Sample
9a14a942a549ab228d6e3415b2a0133b.dll
Resource
win10v2004-20220414-en
General
-
Target
9a14a942a549ab228d6e3415b2a0133b.dll
-
Size
5.0MB
-
MD5
9a14a942a549ab228d6e3415b2a0133b
-
SHA1
448617e6e41a7e73163a12eace27019f94695932
-
SHA256
8837f653df7ca3316c21ff0fe7e4e0094b8e84ee53f95222a927132a8f67782c
-
SHA512
2994e31e9f16ad5fb67305971bff022c7e225054595f30384dfc315344aac98d7ffb07828a822ae8deacd371e836c3d3c5f3f4c0343b01dd1dc81630533ad2a0
Malware Config
Signatures
-
Wannacry
WannaCry is a ransomware cryptoworm.
-
Contacts a large (3252) amount of remote hosts 1 TTPs
This may indicate a network scan to discover remotely running services.
-
Executes dropped EXE 2 IoCs
Processes:
mssecsvr.exemssecsvr.exepid process 4340 mssecsvr.exe 2712 mssecsvr.exe -
Creates a large amount of network flows 1 TTPs
This may indicate a network scan to discover remotely running services.
-
Drops file in Windows directory 2 IoCs
Processes:
rundll32.exemssecsvr.exedescription ioc process File created C:\WINDOWS\mssecsvr.exe rundll32.exe File created C:\WINDOWS\tasksche.exe mssecsvr.exe -
Suspicious use of WriteProcessMemory 6 IoCs
Processes:
rundll32.exerundll32.exedescription pid process target process PID 1180 wrote to memory of 4532 1180 rundll32.exe rundll32.exe PID 1180 wrote to memory of 4532 1180 rundll32.exe rundll32.exe PID 1180 wrote to memory of 4532 1180 rundll32.exe rundll32.exe PID 4532 wrote to memory of 4340 4532 rundll32.exe mssecsvr.exe PID 4532 wrote to memory of 4340 4532 rundll32.exe mssecsvr.exe PID 4532 wrote to memory of 4340 4532 rundll32.exe mssecsvr.exe
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\9a14a942a549ab228d6e3415b2a0133b.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1180 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\9a14a942a549ab228d6e3415b2a0133b.dll,#12⤵
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:4532 -
C:\WINDOWS\mssecsvr.exeC:\WINDOWS\mssecsvr.exe3⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:4340
-
C:\WINDOWS\mssecsvr.exeC:\WINDOWS\mssecsvr.exe -m security1⤵
- Executes dropped EXE
PID:2712
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2.2MB
MD5213f29ca85a360f2f1b2b3411cb6b890
SHA1597497de8ee139df2e75559867ad4a15d1bc8cf9
SHA25641e55c6f480c8e57bf3aacc8b17ff8c6cf27fdbaac75f861411a27a698c54dc1
SHA512574296f6a27c678552619fd38346153b9a8799c6f603036f2b16800345d98ff917f1d3333e828dba5f626e1d6151bd85c5975e2b3eac60299dff10b1b1d4c4b3
-
Filesize
2.2MB
MD5213f29ca85a360f2f1b2b3411cb6b890
SHA1597497de8ee139df2e75559867ad4a15d1bc8cf9
SHA25641e55c6f480c8e57bf3aacc8b17ff8c6cf27fdbaac75f861411a27a698c54dc1
SHA512574296f6a27c678552619fd38346153b9a8799c6f603036f2b16800345d98ff917f1d3333e828dba5f626e1d6151bd85c5975e2b3eac60299dff10b1b1d4c4b3
-
Filesize
2.2MB
MD5213f29ca85a360f2f1b2b3411cb6b890
SHA1597497de8ee139df2e75559867ad4a15d1bc8cf9
SHA25641e55c6f480c8e57bf3aacc8b17ff8c6cf27fdbaac75f861411a27a698c54dc1
SHA512574296f6a27c678552619fd38346153b9a8799c6f603036f2b16800345d98ff917f1d3333e828dba5f626e1d6151bd85c5975e2b3eac60299dff10b1b1d4c4b3