Analysis
-
max time kernel
151s -
max time network
153s -
platform
windows7_x64 -
resource
win7-20220718-en -
resource tags
arch:x64arch:x86image:win7-20220718-enlocale:en-usos:windows7-x64system -
submitted
20-07-2022 01:52
Static task
static1
Behavioral task
behavioral1
Sample
9fa2c063407eded38c48442015813197.dll
Resource
win7-20220718-en
Behavioral task
behavioral2
Sample
9fa2c063407eded38c48442015813197.dll
Resource
win10v2004-20220718-en
General
-
Target
9fa2c063407eded38c48442015813197.dll
-
Size
5.0MB
-
MD5
9fa2c063407eded38c48442015813197
-
SHA1
4aab1c9155674604b3c3c90d72eba94f075b082c
-
SHA256
7d1c223a17dba5e7b344d8beb89020715ce77a41e92592088ce4777514c06306
-
SHA512
d22abb366119cbcfc891f993aef9725f5fa892ba3b5f867fc169817790b1454a289e43927bca8c35bfa752c83bade36c7440f1fa97d17b20233932d882168dc8
Malware Config
Signatures
-
Wannacry
WannaCry is a ransomware cryptoworm.
-
Contacts a large (1229) amount of remote hosts 1 TTPs
This may indicate a network scan to discover remotely running services.
-
Executes dropped EXE 3 IoCs
Processes:
mssecsvc.exemssecsvc.exetasksche.exepid process 1608 mssecsvc.exe 948 mssecsvc.exe 1056 tasksche.exe -
Drops file in System32 directory 1 IoCs
Processes:
mssecsvc.exedescription ioc process File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\Temporary Internet Files\counters.dat mssecsvc.exe -
Drops file in Windows directory 2 IoCs
Processes:
mssecsvc.exerundll32.exedescription ioc process File created C:\WINDOWS\tasksche.exe mssecsvc.exe File created C:\WINDOWS\mssecsvc.exe rundll32.exe -
Modifies data under HKEY_USERS 24 IoCs
Processes:
mssecsvc.exedescription ioc process Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad mssecsvc.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\46-b6-0d-ab-9a-20 mssecsvc.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\46-b6-0d-ab-9a-20\WpadDecisionTime = d00e801bec9bd801 mssecsvc.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\46-b6-0d-ab-9a-20\WpadDecision = "0" mssecsvc.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings mssecsvc.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\AutoDetect = "1" mssecsvc.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Content\CachePrefix mssecsvc.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{5AB3EC69-37C3-4F68-A950-A93EE4D75C8E} mssecsvc.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ mssecsvc.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\UNCAsIntranet = "0" mssecsvc.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Cookies\CachePrefix = "Cookie:" mssecsvc.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\DefaultConnectionSettings = 4600000003000000090000000000000000000000000000000400000000000000000000000000000000000000000000000000000001000000020000000a7f00c5000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 mssecsvc.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections mssecsvc.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ProxyEnable = "0" mssecsvc.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\SavedLegacySettings = 4600000002000000090000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 mssecsvc.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{5AB3EC69-37C3-4F68-A950-A93EE4D75C8E}\WpadDecisionReason = "1" mssecsvc.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{5AB3EC69-37C3-4F68-A950-A93EE4D75C8E}\WpadDecisionTime = d00e801bec9bd801 mssecsvc.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{5AB3EC69-37C3-4F68-A950-A93EE4D75C8E}\WpadDecision = "0" mssecsvc.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{5AB3EC69-37C3-4F68-A950-A93EE4D75C8E}\WpadNetworkName = "Network 3" mssecsvc.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{5AB3EC69-37C3-4F68-A950-A93EE4D75C8E}\46-b6-0d-ab-9a-20 mssecsvc.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\DefaultConnectionSettings = 4600000002000000090000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 mssecsvc.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings mssecsvc.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\History\CachePrefix = "Visited:" mssecsvc.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\46-b6-0d-ab-9a-20\WpadDecisionReason = "1" mssecsvc.exe -
Suspicious use of WriteProcessMemory 11 IoCs
Processes:
rundll32.exerundll32.exedescription pid process target process PID 1620 wrote to memory of 1668 1620 rundll32.exe rundll32.exe PID 1620 wrote to memory of 1668 1620 rundll32.exe rundll32.exe PID 1620 wrote to memory of 1668 1620 rundll32.exe rundll32.exe PID 1620 wrote to memory of 1668 1620 rundll32.exe rundll32.exe PID 1620 wrote to memory of 1668 1620 rundll32.exe rundll32.exe PID 1620 wrote to memory of 1668 1620 rundll32.exe rundll32.exe PID 1620 wrote to memory of 1668 1620 rundll32.exe rundll32.exe PID 1668 wrote to memory of 1608 1668 rundll32.exe mssecsvc.exe PID 1668 wrote to memory of 1608 1668 rundll32.exe mssecsvc.exe PID 1668 wrote to memory of 1608 1668 rundll32.exe mssecsvc.exe PID 1668 wrote to memory of 1608 1668 rundll32.exe mssecsvc.exe
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\9fa2c063407eded38c48442015813197.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1620 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\9fa2c063407eded38c48442015813197.dll,#12⤵
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:1668 -
C:\WINDOWS\mssecsvc.exeC:\WINDOWS\mssecsvc.exe3⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:1608 -
C:\WINDOWS\tasksche.exeC:\WINDOWS\tasksche.exe /i4⤵
- Executes dropped EXE
PID:1056
-
C:\WINDOWS\mssecsvc.exeC:\WINDOWS\mssecsvc.exe -m security1⤵
- Executes dropped EXE
- Drops file in System32 directory
- Modifies data under HKEY_USERS
PID:948
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3.6MB
MD5fe84ef281d07e0e04d170728eb49f0e2
SHA1cd49b310512978bac31b09a1e493aa21830d718c
SHA2564f0f71f49a473b72ad144387ee291610cc128cb03f487567b85e396bb519d6d8
SHA5129dac0c45b9315040e10e5db613fd03fba03dcb9355f08db7842a0bcd81ba80e3831e59c99030bb20ab1f90ab186041dc4c4c2e6929cc5b9535b03af07716d00a
-
Filesize
3.6MB
MD5fe84ef281d07e0e04d170728eb49f0e2
SHA1cd49b310512978bac31b09a1e493aa21830d718c
SHA2564f0f71f49a473b72ad144387ee291610cc128cb03f487567b85e396bb519d6d8
SHA5129dac0c45b9315040e10e5db613fd03fba03dcb9355f08db7842a0bcd81ba80e3831e59c99030bb20ab1f90ab186041dc4c4c2e6929cc5b9535b03af07716d00a
-
Filesize
3.6MB
MD5fe84ef281d07e0e04d170728eb49f0e2
SHA1cd49b310512978bac31b09a1e493aa21830d718c
SHA2564f0f71f49a473b72ad144387ee291610cc128cb03f487567b85e396bb519d6d8
SHA5129dac0c45b9315040e10e5db613fd03fba03dcb9355f08db7842a0bcd81ba80e3831e59c99030bb20ab1f90ab186041dc4c4c2e6929cc5b9535b03af07716d00a
-
Filesize
3.4MB
MD5704c542fffcb94db0e810d6c45f77d9b
SHA1ee248a611307e595d964b4ef2b466e2f779ab77a
SHA256407cbb482baa54f328f944e3122584900ed3e0daec6b507b5570b151792b65eb
SHA5123984a681a5eadd8ec517e84efa0d8be17a1db3cb0822be99ae8e1ca7ee95418a0b5804a0a74895b7bf82ca6685951d3a50827de58275162d1bf0b1b6dca59c13