Analysis
-
max time kernel
151s -
max time network
155s -
platform
windows10-2004_x64 -
resource
win10v2004-20220414-en -
resource tags
arch:x64arch:x86image:win10v2004-20220414-enlocale:en-usos:windows10-2004-x64system -
submitted
20-07-2022 01:53
Static task
static1
Behavioral task
behavioral1
Sample
4880cc5c5074c2f58a770c3a292384f9.dll
Resource
win7-20220715-en
Behavioral task
behavioral2
Sample
4880cc5c5074c2f58a770c3a292384f9.dll
Resource
win10v2004-20220414-en
General
-
Target
4880cc5c5074c2f58a770c3a292384f9.dll
-
Size
5.0MB
-
MD5
4880cc5c5074c2f58a770c3a292384f9
-
SHA1
c63ae9a8f1013675ff914b88d257e18bdbac7181
-
SHA256
eac6b0bbe69ef8c0dc8e36cbff6d5c2a7cb4d662f4d88e5bc8b596b2275d694b
-
SHA512
914435ff0b3f04c0451bee6aed3b3101f1f89f82cb50c15ee4cddab5716a0a7444ab31afc03103d0d4b0d18467399b3dfc1543749129c3cb7c353db91abda168
Malware Config
Signatures
-
Wannacry
WannaCry is a ransomware cryptoworm.
-
Contacts a large (3234) amount of remote hosts 1 TTPs
This may indicate a network scan to discover remotely running services.
-
Executes dropped EXE 3 IoCs
Processes:
mssecsvc.exemssecsvc.exetasksche.exepid process 756 mssecsvc.exe 4324 mssecsvc.exe 4088 tasksche.exe -
Creates a large amount of network flows 1 TTPs
This may indicate a network scan to discover remotely running services.
-
Drops file in Windows directory 2 IoCs
Processes:
rundll32.exemssecsvc.exedescription ioc process File created C:\WINDOWS\mssecsvc.exe rundll32.exe File created C:\WINDOWS\tasksche.exe mssecsvc.exe -
Modifies data under HKEY_USERS 5 IoCs
Processes:
mssecsvc.exedescription ioc process Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ProxyBypass = "1" mssecsvc.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\IntranetName = "1" mssecsvc.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\UNCAsIntranet = "1" mssecsvc.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\AutoDetect = "0" mssecsvc.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ mssecsvc.exe -
Suspicious use of WriteProcessMemory 6 IoCs
Processes:
rundll32.exerundll32.exedescription pid process target process PID 1540 wrote to memory of 3704 1540 rundll32.exe rundll32.exe PID 1540 wrote to memory of 3704 1540 rundll32.exe rundll32.exe PID 1540 wrote to memory of 3704 1540 rundll32.exe rundll32.exe PID 3704 wrote to memory of 756 3704 rundll32.exe mssecsvc.exe PID 3704 wrote to memory of 756 3704 rundll32.exe mssecsvc.exe PID 3704 wrote to memory of 756 3704 rundll32.exe mssecsvc.exe
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\4880cc5c5074c2f58a770c3a292384f9.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1540 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\4880cc5c5074c2f58a770c3a292384f9.dll,#12⤵
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:3704 -
C:\WINDOWS\mssecsvc.exeC:\WINDOWS\mssecsvc.exe3⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:756 -
C:\WINDOWS\tasksche.exeC:\WINDOWS\tasksche.exe /i4⤵
- Executes dropped EXE
PID:4088
-
C:\WINDOWS\mssecsvc.exeC:\WINDOWS\mssecsvc.exe -m security1⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
PID:4324
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3.6MB
MD56e7fe070bf1423650e1880acda3681d0
SHA10a0679cd0a1b84022630eb8edaa9917b33d80ff4
SHA256715e4bb1f29e0d13fa502f77be2d2c8b841db3f3e6c873a4df2adb3f8d6873ad
SHA5122b974ec0f40248169574ff39f034f215ae5fda49a276687a6ef065d79d4319684ce5463bdfee35cdc1a818ec0fca22857048e868100286d1a3600e81c5f4a107
-
Filesize
3.6MB
MD56e7fe070bf1423650e1880acda3681d0
SHA10a0679cd0a1b84022630eb8edaa9917b33d80ff4
SHA256715e4bb1f29e0d13fa502f77be2d2c8b841db3f3e6c873a4df2adb3f8d6873ad
SHA5122b974ec0f40248169574ff39f034f215ae5fda49a276687a6ef065d79d4319684ce5463bdfee35cdc1a818ec0fca22857048e868100286d1a3600e81c5f4a107
-
Filesize
3.6MB
MD56e7fe070bf1423650e1880acda3681d0
SHA10a0679cd0a1b84022630eb8edaa9917b33d80ff4
SHA256715e4bb1f29e0d13fa502f77be2d2c8b841db3f3e6c873a4df2adb3f8d6873ad
SHA5122b974ec0f40248169574ff39f034f215ae5fda49a276687a6ef065d79d4319684ce5463bdfee35cdc1a818ec0fca22857048e868100286d1a3600e81c5f4a107
-
Filesize
3.4MB
MD5cb5d464d9db6d56e17ce7c3a507969be
SHA1b71e9ef4b55b17895be9996a10fe82abd5730f62
SHA256aba9184f5e1343336fc084a11ab77bd7af11c93044cf7d3111d677dcf995bca4
SHA512e238111195bded2da19b1e74d6c14cde19556d8660a6d466b14f8275c89c707619235125c31175a3cf0cd1be5d0b0f68551bce74970bb6d140e5b8ea54658da4