Analysis
-
max time kernel
151s -
max time network
155s -
platform
windows7_x64 -
resource
win7-20220715-en -
resource tags
arch:x64arch:x86image:win7-20220715-enlocale:en-usos:windows7-x64system -
submitted
20-07-2022 01:54
Static task
static1
Behavioral task
behavioral1
Sample
9bc1f89ad6c328ff37f3444407207067.dll
Resource
win7-20220715-en
Behavioral task
behavioral2
Sample
9bc1f89ad6c328ff37f3444407207067.dll
Resource
win10v2004-20220718-en
General
-
Target
9bc1f89ad6c328ff37f3444407207067.dll
-
Size
5.0MB
-
MD5
9bc1f89ad6c328ff37f3444407207067
-
SHA1
23b76791f633bc7f39fc7457f52e61bb8de8fea7
-
SHA256
2da27cb1ddfd315a6497300d881d04b280f0bb6ee41a722aef22408df9f82c38
-
SHA512
b824fe4365d588a319d7abbb80640c73ac15d83ba80044026a9c96c85f7a9d93a4ad3eaec4a1e34cb93773ec90cd83de401621bf160d26ec41e637d00532b8a0
Malware Config
Signatures
-
Wannacry
WannaCry is a ransomware cryptoworm.
-
Contacts a large (1288) amount of remote hosts 1 TTPs
This may indicate a network scan to discover remotely running services.
-
Executes dropped EXE 3 IoCs
Processes:
mssecsvc.exemssecsvc.exetasksche.exepid process 1724 mssecsvc.exe 1884 mssecsvc.exe 112 tasksche.exe -
Drops file in System32 directory 1 IoCs
Processes:
mssecsvc.exedescription ioc process File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\Temporary Internet Files\counters.dat mssecsvc.exe -
Drops file in Windows directory 2 IoCs
Processes:
rundll32.exemssecsvc.exedescription ioc process File created C:\WINDOWS\mssecsvc.exe rundll32.exe File created C:\WINDOWS\tasksche.exe mssecsvc.exe -
Modifies data under HKEY_USERS 24 IoCs
Processes:
mssecsvc.exedescription ioc process Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{F363206D-C89B-4C23-8337-A926BC36CB0D}\WpadDecisionTime = 7045fe9fdb9bd801 mssecsvc.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections mssecsvc.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{F363206D-C89B-4C23-8337-A926BC36CB0D} mssecsvc.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{F363206D-C89B-4C23-8337-A926BC36CB0D}\WpadDecisionReason = "1" mssecsvc.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\UNCAsIntranet = "0" mssecsvc.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\History\CachePrefix = "Visited:" mssecsvc.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad mssecsvc.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{F363206D-C89B-4C23-8337-A926BC36CB0D}\WpadNetworkName = "Network 3" mssecsvc.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\36-ab-99-2e-89-9d mssecsvc.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings mssecsvc.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\DefaultConnectionSettings = 4600000002000000090000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 mssecsvc.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ mssecsvc.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\36-ab-99-2e-89-9d\WpadDecision = "0" mssecsvc.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{F363206D-C89B-4C23-8337-A926BC36CB0D}\36-ab-99-2e-89-9d mssecsvc.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\36-ab-99-2e-89-9d\WpadDecisionReason = "1" mssecsvc.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\36-ab-99-2e-89-9d\WpadDecisionTime = 7045fe9fdb9bd801 mssecsvc.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\DefaultConnectionSettings = 4600000003000000090000000000000000000000000000000400000000000000000000000000000000000000000000000000000001000000020000000a7f00f3000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 mssecsvc.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ProxyEnable = "0" mssecsvc.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Content\CachePrefix mssecsvc.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Cookies\CachePrefix = "Cookie:" mssecsvc.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{F363206D-C89B-4C23-8337-A926BC36CB0D}\WpadDecision = "0" mssecsvc.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings mssecsvc.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\SavedLegacySettings = 4600000002000000090000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 mssecsvc.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\AutoDetect = "1" mssecsvc.exe -
Suspicious use of WriteProcessMemory 11 IoCs
Processes:
rundll32.exerundll32.exedescription pid process target process PID 1104 wrote to memory of 908 1104 rundll32.exe rundll32.exe PID 1104 wrote to memory of 908 1104 rundll32.exe rundll32.exe PID 1104 wrote to memory of 908 1104 rundll32.exe rundll32.exe PID 1104 wrote to memory of 908 1104 rundll32.exe rundll32.exe PID 1104 wrote to memory of 908 1104 rundll32.exe rundll32.exe PID 1104 wrote to memory of 908 1104 rundll32.exe rundll32.exe PID 1104 wrote to memory of 908 1104 rundll32.exe rundll32.exe PID 908 wrote to memory of 1724 908 rundll32.exe mssecsvc.exe PID 908 wrote to memory of 1724 908 rundll32.exe mssecsvc.exe PID 908 wrote to memory of 1724 908 rundll32.exe mssecsvc.exe PID 908 wrote to memory of 1724 908 rundll32.exe mssecsvc.exe
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\9bc1f89ad6c328ff37f3444407207067.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1104 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\9bc1f89ad6c328ff37f3444407207067.dll,#12⤵
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:908 -
C:\WINDOWS\mssecsvc.exeC:\WINDOWS\mssecsvc.exe3⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:1724 -
C:\WINDOWS\tasksche.exeC:\WINDOWS\tasksche.exe /i4⤵
- Executes dropped EXE
PID:112
-
C:\WINDOWS\mssecsvc.exeC:\WINDOWS\mssecsvc.exe -m security1⤵
- Executes dropped EXE
- Drops file in System32 directory
- Modifies data under HKEY_USERS
PID:1884
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3.6MB
MD5fabbc72c5570be4d9b6e910042ae6e90
SHA10be19bbb76a53f4003a1b3f38d67af5f09afa210
SHA256665a4bfd28bf07f72f3d9b384933d300d4580f6c2adf0d600615a8e453b42490
SHA512585e31a7bcbb2f663d6f5cdb9402f36a635ee6487c81b92f5c17ba80d11a16fca6fdefdd788bdaa99257ac5e3566942a396c768d01790126a326d00e3ef68702
-
Filesize
3.6MB
MD5fabbc72c5570be4d9b6e910042ae6e90
SHA10be19bbb76a53f4003a1b3f38d67af5f09afa210
SHA256665a4bfd28bf07f72f3d9b384933d300d4580f6c2adf0d600615a8e453b42490
SHA512585e31a7bcbb2f663d6f5cdb9402f36a635ee6487c81b92f5c17ba80d11a16fca6fdefdd788bdaa99257ac5e3566942a396c768d01790126a326d00e3ef68702
-
Filesize
3.6MB
MD5fabbc72c5570be4d9b6e910042ae6e90
SHA10be19bbb76a53f4003a1b3f38d67af5f09afa210
SHA256665a4bfd28bf07f72f3d9b384933d300d4580f6c2adf0d600615a8e453b42490
SHA512585e31a7bcbb2f663d6f5cdb9402f36a635ee6487c81b92f5c17ba80d11a16fca6fdefdd788bdaa99257ac5e3566942a396c768d01790126a326d00e3ef68702
-
Filesize
3.4MB
MD57b003422c990b49d3b987b185c9c58a4
SHA1237d9bb8c93e75f27acca0b4841932610c8c7ba0
SHA2560109795d637bb00f1c4934f68e82d2cd867d9c96bd7412b47c849be286983e99
SHA5123d60a4a88ab30c837ef529a2889e04a552598e4a4d4fcf4a824343718a5eef190c924fc1a7551ac407ef72487876e4c0210900e2a3f923233318e6b9f606994a