Analysis

  • max time kernel
    151s
  • max time network
    155s
  • platform
    windows7_x64
  • resource
    win7-20220715-en
  • resource tags

    arch:x64arch:x86image:win7-20220715-enlocale:en-usos:windows7-x64system
  • submitted
    20-07-2022 01:57

General

  • Target

    d253b19d8c2e2b0fa2e87282f575c490.dll

  • Size

    5.0MB

  • MD5

    d253b19d8c2e2b0fa2e87282f575c490

  • SHA1

    ab6f0d00f151c548e1f9c1943ed3a36a13db3b6a

  • SHA256

    897768acb54fb896fcf43548494fc7dd637e1ecc062d9b313b8a3bf9fb947535

  • SHA512

    40753dc9b8e1dc3ab2f8fd303ae159b9a2d87407d0c41d9438ae2660dfdb1335fe9967be683661ae6a7cb89cb8cefc2d48eb0929f863dd66cac323c36f238bf3

Malware Config

Signatures

  • Wannacry

    WannaCry is a ransomware cryptoworm.

  • Contacts a large (961) amount of remote hosts 1 TTPs

    This may indicate a network scan to discover remotely running services.

  • Executes dropped EXE 3 IoCs
  • Drops file in System32 directory 1 IoCs
  • Drops file in Windows directory 2 IoCs
  • Modifies data under HKEY_USERS 24 IoCs
  • Suspicious use of WriteProcessMemory 11 IoCs

Processes

  • C:\Windows\system32\rundll32.exe
    rundll32.exe C:\Users\Admin\AppData\Local\Temp\d253b19d8c2e2b0fa2e87282f575c490.dll,#1
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:576
    • C:\Windows\SysWOW64\rundll32.exe
      rundll32.exe C:\Users\Admin\AppData\Local\Temp\d253b19d8c2e2b0fa2e87282f575c490.dll,#1
      2⤵
      • Drops file in Windows directory
      • Suspicious use of WriteProcessMemory
      PID:1972
      • C:\WINDOWS\mssecsvc.exe
        C:\WINDOWS\mssecsvc.exe
        3⤵
        • Executes dropped EXE
        • Drops file in Windows directory
        PID:1976
        • C:\WINDOWS\tasksche.exe
          C:\WINDOWS\tasksche.exe /i
          4⤵
          • Executes dropped EXE
          PID:2040
  • C:\WINDOWS\mssecsvc.exe
    C:\WINDOWS\mssecsvc.exe -m security
    1⤵
    • Executes dropped EXE
    • Drops file in System32 directory
    • Modifies data under HKEY_USERS
    PID:848

Network

MITRE ATT&CK Matrix ATT&CK v6

Discovery

Network Service Scanning

1
T1046

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\WINDOWS\mssecsvc.exe
    Filesize

    3.6MB

    MD5

    aca0183b65f707824451a26c2afabe8d

    SHA1

    8b82d48ca19323bdaf207806a2ddede1c8df22d9

    SHA256

    26a08e2883f14fc2e3c8ba2aed667f5d73407b181108d2bcea501206ef2b8e70

    SHA512

    6b01c5f5fce1b418029c2deaedd4f5ba10299272ad1b6beabd8bc8e044a10aa299dc7f8aa3cfd08a74421df94d524d9f795cabc4876506bae1f37194ea1f9153

  • C:\Windows\mssecsvc.exe
    Filesize

    3.6MB

    MD5

    aca0183b65f707824451a26c2afabe8d

    SHA1

    8b82d48ca19323bdaf207806a2ddede1c8df22d9

    SHA256

    26a08e2883f14fc2e3c8ba2aed667f5d73407b181108d2bcea501206ef2b8e70

    SHA512

    6b01c5f5fce1b418029c2deaedd4f5ba10299272ad1b6beabd8bc8e044a10aa299dc7f8aa3cfd08a74421df94d524d9f795cabc4876506bae1f37194ea1f9153

  • C:\Windows\mssecsvc.exe
    Filesize

    3.6MB

    MD5

    aca0183b65f707824451a26c2afabe8d

    SHA1

    8b82d48ca19323bdaf207806a2ddede1c8df22d9

    SHA256

    26a08e2883f14fc2e3c8ba2aed667f5d73407b181108d2bcea501206ef2b8e70

    SHA512

    6b01c5f5fce1b418029c2deaedd4f5ba10299272ad1b6beabd8bc8e044a10aa299dc7f8aa3cfd08a74421df94d524d9f795cabc4876506bae1f37194ea1f9153

  • C:\Windows\tasksche.exe
    Filesize

    3.4MB

    MD5

    b28af569881d85a183a91438bc35abb1

    SHA1

    857e19e8f2f9dd6c3a43f2defcf214fe116affca

    SHA256

    837aa77b122962862d55e37c10f1544db08aaaf095d877e6265d7025334343b5

    SHA512

    59614eba8868c06c159537bf594af154b56bb0f2f0c4ec09a104b5073526507e58836f3f16b454fa95327983359baf7e2f02ede4c597ab412be18dc574d26ec5

  • memory/1972-54-0x0000000000000000-mapping.dmp
  • memory/1972-55-0x0000000076631000-0x0000000076633000-memory.dmp
    Filesize

    8KB

  • memory/1976-56-0x0000000000000000-mapping.dmp