Analysis
-
max time kernel
150s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20220718-en -
resource tags
arch:x64arch:x86image:win10v2004-20220718-enlocale:en-usos:windows10-2004-x64system -
submitted
20-07-2022 02:00
Static task
static1
Behavioral task
behavioral1
Sample
d8b98dc9e3c6dab04b2abb1224335ac3.dll
Resource
win7-20220715-en
Behavioral task
behavioral2
Sample
d8b98dc9e3c6dab04b2abb1224335ac3.dll
Resource
win10v2004-20220718-en
General
-
Target
d8b98dc9e3c6dab04b2abb1224335ac3.dll
-
Size
5.0MB
-
MD5
d8b98dc9e3c6dab04b2abb1224335ac3
-
SHA1
9528b4df7d60103b82edf207ba6533b641d8b354
-
SHA256
932e30b225064e714d489eb2dc8b9fabc78f6f18858afdc34cb55174b128b013
-
SHA512
28f8669c8ad1b805f4ff5bed7564a4353f160bae8c7b3b2924cebf91073aefa1a4c2ea7e8bb7282b14dd7572e0f596675885611d97cbf420ff30cdc2855c9fce
Malware Config
Signatures
-
Wannacry
WannaCry is a ransomware cryptoworm.
-
Contacts a large (3223) amount of remote hosts 1 TTPs
This may indicate a network scan to discover remotely running services.
-
Executes dropped EXE 3 IoCs
Processes:
mssecsvc.exemssecsvc.exetasksche.exepid process 2700 mssecsvc.exe 720 mssecsvc.exe 860 tasksche.exe -
Creates a large amount of network flows 1 TTPs
This may indicate a network scan to discover remotely running services.
-
Drops file in Windows directory 2 IoCs
Processes:
rundll32.exemssecsvc.exedescription ioc process File created C:\WINDOWS\mssecsvc.exe rundll32.exe File created C:\WINDOWS\tasksche.exe mssecsvc.exe -
Modifies data under HKEY_USERS 5 IoCs
Processes:
mssecsvc.exedescription ioc process Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ mssecsvc.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ProxyBypass = "1" mssecsvc.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\IntranetName = "1" mssecsvc.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\UNCAsIntranet = "1" mssecsvc.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\AutoDetect = "0" mssecsvc.exe -
Suspicious use of WriteProcessMemory 6 IoCs
Processes:
rundll32.exerundll32.exedescription pid process target process PID 3224 wrote to memory of 3756 3224 rundll32.exe rundll32.exe PID 3224 wrote to memory of 3756 3224 rundll32.exe rundll32.exe PID 3224 wrote to memory of 3756 3224 rundll32.exe rundll32.exe PID 3756 wrote to memory of 2700 3756 rundll32.exe mssecsvc.exe PID 3756 wrote to memory of 2700 3756 rundll32.exe mssecsvc.exe PID 3756 wrote to memory of 2700 3756 rundll32.exe mssecsvc.exe
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\d8b98dc9e3c6dab04b2abb1224335ac3.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:3224 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\d8b98dc9e3c6dab04b2abb1224335ac3.dll,#12⤵
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:3756 -
C:\WINDOWS\mssecsvc.exeC:\WINDOWS\mssecsvc.exe3⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:2700 -
C:\WINDOWS\tasksche.exeC:\WINDOWS\tasksche.exe /i4⤵
- Executes dropped EXE
PID:860
-
C:\WINDOWS\mssecsvc.exeC:\WINDOWS\mssecsvc.exe -m security1⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
PID:720
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3.6MB
MD515f66142f92f4bca012956eba0ffca26
SHA19f16128023383556df744c60bb545244a4f74800
SHA25670e32c1c00911fc5b727eb222af659cb0d0065fdc888cd3ff5c30d88cb09e5f3
SHA512a75b29a2824c3dfb76984590f3e3036ab1f31f86d1ec136f46d3f0c1deb750d48395e65c390066ef3b2b8f52feeac1b87928195d23f3ce6d5b954bccd29d86d7
-
Filesize
3.6MB
MD515f66142f92f4bca012956eba0ffca26
SHA19f16128023383556df744c60bb545244a4f74800
SHA25670e32c1c00911fc5b727eb222af659cb0d0065fdc888cd3ff5c30d88cb09e5f3
SHA512a75b29a2824c3dfb76984590f3e3036ab1f31f86d1ec136f46d3f0c1deb750d48395e65c390066ef3b2b8f52feeac1b87928195d23f3ce6d5b954bccd29d86d7
-
Filesize
3.6MB
MD515f66142f92f4bca012956eba0ffca26
SHA19f16128023383556df744c60bb545244a4f74800
SHA25670e32c1c00911fc5b727eb222af659cb0d0065fdc888cd3ff5c30d88cb09e5f3
SHA512a75b29a2824c3dfb76984590f3e3036ab1f31f86d1ec136f46d3f0c1deb750d48395e65c390066ef3b2b8f52feeac1b87928195d23f3ce6d5b954bccd29d86d7
-
Filesize
3.4MB
MD50f43e29d5ea349a59b7209cc96e4dc10
SHA1ceda6aef56055f5284c726985f07793542ceaa15
SHA2566f5de686ba908b8353ef520499ffd3fe4937e4ea10194c6e4aa3a078b02d7f99
SHA51248f69a1991edd46429f8f939c974e0fdc9368ec165a60ac8267d17309003ab7afa008a9f68205c55ee84625b1d644692329a0e8f86e54ccc4309101da6922018