Analysis
-
max time kernel
153s -
max time network
157s -
platform
windows7_x64 -
resource
win7-20220718-en -
resource tags
arch:x64arch:x86image:win7-20220718-enlocale:en-usos:windows7-x64system -
submitted
20-07-2022 01:59
Static task
static1
Behavioral task
behavioral1
Sample
300115bd5e54c0a87901db6a4038a58c.dll
Resource
win7-20220718-en
Behavioral task
behavioral2
Sample
300115bd5e54c0a87901db6a4038a58c.dll
Resource
win10v2004-20220718-en
General
-
Target
300115bd5e54c0a87901db6a4038a58c.dll
-
Size
5.0MB
-
MD5
300115bd5e54c0a87901db6a4038a58c
-
SHA1
a942fae44d690941920a7534fdfbe22c544f0e5d
-
SHA256
47207e889ebb324db2a2ce8bc1f5110b9d24ad55fdcf90636fe96b3fe4763839
-
SHA512
1b78b7985e43eb375e82d28ce2f9f36cf23a2fd9e041908c38fd1dc0f737fcf7845efa708c5125e1e977863edf52978a73e2b7ea22363ba8848d4464566f3294
Malware Config
Signatures
-
Wannacry
WannaCry is a ransomware cryptoworm.
-
Contacts a large (1264) amount of remote hosts 1 TTPs
This may indicate a network scan to discover remotely running services.
-
Executes dropped EXE 3 IoCs
Processes:
mssecsvc.exemssecsvc.exetasksche.exepid process 1948 mssecsvc.exe 1160 mssecsvc.exe 440 tasksche.exe -
Drops file in System32 directory 1 IoCs
Processes:
mssecsvc.exedescription ioc process File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\Temporary Internet Files\counters.dat mssecsvc.exe -
Drops file in Windows directory 2 IoCs
Processes:
mssecsvc.exerundll32.exedescription ioc process File created C:\WINDOWS\tasksche.exe mssecsvc.exe File created C:\WINDOWS\mssecsvc.exe rundll32.exe -
Modifies data under HKEY_USERS 24 IoCs
Processes:
mssecsvc.exedescription ioc process Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ mssecsvc.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\UNCAsIntranet = "0" mssecsvc.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Content\CachePrefix mssecsvc.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad mssecsvc.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\DefaultConnectionSettings = 4600000003000000090000000000000000000000000000000400000000000000000000000000000000000000000000000000000001000000020000000a7f00c6000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 mssecsvc.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{BA314A74-9E6D-4B7F-819C-5C72B3897A3C} mssecsvc.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{BA314A74-9E6D-4B7F-819C-5C72B3897A3C}\WpadDecision = "0" mssecsvc.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings mssecsvc.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\06-43-97-aa-b4-6e\WpadDecision = "0" mssecsvc.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\06-43-97-aa-b4-6e\WpadDecisionTime = a0d7271bed9bd801 mssecsvc.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Cookies\CachePrefix = "Cookie:" mssecsvc.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings mssecsvc.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\DefaultConnectionSettings = 4600000002000000090000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 mssecsvc.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{BA314A74-9E6D-4B7F-819C-5C72B3897A3C}\WpadDecisionReason = "1" mssecsvc.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{BA314A74-9E6D-4B7F-819C-5C72B3897A3C}\WpadNetworkName = "Network 3" mssecsvc.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections mssecsvc.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\SavedLegacySettings = 4600000002000000090000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 mssecsvc.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\AutoDetect = "1" mssecsvc.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\History\CachePrefix = "Visited:" mssecsvc.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{BA314A74-9E6D-4B7F-819C-5C72B3897A3C}\WpadDecisionTime = a0d7271bed9bd801 mssecsvc.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\06-43-97-aa-b4-6e mssecsvc.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{BA314A74-9E6D-4B7F-819C-5C72B3897A3C}\06-43-97-aa-b4-6e mssecsvc.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\06-43-97-aa-b4-6e\WpadDecisionReason = "1" mssecsvc.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ProxyEnable = "0" mssecsvc.exe -
Suspicious use of WriteProcessMemory 11 IoCs
Processes:
rundll32.exerundll32.exedescription pid process target process PID 2032 wrote to memory of 1744 2032 rundll32.exe rundll32.exe PID 2032 wrote to memory of 1744 2032 rundll32.exe rundll32.exe PID 2032 wrote to memory of 1744 2032 rundll32.exe rundll32.exe PID 2032 wrote to memory of 1744 2032 rundll32.exe rundll32.exe PID 2032 wrote to memory of 1744 2032 rundll32.exe rundll32.exe PID 2032 wrote to memory of 1744 2032 rundll32.exe rundll32.exe PID 2032 wrote to memory of 1744 2032 rundll32.exe rundll32.exe PID 1744 wrote to memory of 1948 1744 rundll32.exe mssecsvc.exe PID 1744 wrote to memory of 1948 1744 rundll32.exe mssecsvc.exe PID 1744 wrote to memory of 1948 1744 rundll32.exe mssecsvc.exe PID 1744 wrote to memory of 1948 1744 rundll32.exe mssecsvc.exe
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\300115bd5e54c0a87901db6a4038a58c.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:2032 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\300115bd5e54c0a87901db6a4038a58c.dll,#12⤵
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:1744 -
C:\WINDOWS\mssecsvc.exeC:\WINDOWS\mssecsvc.exe3⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:1948 -
C:\WINDOWS\tasksche.exeC:\WINDOWS\tasksche.exe /i4⤵
- Executes dropped EXE
PID:440
-
C:\WINDOWS\mssecsvc.exeC:\WINDOWS\mssecsvc.exe -m security1⤵
- Executes dropped EXE
- Drops file in System32 directory
- Modifies data under HKEY_USERS
PID:1160
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3.6MB
MD558cf59fd6b0c8d3733fb00489ae5f324
SHA1b44d38275719bd70389298b1581497803760109f
SHA2564510acfb2cdd6eab0faf1a337c96fb0231f531dd8b00612e97211c63ab647918
SHA512a239ce26282355cd93fb8ff7deb8dcfdf2678f7c4455836f422dfc116c1502c554c0e939b0ef9b8f82da8465a9cf1050b57217a6c51722c86e3779e4f087d20c
-
Filesize
3.6MB
MD558cf59fd6b0c8d3733fb00489ae5f324
SHA1b44d38275719bd70389298b1581497803760109f
SHA2564510acfb2cdd6eab0faf1a337c96fb0231f531dd8b00612e97211c63ab647918
SHA512a239ce26282355cd93fb8ff7deb8dcfdf2678f7c4455836f422dfc116c1502c554c0e939b0ef9b8f82da8465a9cf1050b57217a6c51722c86e3779e4f087d20c
-
Filesize
3.6MB
MD558cf59fd6b0c8d3733fb00489ae5f324
SHA1b44d38275719bd70389298b1581497803760109f
SHA2564510acfb2cdd6eab0faf1a337c96fb0231f531dd8b00612e97211c63ab647918
SHA512a239ce26282355cd93fb8ff7deb8dcfdf2678f7c4455836f422dfc116c1502c554c0e939b0ef9b8f82da8465a9cf1050b57217a6c51722c86e3779e4f087d20c
-
Filesize
3.4MB
MD51ee11f8b7f540bb4eb15f68940c14118
SHA1d3beb738f25428ff35e26ec12259ef5eaa1b89ac
SHA256356cdece8f3c4be17f5451fd4728c23a5db3e800c87b26c839e0141412891dbb
SHA512008521af0174182805f042cc90417d7500a5cbbb229f013b64a06fefa46052570e01bf035748f333dddc5137a7cfaa5aaccafa8b6211ea19e262c45bbaf87574