Analysis
-
max time kernel
149s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20220718-en -
resource tags
arch:x64arch:x86image:win10v2004-20220718-enlocale:en-usos:windows10-2004-x64system -
submitted
20-07-2022 01:59
Static task
static1
Behavioral task
behavioral1
Sample
300115bd5e54c0a87901db6a4038a58c.dll
Resource
win7-20220718-en
Behavioral task
behavioral2
Sample
300115bd5e54c0a87901db6a4038a58c.dll
Resource
win10v2004-20220718-en
General
-
Target
300115bd5e54c0a87901db6a4038a58c.dll
-
Size
5.0MB
-
MD5
300115bd5e54c0a87901db6a4038a58c
-
SHA1
a942fae44d690941920a7534fdfbe22c544f0e5d
-
SHA256
47207e889ebb324db2a2ce8bc1f5110b9d24ad55fdcf90636fe96b3fe4763839
-
SHA512
1b78b7985e43eb375e82d28ce2f9f36cf23a2fd9e041908c38fd1dc0f737fcf7845efa708c5125e1e977863edf52978a73e2b7ea22363ba8848d4464566f3294
Malware Config
Signatures
-
Wannacry
WannaCry is a ransomware cryptoworm.
-
Contacts a large (3270) amount of remote hosts 1 TTPs
This may indicate a network scan to discover remotely running services.
-
Executes dropped EXE 3 IoCs
Processes:
mssecsvc.exemssecsvc.exetasksche.exepid process 992 mssecsvc.exe 2732 mssecsvc.exe 3212 tasksche.exe -
Creates a large amount of network flows 1 TTPs
This may indicate a network scan to discover remotely running services.
-
Drops file in Windows directory 2 IoCs
Processes:
rundll32.exemssecsvc.exedescription ioc process File created C:\WINDOWS\mssecsvc.exe rundll32.exe File created C:\WINDOWS\tasksche.exe mssecsvc.exe -
Modifies data under HKEY_USERS 5 IoCs
Processes:
mssecsvc.exedescription ioc process Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ mssecsvc.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ProxyBypass = "1" mssecsvc.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\IntranetName = "1" mssecsvc.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\UNCAsIntranet = "1" mssecsvc.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\AutoDetect = "0" mssecsvc.exe -
Suspicious use of WriteProcessMemory 6 IoCs
Processes:
rundll32.exerundll32.exedescription pid process target process PID 5100 wrote to memory of 1032 5100 rundll32.exe rundll32.exe PID 5100 wrote to memory of 1032 5100 rundll32.exe rundll32.exe PID 5100 wrote to memory of 1032 5100 rundll32.exe rundll32.exe PID 1032 wrote to memory of 992 1032 rundll32.exe mssecsvc.exe PID 1032 wrote to memory of 992 1032 rundll32.exe mssecsvc.exe PID 1032 wrote to memory of 992 1032 rundll32.exe mssecsvc.exe
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\300115bd5e54c0a87901db6a4038a58c.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:5100 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\300115bd5e54c0a87901db6a4038a58c.dll,#12⤵
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:1032 -
C:\WINDOWS\mssecsvc.exeC:\WINDOWS\mssecsvc.exe3⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:992 -
C:\WINDOWS\tasksche.exeC:\WINDOWS\tasksche.exe /i4⤵
- Executes dropped EXE
PID:3212
-
C:\WINDOWS\mssecsvc.exeC:\WINDOWS\mssecsvc.exe -m security1⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
PID:2732
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3.6MB
MD558cf59fd6b0c8d3733fb00489ae5f324
SHA1b44d38275719bd70389298b1581497803760109f
SHA2564510acfb2cdd6eab0faf1a337c96fb0231f531dd8b00612e97211c63ab647918
SHA512a239ce26282355cd93fb8ff7deb8dcfdf2678f7c4455836f422dfc116c1502c554c0e939b0ef9b8f82da8465a9cf1050b57217a6c51722c86e3779e4f087d20c
-
Filesize
3.6MB
MD558cf59fd6b0c8d3733fb00489ae5f324
SHA1b44d38275719bd70389298b1581497803760109f
SHA2564510acfb2cdd6eab0faf1a337c96fb0231f531dd8b00612e97211c63ab647918
SHA512a239ce26282355cd93fb8ff7deb8dcfdf2678f7c4455836f422dfc116c1502c554c0e939b0ef9b8f82da8465a9cf1050b57217a6c51722c86e3779e4f087d20c
-
Filesize
3.6MB
MD558cf59fd6b0c8d3733fb00489ae5f324
SHA1b44d38275719bd70389298b1581497803760109f
SHA2564510acfb2cdd6eab0faf1a337c96fb0231f531dd8b00612e97211c63ab647918
SHA512a239ce26282355cd93fb8ff7deb8dcfdf2678f7c4455836f422dfc116c1502c554c0e939b0ef9b8f82da8465a9cf1050b57217a6c51722c86e3779e4f087d20c
-
Filesize
3.4MB
MD51ee11f8b7f540bb4eb15f68940c14118
SHA1d3beb738f25428ff35e26ec12259ef5eaa1b89ac
SHA256356cdece8f3c4be17f5451fd4728c23a5db3e800c87b26c839e0141412891dbb
SHA512008521af0174182805f042cc90417d7500a5cbbb229f013b64a06fefa46052570e01bf035748f333dddc5137a7cfaa5aaccafa8b6211ea19e262c45bbaf87574