Analysis
-
max time kernel
150s -
max time network
154s -
platform
windows7_x64 -
resource
win7-20220715-en -
resource tags
arch:x64arch:x86image:win7-20220715-enlocale:en-usos:windows7-x64system -
submitted
20-07-2022 02:02
Static task
static1
Behavioral task
behavioral1
Sample
886809697ae694d0d6806849caf0ff77.dll
Resource
win7-20220715-en
Behavioral task
behavioral2
Sample
886809697ae694d0d6806849caf0ff77.dll
Resource
win10v2004-20220718-en
General
-
Target
886809697ae694d0d6806849caf0ff77.dll
-
Size
5.0MB
-
MD5
886809697ae694d0d6806849caf0ff77
-
SHA1
43b8a5470b9f0faa2cb53ac01c2fca76d7d24197
-
SHA256
8180c3a1d85eb680ad72e37ab4cfd3e6a05989f79e4e90fcb667a2a0a6747f20
-
SHA512
8864d5a5417986c503aa0a75350331456c0304475279b9612ee3d554955ad12514d4a2bc69f068208d6f5a4965207a531c381f38842bbb624722e3b51d426115
Malware Config
Signatures
-
Wannacry
WannaCry is a ransomware cryptoworm.
-
Contacts a large (1004) amount of remote hosts 1 TTPs
This may indicate a network scan to discover remotely running services.
-
Executes dropped EXE 3 IoCs
Processes:
mssecsvc.exemssecsvc.exetasksche.exepid process 1704 mssecsvc.exe 1712 mssecsvc.exe 812 tasksche.exe -
Drops file in System32 directory 1 IoCs
Processes:
mssecsvc.exedescription ioc process File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\Temporary Internet Files\counters.dat mssecsvc.exe -
Drops file in Windows directory 2 IoCs
Processes:
rundll32.exemssecsvc.exedescription ioc process File created C:\WINDOWS\mssecsvc.exe rundll32.exe File created C:\WINDOWS\tasksche.exe mssecsvc.exe -
Modifies data under HKEY_USERS 24 IoCs
Processes:
mssecsvc.exedescription ioc process Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\DefaultConnectionSettings = 4600000003000000090000000000000000000000000000000400000000000000000000000000000000000000000000000000000001000000020000000a7f00f3000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 mssecsvc.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{F363206D-C89B-4C23-8337-A926BC36CB0D}\WpadDecisionTime = 30d003ccdc9bd801 mssecsvc.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{F363206D-C89B-4C23-8337-A926BC36CB0D}\WpadNetworkName = "Network 3" mssecsvc.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings mssecsvc.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\AutoDetect = "1" mssecsvc.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Content\CachePrefix mssecsvc.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Cookies\CachePrefix = "Cookie:" mssecsvc.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\History\CachePrefix = "Visited:" mssecsvc.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\36-ab-99-2e-89-9d mssecsvc.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{F363206D-C89B-4C23-8337-A926BC36CB0D}\36-ab-99-2e-89-9d mssecsvc.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\36-ab-99-2e-89-9d\WpadDecisionReason = "1" mssecsvc.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings mssecsvc.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ProxyEnable = "0" mssecsvc.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\UNCAsIntranet = "0" mssecsvc.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{F363206D-C89B-4C23-8337-A926BC36CB0D} mssecsvc.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections mssecsvc.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\DefaultConnectionSettings = 4600000002000000090000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 mssecsvc.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\SavedLegacySettings = 4600000002000000090000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 mssecsvc.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{F363206D-C89B-4C23-8337-A926BC36CB0D}\WpadDecisionReason = "1" mssecsvc.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{F363206D-C89B-4C23-8337-A926BC36CB0D}\WpadDecision = "0" mssecsvc.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ mssecsvc.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad mssecsvc.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\36-ab-99-2e-89-9d\WpadDecisionTime = 30d003ccdc9bd801 mssecsvc.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\36-ab-99-2e-89-9d\WpadDecision = "0" mssecsvc.exe -
Suspicious use of WriteProcessMemory 11 IoCs
Processes:
rundll32.exerundll32.exedescription pid process target process PID 1680 wrote to memory of 1964 1680 rundll32.exe rundll32.exe PID 1680 wrote to memory of 1964 1680 rundll32.exe rundll32.exe PID 1680 wrote to memory of 1964 1680 rundll32.exe rundll32.exe PID 1680 wrote to memory of 1964 1680 rundll32.exe rundll32.exe PID 1680 wrote to memory of 1964 1680 rundll32.exe rundll32.exe PID 1680 wrote to memory of 1964 1680 rundll32.exe rundll32.exe PID 1680 wrote to memory of 1964 1680 rundll32.exe rundll32.exe PID 1964 wrote to memory of 1704 1964 rundll32.exe mssecsvc.exe PID 1964 wrote to memory of 1704 1964 rundll32.exe mssecsvc.exe PID 1964 wrote to memory of 1704 1964 rundll32.exe mssecsvc.exe PID 1964 wrote to memory of 1704 1964 rundll32.exe mssecsvc.exe
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\886809697ae694d0d6806849caf0ff77.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1680 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\886809697ae694d0d6806849caf0ff77.dll,#12⤵
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:1964 -
C:\WINDOWS\mssecsvc.exeC:\WINDOWS\mssecsvc.exe3⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:1704 -
C:\WINDOWS\tasksche.exeC:\WINDOWS\tasksche.exe /i4⤵
- Executes dropped EXE
PID:812
-
C:\WINDOWS\mssecsvc.exeC:\WINDOWS\mssecsvc.exe -m security1⤵
- Executes dropped EXE
- Drops file in System32 directory
- Modifies data under HKEY_USERS
PID:1712
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3.6MB
MD5bfdfc78add532cfc5a9b745e932764e0
SHA164d785d026dc56b0dec2354876b516b63d0f8d24
SHA2566578b616f4ccc579e5a98e2004992dbc90ff604f9a02919fda214e6cedc890c2
SHA512f83aef15eb0727f62bac8488dcb456cd0113d470cf970074b63427e6df46440a331146a014808278c033bd147268a93856556833ed8e88a88436247f3c5b7bd4
-
Filesize
3.6MB
MD5bfdfc78add532cfc5a9b745e932764e0
SHA164d785d026dc56b0dec2354876b516b63d0f8d24
SHA2566578b616f4ccc579e5a98e2004992dbc90ff604f9a02919fda214e6cedc890c2
SHA512f83aef15eb0727f62bac8488dcb456cd0113d470cf970074b63427e6df46440a331146a014808278c033bd147268a93856556833ed8e88a88436247f3c5b7bd4
-
Filesize
3.6MB
MD5bfdfc78add532cfc5a9b745e932764e0
SHA164d785d026dc56b0dec2354876b516b63d0f8d24
SHA2566578b616f4ccc579e5a98e2004992dbc90ff604f9a02919fda214e6cedc890c2
SHA512f83aef15eb0727f62bac8488dcb456cd0113d470cf970074b63427e6df46440a331146a014808278c033bd147268a93856556833ed8e88a88436247f3c5b7bd4
-
Filesize
3.4MB
MD586284217d4ad63d8e8dc0f74b49ef906
SHA104832f2488b05b4d58697a30c60959103e8b93cf
SHA2566206c27b3bd0ada880b9b5dabcc45465ca84fe53d146486d785fb5e5a02943ca
SHA512df7003adcf0ff971cd4d3a336dae651fc341486246da29c9f5e60759c9ac15d6bf0d959c122ed7ad3d613f07f0454ebf63a5af9fce5604e0188fe71db6b3d2db