Analysis
-
max time kernel
150s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20220718-en -
resource tags
arch:x64arch:x86image:win10v2004-20220718-enlocale:en-usos:windows10-2004-x64system -
submitted
20-07-2022 02:02
Static task
static1
Behavioral task
behavioral1
Sample
886809697ae694d0d6806849caf0ff77.dll
Resource
win7-20220715-en
Behavioral task
behavioral2
Sample
886809697ae694d0d6806849caf0ff77.dll
Resource
win10v2004-20220718-en
General
-
Target
886809697ae694d0d6806849caf0ff77.dll
-
Size
5.0MB
-
MD5
886809697ae694d0d6806849caf0ff77
-
SHA1
43b8a5470b9f0faa2cb53ac01c2fca76d7d24197
-
SHA256
8180c3a1d85eb680ad72e37ab4cfd3e6a05989f79e4e90fcb667a2a0a6747f20
-
SHA512
8864d5a5417986c503aa0a75350331456c0304475279b9612ee3d554955ad12514d4a2bc69f068208d6f5a4965207a531c381f38842bbb624722e3b51d426115
Malware Config
Signatures
-
Wannacry
WannaCry is a ransomware cryptoworm.
-
Contacts a large (3338) amount of remote hosts 1 TTPs
This may indicate a network scan to discover remotely running services.
-
Executes dropped EXE 3 IoCs
Processes:
mssecsvc.exemssecsvc.exetasksche.exepid process 1200 mssecsvc.exe 2352 mssecsvc.exe 3144 tasksche.exe -
Creates a large amount of network flows 1 TTPs
This may indicate a network scan to discover remotely running services.
-
Drops file in Windows directory 2 IoCs
Processes:
rundll32.exemssecsvc.exedescription ioc process File created C:\WINDOWS\mssecsvc.exe rundll32.exe File created C:\WINDOWS\tasksche.exe mssecsvc.exe -
Modifies data under HKEY_USERS 5 IoCs
Processes:
mssecsvc.exedescription ioc process Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ mssecsvc.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ProxyBypass = "1" mssecsvc.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\IntranetName = "1" mssecsvc.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\UNCAsIntranet = "1" mssecsvc.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\AutoDetect = "0" mssecsvc.exe -
Suspicious use of WriteProcessMemory 6 IoCs
Processes:
rundll32.exerundll32.exedescription pid process target process PID 5112 wrote to memory of 1876 5112 rundll32.exe rundll32.exe PID 5112 wrote to memory of 1876 5112 rundll32.exe rundll32.exe PID 5112 wrote to memory of 1876 5112 rundll32.exe rundll32.exe PID 1876 wrote to memory of 1200 1876 rundll32.exe mssecsvc.exe PID 1876 wrote to memory of 1200 1876 rundll32.exe mssecsvc.exe PID 1876 wrote to memory of 1200 1876 rundll32.exe mssecsvc.exe
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\886809697ae694d0d6806849caf0ff77.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:5112 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\886809697ae694d0d6806849caf0ff77.dll,#12⤵
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:1876 -
C:\WINDOWS\mssecsvc.exeC:\WINDOWS\mssecsvc.exe3⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:1200 -
C:\WINDOWS\tasksche.exeC:\WINDOWS\tasksche.exe /i4⤵
- Executes dropped EXE
PID:3144
-
C:\WINDOWS\mssecsvc.exeC:\WINDOWS\mssecsvc.exe -m security1⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
PID:2352
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3.6MB
MD5bfdfc78add532cfc5a9b745e932764e0
SHA164d785d026dc56b0dec2354876b516b63d0f8d24
SHA2566578b616f4ccc579e5a98e2004992dbc90ff604f9a02919fda214e6cedc890c2
SHA512f83aef15eb0727f62bac8488dcb456cd0113d470cf970074b63427e6df46440a331146a014808278c033bd147268a93856556833ed8e88a88436247f3c5b7bd4
-
Filesize
3.6MB
MD5bfdfc78add532cfc5a9b745e932764e0
SHA164d785d026dc56b0dec2354876b516b63d0f8d24
SHA2566578b616f4ccc579e5a98e2004992dbc90ff604f9a02919fda214e6cedc890c2
SHA512f83aef15eb0727f62bac8488dcb456cd0113d470cf970074b63427e6df46440a331146a014808278c033bd147268a93856556833ed8e88a88436247f3c5b7bd4
-
Filesize
3.6MB
MD5bfdfc78add532cfc5a9b745e932764e0
SHA164d785d026dc56b0dec2354876b516b63d0f8d24
SHA2566578b616f4ccc579e5a98e2004992dbc90ff604f9a02919fda214e6cedc890c2
SHA512f83aef15eb0727f62bac8488dcb456cd0113d470cf970074b63427e6df46440a331146a014808278c033bd147268a93856556833ed8e88a88436247f3c5b7bd4
-
Filesize
3.4MB
MD586284217d4ad63d8e8dc0f74b49ef906
SHA104832f2488b05b4d58697a30c60959103e8b93cf
SHA2566206c27b3bd0ada880b9b5dabcc45465ca84fe53d146486d785fb5e5a02943ca
SHA512df7003adcf0ff971cd4d3a336dae651fc341486246da29c9f5e60759c9ac15d6bf0d959c122ed7ad3d613f07f0454ebf63a5af9fce5604e0188fe71db6b3d2db