Analysis
-
max time kernel
158s -
max time network
163s -
platform
windows10-2004_x64 -
resource
win10v2004-20220718-en -
resource tags
arch:x64arch:x86image:win10v2004-20220718-enlocale:en-usos:windows10-2004-x64system -
submitted
20-07-2022 02:01
Static task
static1
Behavioral task
behavioral1
Sample
312e655bf17828aa2d3396a43ea55b95.dll
Resource
win7-20220718-en
Behavioral task
behavioral2
Sample
312e655bf17828aa2d3396a43ea55b95.dll
Resource
win10v2004-20220718-en
General
-
Target
312e655bf17828aa2d3396a43ea55b95.dll
-
Size
5.0MB
-
MD5
312e655bf17828aa2d3396a43ea55b95
-
SHA1
94808b61d30df657eabe61c25bf867c1d0d2bf5d
-
SHA256
d0c7fb36a75c0b56a8837e4e2715c515e696a91d05fbb248f818dbd87714b0bd
-
SHA512
3a34f2177fc77bd331a69b373c36ecd2adef2bf5601552b19693b79a76496d678d5983947057ff9790e7eca387d9e81d26dfdaa666f10c4afee1d529767fd35f
Malware Config
Signatures
-
Wannacry
WannaCry is a ransomware cryptoworm.
-
Contacts a large (3133) amount of remote hosts 1 TTPs
This may indicate a network scan to discover remotely running services.
-
Executes dropped EXE 3 IoCs
Processes:
mssecsvc.exemssecsvc.exetasksche.exepid process 5056 mssecsvc.exe 1944 mssecsvc.exe 3224 tasksche.exe -
Creates a large amount of network flows 1 TTPs
This may indicate a network scan to discover remotely running services.
-
Drops file in Windows directory 2 IoCs
Processes:
rundll32.exemssecsvc.exedescription ioc process File created C:\WINDOWS\mssecsvc.exe rundll32.exe File created C:\WINDOWS\tasksche.exe mssecsvc.exe -
Modifies data under HKEY_USERS 5 IoCs
Processes:
mssecsvc.exedescription ioc process Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\IntranetName = "1" mssecsvc.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\UNCAsIntranet = "1" mssecsvc.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\AutoDetect = "0" mssecsvc.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ mssecsvc.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ProxyBypass = "1" mssecsvc.exe -
Suspicious use of WriteProcessMemory 6 IoCs
Processes:
rundll32.exerundll32.exedescription pid process target process PID 3348 wrote to memory of 4276 3348 rundll32.exe rundll32.exe PID 3348 wrote to memory of 4276 3348 rundll32.exe rundll32.exe PID 3348 wrote to memory of 4276 3348 rundll32.exe rundll32.exe PID 4276 wrote to memory of 5056 4276 rundll32.exe mssecsvc.exe PID 4276 wrote to memory of 5056 4276 rundll32.exe mssecsvc.exe PID 4276 wrote to memory of 5056 4276 rundll32.exe mssecsvc.exe
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\312e655bf17828aa2d3396a43ea55b95.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:3348 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\312e655bf17828aa2d3396a43ea55b95.dll,#12⤵
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:4276 -
C:\WINDOWS\mssecsvc.exeC:\WINDOWS\mssecsvc.exe3⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:5056 -
C:\WINDOWS\tasksche.exeC:\WINDOWS\tasksche.exe /i4⤵
- Executes dropped EXE
PID:3224
-
C:\WINDOWS\mssecsvc.exeC:\WINDOWS\mssecsvc.exe -m security1⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
PID:1944
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3.6MB
MD5a1d120551b04544acc640021d3f062b7
SHA15669a2cc6109f749483bd414b92adf58f236ab69
SHA256317dad1d61275adb5fde24884f92bb299afee7c5dce8ebc3f866a039d22dd6b9
SHA512539d8cce752abfea2e4449e4c4e0318be164e0da0d0a6b9d1f5315f107872bec6956104bdb8d52fce4104c532829ed65ab92655d2f5d02cbe86fabbea713d82d
-
Filesize
3.6MB
MD5a1d120551b04544acc640021d3f062b7
SHA15669a2cc6109f749483bd414b92adf58f236ab69
SHA256317dad1d61275adb5fde24884f92bb299afee7c5dce8ebc3f866a039d22dd6b9
SHA512539d8cce752abfea2e4449e4c4e0318be164e0da0d0a6b9d1f5315f107872bec6956104bdb8d52fce4104c532829ed65ab92655d2f5d02cbe86fabbea713d82d
-
Filesize
3.6MB
MD5a1d120551b04544acc640021d3f062b7
SHA15669a2cc6109f749483bd414b92adf58f236ab69
SHA256317dad1d61275adb5fde24884f92bb299afee7c5dce8ebc3f866a039d22dd6b9
SHA512539d8cce752abfea2e4449e4c4e0318be164e0da0d0a6b9d1f5315f107872bec6956104bdb8d52fce4104c532829ed65ab92655d2f5d02cbe86fabbea713d82d
-
Filesize
3.4MB
MD5715d386112c0ebc12ac2126185e8ad74
SHA1ace42345d013fdcc3b42863a051ed29bab027c50
SHA2560187b42e4c94f3ea96e2fbace4642e482daa517472df4a8ba48936c60e1a6f82
SHA5121db66863a75ecf903435277685493cf9fad062bbea5820df1f12e05869f5b21fc84baa8cfe9c85d4bf3268deec72dc76cf16850628674837f3c467903befdc2d