Analysis

  • max time kernel
    151s
  • max time network
    154s
  • platform
    windows7_x64
  • resource
    win7-20220718-en
  • resource tags

    arch:x64arch:x86image:win7-20220718-enlocale:en-usos:windows7-x64system
  • submitted
    20-07-2022 02:04

General

  • Target

    e24f7c037a4bf2fc4ef154e59ca96b37.dll

  • Size

    5.0MB

  • MD5

    e24f7c037a4bf2fc4ef154e59ca96b37

  • SHA1

    3a6bddd66150e2302ad1511015b5d1b65942349c

  • SHA256

    ec1b85a369cd54f82c38f06b9036b3907231d879343991557a0d1ac0c6e26a22

  • SHA512

    d03eafcf2d690bdfdf8bd05f5092d37d6c25065d98a07e3363010a6e102b6f0f808fe3ff3c9e6fc664266ac16275cd8b0cf591369adfb39cfa775c9c9e6e94a5

Malware Config

Signatures

  • Wannacry

    WannaCry is a ransomware cryptoworm.

  • Contacts a large (1257) amount of remote hosts 1 TTPs

    This may indicate a network scan to discover remotely running services.

  • Executes dropped EXE 3 IoCs
  • Drops file in System32 directory 1 IoCs
  • Drops file in Windows directory 4 IoCs
  • Modifies data under HKEY_USERS 24 IoCs
  • Suspicious use of WriteProcessMemory 18 IoCs

Processes

  • C:\Windows\system32\rundll32.exe
    rundll32.exe C:\Users\Admin\AppData\Local\Temp\e24f7c037a4bf2fc4ef154e59ca96b37.dll,#1
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1936
    • C:\Windows\SysWOW64\rundll32.exe
      rundll32.exe C:\Users\Admin\AppData\Local\Temp\e24f7c037a4bf2fc4ef154e59ca96b37.dll,#1
      2⤵
      • Drops file in Windows directory
      • Suspicious use of WriteProcessMemory
      PID:1780
      • C:\WINDOWS\mssecsvr.exe
        C:\WINDOWS\mssecsvr.exe
        3⤵
        • Executes dropped EXE
        • Drops file in Windows directory
        • Suspicious use of WriteProcessMemory
        PID:1632
        • C:\WINDOWS\tasksche.exe
          C:\WINDOWS\tasksche.exe /i
          4⤵
          • Executes dropped EXE
          • Drops file in Windows directory
          PID:1472
  • C:\WINDOWS\mssecsvr.exe
    C:\WINDOWS\mssecsvr.exe -m security
    1⤵
    • Executes dropped EXE
    • Drops file in System32 directory
    • Modifies data under HKEY_USERS
    PID:1284

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\WINDOWS\mssecsvr.exe

    Filesize

    2.2MB

    MD5

    487a62ac36581b4b80dc3b85ec0630ed

    SHA1

    6b1dbab7ab3dca9c4c1fd66c307a89ce2317123f

    SHA256

    1303b8c82866795b41c5552340f8a568d615817db94ad3b33401031b5cda902a

    SHA512

    f2023a672a09676fd24a1e8b3e581875c736a0066ed70e8dd8a83d56b4ef7e9401b16298ecf97425d85c67f8b987c3a2a3d30be8cbb702f0a9d47b44e17a2793

  • C:\WINDOWS\tasksche.exe

    Filesize

    2.0MB

    MD5

    e73f94dd7abced28e73c4e751619ccad

    SHA1

    c4731f1661f45aa608ab9409c23dc9a77f380c40

    SHA256

    e41e4ed3643e2951fa0cec1a359a97d09896a22e53198999042ab6546bf7d203

    SHA512

    b34b06fddb90fb6dc0bac66647dc09ae2384e8a96011f0fef1e2669c03e353d88454387feb685869d482fd632e17b6708168b9e6868fea7ba03a02e2f2ab6b1a

  • C:\Windows\mssecsvr.exe

    Filesize

    2.2MB

    MD5

    487a62ac36581b4b80dc3b85ec0630ed

    SHA1

    6b1dbab7ab3dca9c4c1fd66c307a89ce2317123f

    SHA256

    1303b8c82866795b41c5552340f8a568d615817db94ad3b33401031b5cda902a

    SHA512

    f2023a672a09676fd24a1e8b3e581875c736a0066ed70e8dd8a83d56b4ef7e9401b16298ecf97425d85c67f8b987c3a2a3d30be8cbb702f0a9d47b44e17a2793

  • C:\Windows\mssecsvr.exe

    Filesize

    2.2MB

    MD5

    487a62ac36581b4b80dc3b85ec0630ed

    SHA1

    6b1dbab7ab3dca9c4c1fd66c307a89ce2317123f

    SHA256

    1303b8c82866795b41c5552340f8a568d615817db94ad3b33401031b5cda902a

    SHA512

    f2023a672a09676fd24a1e8b3e581875c736a0066ed70e8dd8a83d56b4ef7e9401b16298ecf97425d85c67f8b987c3a2a3d30be8cbb702f0a9d47b44e17a2793

  • C:\Windows\tasksche.exe

    Filesize

    2.0MB

    MD5

    e73f94dd7abced28e73c4e751619ccad

    SHA1

    c4731f1661f45aa608ab9409c23dc9a77f380c40

    SHA256

    e41e4ed3643e2951fa0cec1a359a97d09896a22e53198999042ab6546bf7d203

    SHA512

    b34b06fddb90fb6dc0bac66647dc09ae2384e8a96011f0fef1e2669c03e353d88454387feb685869d482fd632e17b6708168b9e6868fea7ba03a02e2f2ab6b1a

  • memory/1472-62-0x0000000000000000-mapping.dmp

  • memory/1632-56-0x0000000000000000-mapping.dmp

  • memory/1780-54-0x0000000000000000-mapping.dmp

  • memory/1780-55-0x00000000760F1000-0x00000000760F3000-memory.dmp

    Filesize

    8KB