Analysis
-
max time kernel
151s -
max time network
154s -
platform
windows7_x64 -
resource
win7-20220718-en -
resource tags
arch:x64arch:x86image:win7-20220718-enlocale:en-usos:windows7-x64system -
submitted
20-07-2022 02:04
Static task
static1
Behavioral task
behavioral1
Sample
e24f7c037a4bf2fc4ef154e59ca96b37.dll
Resource
win7-20220718-en
Behavioral task
behavioral2
Sample
e24f7c037a4bf2fc4ef154e59ca96b37.dll
Resource
win10v2004-20220718-en
General
-
Target
e24f7c037a4bf2fc4ef154e59ca96b37.dll
-
Size
5.0MB
-
MD5
e24f7c037a4bf2fc4ef154e59ca96b37
-
SHA1
3a6bddd66150e2302ad1511015b5d1b65942349c
-
SHA256
ec1b85a369cd54f82c38f06b9036b3907231d879343991557a0d1ac0c6e26a22
-
SHA512
d03eafcf2d690bdfdf8bd05f5092d37d6c25065d98a07e3363010a6e102b6f0f808fe3ff3c9e6fc664266ac16275cd8b0cf591369adfb39cfa775c9c9e6e94a5
Malware Config
Signatures
-
Wannacry
WannaCry is a ransomware cryptoworm.
-
Contacts a large (1257) amount of remote hosts 1 TTPs
This may indicate a network scan to discover remotely running services.
-
Executes dropped EXE 3 IoCs
Processes:
mssecsvr.exemssecsvr.exetasksche.exepid process 1632 mssecsvr.exe 1284 mssecsvr.exe 1472 tasksche.exe -
Drops file in System32 directory 1 IoCs
Processes:
mssecsvr.exedescription ioc process File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\Temporary Internet Files\counters.dat mssecsvr.exe -
Drops file in Windows directory 4 IoCs
Processes:
rundll32.exemssecsvr.exetasksche.exedescription ioc process File created C:\WINDOWS\mssecsvr.exe rundll32.exe File created C:\WINDOWS\tasksche.exe mssecsvr.exe File created C:\Windows\__tmp_rar_sfx_access_check_7080651 tasksche.exe File created C:\Windows\eee.exe tasksche.exe -
Modifies data under HKEY_USERS 24 IoCs
Processes:
mssecsvr.exedescription ioc process Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ mssecsvr.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\UNCAsIntranet = "0" mssecsvr.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{6204A69B-0179-4F4F-BEF1-B23CB1064584} mssecsvr.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{6204A69B-0179-4F4F-BEF1-B23CB1064584}\WpadDecision = "0" mssecsvr.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{6204A69B-0179-4F4F-BEF1-B23CB1064584}\WpadNetworkName = "Network 3" mssecsvr.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\DefaultConnectionSettings = 4600000002000000090000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 mssecsvr.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings mssecsvr.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ProxyEnable = "0" mssecsvr.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\SavedLegacySettings = 4600000002000000090000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 mssecsvr.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\History\CachePrefix = "Visited:" mssecsvr.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\72-15-89-e4-62-9b\WpadDecisionTime = f0d0edc9ed9bd801 mssecsvr.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\DefaultConnectionSettings = 4600000003000000090000000000000000000000000000000400000000000000000000000000000000000000000000000000000001000000020000000a7f00c3000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 mssecsvr.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{6204A69B-0179-4F4F-BEF1-B23CB1064584}\WpadDecisionReason = "1" mssecsvr.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings mssecsvr.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections mssecsvr.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\AutoDetect = "1" mssecsvr.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Content\CachePrefix mssecsvr.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Cookies\CachePrefix = "Cookie:" mssecsvr.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad mssecsvr.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{6204A69B-0179-4F4F-BEF1-B23CB1064584}\WpadDecisionTime = f0d0edc9ed9bd801 mssecsvr.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\72-15-89-e4-62-9b mssecsvr.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{6204A69B-0179-4F4F-BEF1-B23CB1064584}\72-15-89-e4-62-9b mssecsvr.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\72-15-89-e4-62-9b\WpadDecisionReason = "1" mssecsvr.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\72-15-89-e4-62-9b\WpadDecision = "0" mssecsvr.exe -
Suspicious use of WriteProcessMemory 18 IoCs
Processes:
rundll32.exerundll32.exemssecsvr.exedescription pid process target process PID 1936 wrote to memory of 1780 1936 rundll32.exe rundll32.exe PID 1936 wrote to memory of 1780 1936 rundll32.exe rundll32.exe PID 1936 wrote to memory of 1780 1936 rundll32.exe rundll32.exe PID 1936 wrote to memory of 1780 1936 rundll32.exe rundll32.exe PID 1936 wrote to memory of 1780 1936 rundll32.exe rundll32.exe PID 1936 wrote to memory of 1780 1936 rundll32.exe rundll32.exe PID 1936 wrote to memory of 1780 1936 rundll32.exe rundll32.exe PID 1780 wrote to memory of 1632 1780 rundll32.exe mssecsvr.exe PID 1780 wrote to memory of 1632 1780 rundll32.exe mssecsvr.exe PID 1780 wrote to memory of 1632 1780 rundll32.exe mssecsvr.exe PID 1780 wrote to memory of 1632 1780 rundll32.exe mssecsvr.exe PID 1632 wrote to memory of 1472 1632 mssecsvr.exe tasksche.exe PID 1632 wrote to memory of 1472 1632 mssecsvr.exe tasksche.exe PID 1632 wrote to memory of 1472 1632 mssecsvr.exe tasksche.exe PID 1632 wrote to memory of 1472 1632 mssecsvr.exe tasksche.exe PID 1632 wrote to memory of 1472 1632 mssecsvr.exe tasksche.exe PID 1632 wrote to memory of 1472 1632 mssecsvr.exe tasksche.exe PID 1632 wrote to memory of 1472 1632 mssecsvr.exe tasksche.exe
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\e24f7c037a4bf2fc4ef154e59ca96b37.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1936 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\e24f7c037a4bf2fc4ef154e59ca96b37.dll,#12⤵
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:1780 -
C:\WINDOWS\mssecsvr.exeC:\WINDOWS\mssecsvr.exe3⤵
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:1632 -
C:\WINDOWS\tasksche.exeC:\WINDOWS\tasksche.exe /i4⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:1472
-
C:\WINDOWS\mssecsvr.exeC:\WINDOWS\mssecsvr.exe -m security1⤵
- Executes dropped EXE
- Drops file in System32 directory
- Modifies data under HKEY_USERS
PID:1284
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2.2MB
MD5487a62ac36581b4b80dc3b85ec0630ed
SHA16b1dbab7ab3dca9c4c1fd66c307a89ce2317123f
SHA2561303b8c82866795b41c5552340f8a568d615817db94ad3b33401031b5cda902a
SHA512f2023a672a09676fd24a1e8b3e581875c736a0066ed70e8dd8a83d56b4ef7e9401b16298ecf97425d85c67f8b987c3a2a3d30be8cbb702f0a9d47b44e17a2793
-
Filesize
2.0MB
MD5e73f94dd7abced28e73c4e751619ccad
SHA1c4731f1661f45aa608ab9409c23dc9a77f380c40
SHA256e41e4ed3643e2951fa0cec1a359a97d09896a22e53198999042ab6546bf7d203
SHA512b34b06fddb90fb6dc0bac66647dc09ae2384e8a96011f0fef1e2669c03e353d88454387feb685869d482fd632e17b6708168b9e6868fea7ba03a02e2f2ab6b1a
-
Filesize
2.2MB
MD5487a62ac36581b4b80dc3b85ec0630ed
SHA16b1dbab7ab3dca9c4c1fd66c307a89ce2317123f
SHA2561303b8c82866795b41c5552340f8a568d615817db94ad3b33401031b5cda902a
SHA512f2023a672a09676fd24a1e8b3e581875c736a0066ed70e8dd8a83d56b4ef7e9401b16298ecf97425d85c67f8b987c3a2a3d30be8cbb702f0a9d47b44e17a2793
-
Filesize
2.2MB
MD5487a62ac36581b4b80dc3b85ec0630ed
SHA16b1dbab7ab3dca9c4c1fd66c307a89ce2317123f
SHA2561303b8c82866795b41c5552340f8a568d615817db94ad3b33401031b5cda902a
SHA512f2023a672a09676fd24a1e8b3e581875c736a0066ed70e8dd8a83d56b4ef7e9401b16298ecf97425d85c67f8b987c3a2a3d30be8cbb702f0a9d47b44e17a2793
-
Filesize
2.0MB
MD5e73f94dd7abced28e73c4e751619ccad
SHA1c4731f1661f45aa608ab9409c23dc9a77f380c40
SHA256e41e4ed3643e2951fa0cec1a359a97d09896a22e53198999042ab6546bf7d203
SHA512b34b06fddb90fb6dc0bac66647dc09ae2384e8a96011f0fef1e2669c03e353d88454387feb685869d482fd632e17b6708168b9e6868fea7ba03a02e2f2ab6b1a