Analysis
-
max time kernel
72s -
max time network
76s -
platform
windows7_x64 -
resource
win7-20220718-en -
resource tags
arch:x64arch:x86image:win7-20220718-enlocale:en-usos:windows7-x64system -
submitted
20-07-2022 02:08
Static task
static1
Behavioral task
behavioral1
Sample
75fd824e7ad1c17d0bf5e6442f123aba.dll
Resource
win7-20220718-en
Behavioral task
behavioral2
Sample
75fd824e7ad1c17d0bf5e6442f123aba.dll
Resource
win10v2004-20220718-en
General
-
Target
75fd824e7ad1c17d0bf5e6442f123aba.dll
-
Size
5.0MB
-
MD5
75fd824e7ad1c17d0bf5e6442f123aba
-
SHA1
e67978f75838ac4120b98595fe5080afde7f2f71
-
SHA256
29deee004523f7cd4e02e4e5840bf701c0e84e3653199fbce130e2fec42c78f2
-
SHA512
2c90473af21671dc04a746780df54de6d4d32b56e17371fb8e857b8217015145f9062bebef6ebea7108e972141202ec70b3d693208c23846ff9104a0a7bc0523
Malware Config
Signatures
-
Wannacry
WannaCry is a ransomware cryptoworm.
-
Executes dropped EXE 3 IoCs
Processes:
mssecsvc.exemssecsvc.exetasksche.exepid process 1680 mssecsvc.exe 1708 mssecsvc.exe 1632 tasksche.exe -
Drops file in System32 directory 1 IoCs
Processes:
mssecsvc.exedescription ioc process File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\Temporary Internet Files\counters.dat mssecsvc.exe -
Drops file in Windows directory 2 IoCs
Processes:
mssecsvc.exerundll32.exedescription ioc process File created C:\WINDOWS\tasksche.exe mssecsvc.exe File created C:\WINDOWS\mssecsvc.exe rundll32.exe -
Modifies data under HKEY_USERS 24 IoCs
Processes:
mssecsvc.exedescription ioc process Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{79924454-FFA8-40FA-B2E0-E50B81BFF94E}\WpadDecisionReason = "1" mssecsvc.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\12-63-50-77-49-84 mssecsvc.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\12-63-50-77-49-84\WpadDecisionReason = "1" mssecsvc.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\12-63-50-77-49-84\WpadDecisionTime = 401bb66bee9bd801 mssecsvc.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad mssecsvc.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\DefaultConnectionSettings = 4600000003000000090000000000000000000000000000000400000000000000000000000000000000000000000000000000000001000000020000000a7f00c1000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 mssecsvc.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{79924454-FFA8-40FA-B2E0-E50B81BFF94E}\12-63-50-77-49-84 mssecsvc.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings mssecsvc.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ mssecsvc.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Content\CachePrefix mssecsvc.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{79924454-FFA8-40FA-B2E0-E50B81BFF94E}\WpadDecision = "0" mssecsvc.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ProxyEnable = "0" mssecsvc.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\AutoDetect = "1" mssecsvc.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings mssecsvc.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\SavedLegacySettings = 4600000002000000090000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 mssecsvc.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\UNCAsIntranet = "0" mssecsvc.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Cookies\CachePrefix = "Cookie:" mssecsvc.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\History\CachePrefix = "Visited:" mssecsvc.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{79924454-FFA8-40FA-B2E0-E50B81BFF94E} mssecsvc.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections mssecsvc.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\DefaultConnectionSettings = 4600000002000000090000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 mssecsvc.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\12-63-50-77-49-84\WpadDecision = "0" mssecsvc.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{79924454-FFA8-40FA-B2E0-E50B81BFF94E}\WpadDecisionTime = 401bb66bee9bd801 mssecsvc.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{79924454-FFA8-40FA-B2E0-E50B81BFF94E}\WpadNetworkName = "Network 3" mssecsvc.exe -
Suspicious use of WriteProcessMemory 11 IoCs
Processes:
rundll32.exerundll32.exedescription pid process target process PID 1976 wrote to memory of 888 1976 rundll32.exe rundll32.exe PID 1976 wrote to memory of 888 1976 rundll32.exe rundll32.exe PID 1976 wrote to memory of 888 1976 rundll32.exe rundll32.exe PID 1976 wrote to memory of 888 1976 rundll32.exe rundll32.exe PID 1976 wrote to memory of 888 1976 rundll32.exe rundll32.exe PID 1976 wrote to memory of 888 1976 rundll32.exe rundll32.exe PID 1976 wrote to memory of 888 1976 rundll32.exe rundll32.exe PID 888 wrote to memory of 1680 888 rundll32.exe mssecsvc.exe PID 888 wrote to memory of 1680 888 rundll32.exe mssecsvc.exe PID 888 wrote to memory of 1680 888 rundll32.exe mssecsvc.exe PID 888 wrote to memory of 1680 888 rundll32.exe mssecsvc.exe
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\75fd824e7ad1c17d0bf5e6442f123aba.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1976 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\75fd824e7ad1c17d0bf5e6442f123aba.dll,#12⤵
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:888 -
C:\WINDOWS\mssecsvc.exeC:\WINDOWS\mssecsvc.exe3⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:1680 -
C:\WINDOWS\tasksche.exeC:\WINDOWS\tasksche.exe /i4⤵
- Executes dropped EXE
PID:1632
-
C:\WINDOWS\mssecsvc.exeC:\WINDOWS\mssecsvc.exe -m security1⤵
- Executes dropped EXE
- Drops file in System32 directory
- Modifies data under HKEY_USERS
PID:1708
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3.6MB
MD5a830c4e5879ed431255cff2839dbb27b
SHA1db731448952ba09809b5650d6f65a61dfac63c09
SHA2560a6eedd7b60718df4f7b647603e8c1b6c527ac7d09916ea6cefab8be44ae7cb0
SHA5125ca0a61ad16d200f2e780ed56d041c521305ddc51def7c26f30af0cc32affee1dba6153a977466ab806d85fded340a693fac32361df2c15e087353a95b2449c2
-
Filesize
3.6MB
MD5a830c4e5879ed431255cff2839dbb27b
SHA1db731448952ba09809b5650d6f65a61dfac63c09
SHA2560a6eedd7b60718df4f7b647603e8c1b6c527ac7d09916ea6cefab8be44ae7cb0
SHA5125ca0a61ad16d200f2e780ed56d041c521305ddc51def7c26f30af0cc32affee1dba6153a977466ab806d85fded340a693fac32361df2c15e087353a95b2449c2
-
Filesize
3.4MB
MD5c04b4b25d60a28425119ec9ee7d3193c
SHA1b1e996512ec6799a10b2b5fc4fd67e9e40820941
SHA256a550bd2542fe4f4d26c8434dc0a28c89512e490cf4f4a04c330ee2a3c5fae13f
SHA512cfe93b91334eb1c67fb62b144894ec1840c4e094e983bae5b4036ba5c6f2e217ec3e8ef140ba45e26eec1f1510acc53f1c9665226d4b38acf76d56f392c668e0