Analysis
-
max time kernel
165s -
max time network
168s -
platform
windows10-2004_x64 -
resource
win10v2004-20220718-en -
resource tags
arch:x64arch:x86image:win10v2004-20220718-enlocale:en-usos:windows10-2004-x64system -
submitted
20-07-2022 02:17
Static task
static1
Behavioral task
behavioral1
Sample
a7879a2d28a2827c01d284d0ed5e20c8.dll
Resource
win7-20220718-en
Behavioral task
behavioral2
Sample
a7879a2d28a2827c01d284d0ed5e20c8.dll
Resource
win10v2004-20220718-en
General
-
Target
a7879a2d28a2827c01d284d0ed5e20c8.dll
-
Size
5.0MB
-
MD5
a7879a2d28a2827c01d284d0ed5e20c8
-
SHA1
1c0e2df2d4712b8f3cdaca632cf885dd658bc703
-
SHA256
b825f05ca316b65aa51b03070d1f31c2c5ed03cf950efdb16e7e75535bed6124
-
SHA512
d1955dd00a443e2c6bf24ac5e740ea460f0d4df848cffe8a5d121ff741c82d88c5d9030e6f16135b4ce30d50f5b12e1d0f6b1120438967a344d7eddfe637c8ae
Malware Config
Signatures
-
Wannacry
WannaCry is a ransomware cryptoworm.
-
Contacts a large (2645) amount of remote hosts 1 TTPs
This may indicate a network scan to discover remotely running services.
-
Executes dropped EXE 2 IoCs
Processes:
mssecsvr.exemssecsvr.exepid process 408 mssecsvr.exe 1040 mssecsvr.exe -
Drops file in Windows directory 2 IoCs
Processes:
rundll32.exemssecsvr.exedescription ioc process File created C:\WINDOWS\mssecsvr.exe rundll32.exe File created C:\WINDOWS\tasksche.exe mssecsvr.exe -
Modifies data under HKEY_USERS 5 IoCs
Processes:
mssecsvr.exedescription ioc process Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\AutoDetect = "0" mssecsvr.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ mssecsvr.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ProxyBypass = "1" mssecsvr.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\IntranetName = "1" mssecsvr.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\UNCAsIntranet = "1" mssecsvr.exe -
Suspicious use of WriteProcessMemory 6 IoCs
Processes:
rundll32.exerundll32.exedescription pid process target process PID 3436 wrote to memory of 3420 3436 rundll32.exe rundll32.exe PID 3436 wrote to memory of 3420 3436 rundll32.exe rundll32.exe PID 3436 wrote to memory of 3420 3436 rundll32.exe rundll32.exe PID 3420 wrote to memory of 408 3420 rundll32.exe mssecsvr.exe PID 3420 wrote to memory of 408 3420 rundll32.exe mssecsvr.exe PID 3420 wrote to memory of 408 3420 rundll32.exe mssecsvr.exe
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\a7879a2d28a2827c01d284d0ed5e20c8.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:3436 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\a7879a2d28a2827c01d284d0ed5e20c8.dll,#12⤵
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:3420 -
C:\WINDOWS\mssecsvr.exeC:\WINDOWS\mssecsvr.exe3⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:408
-
C:\WINDOWS\mssecsvr.exeC:\WINDOWS\mssecsvr.exe -m security1⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
PID:1040
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2.2MB
MD58e769fcd7957b264fc70ed25a83b8862
SHA1015c7b01dfe62964385cbe850ded325f70cff7fd
SHA256089c3146d7d3bf2317e348a03684aa52ce0d2fab03060655c954e676be1ad2b1
SHA5120097b8252fe341fa1cff8027f9d22f5315c6edb0163d7ef5f7c718f7804dcfefd62609928b25c9b64c9f9a773642b11e821d1162dc4486b31f46e4b33e46fe73
-
Filesize
2.2MB
MD58e769fcd7957b264fc70ed25a83b8862
SHA1015c7b01dfe62964385cbe850ded325f70cff7fd
SHA256089c3146d7d3bf2317e348a03684aa52ce0d2fab03060655c954e676be1ad2b1
SHA5120097b8252fe341fa1cff8027f9d22f5315c6edb0163d7ef5f7c718f7804dcfefd62609928b25c9b64c9f9a773642b11e821d1162dc4486b31f46e4b33e46fe73
-
Filesize
2.2MB
MD58e769fcd7957b264fc70ed25a83b8862
SHA1015c7b01dfe62964385cbe850ded325f70cff7fd
SHA256089c3146d7d3bf2317e348a03684aa52ce0d2fab03060655c954e676be1ad2b1
SHA5120097b8252fe341fa1cff8027f9d22f5315c6edb0163d7ef5f7c718f7804dcfefd62609928b25c9b64c9f9a773642b11e821d1162dc4486b31f46e4b33e46fe73