Analysis
-
max time kernel
150s -
max time network
154s -
platform
windows10-2004_x64 -
resource
win10v2004-20220715-en -
resource tags
arch:x64arch:x86image:win10v2004-20220715-enlocale:en-usos:windows10-2004-x64system -
submitted
20-07-2022 02:19
Static task
static1
Behavioral task
behavioral1
Sample
9fe0b783f824bdac40dc63586086224e.dll
Resource
win7-20220718-en
Behavioral task
behavioral2
Sample
9fe0b783f824bdac40dc63586086224e.dll
Resource
win10v2004-20220715-en
General
-
Target
9fe0b783f824bdac40dc63586086224e.dll
-
Size
5.0MB
-
MD5
9fe0b783f824bdac40dc63586086224e
-
SHA1
fecacf635bfb00428650ecf8e7e3fc2de1baf488
-
SHA256
142715871796254e17f1ec8e66b4d00e175ed6d28b56f77859d4c54d8175a916
-
SHA512
15ead91e422945834d903337762e46242a22f89580a5d40a238c0520fb8b2c8d76fd63d7ff5cd7b2c1745171d78af6814644830d45f87fe79a1d1f33a24c627f
Malware Config
Signatures
-
Wannacry
WannaCry is a ransomware cryptoworm.
-
Contacts a large (3146) amount of remote hosts 1 TTPs
This may indicate a network scan to discover remotely running services.
-
Executes dropped EXE 3 IoCs
Processes:
mssecsvc.exemssecsvc.exetasksche.exepid process 4948 mssecsvc.exe 4104 mssecsvc.exe 2484 tasksche.exe -
Creates a large amount of network flows 1 TTPs
This may indicate a network scan to discover remotely running services.
-
Drops file in Windows directory 2 IoCs
Processes:
mssecsvc.exerundll32.exedescription ioc process File created C:\WINDOWS\tasksche.exe mssecsvc.exe File created C:\WINDOWS\mssecsvc.exe rundll32.exe -
Modifies data under HKEY_USERS 5 IoCs
Processes:
mssecsvc.exedescription ioc process Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ mssecsvc.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ProxyBypass = "1" mssecsvc.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\IntranetName = "1" mssecsvc.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\UNCAsIntranet = "1" mssecsvc.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\AutoDetect = "0" mssecsvc.exe -
Suspicious use of WriteProcessMemory 6 IoCs
Processes:
rundll32.exerundll32.exedescription pid process target process PID 2128 wrote to memory of 2068 2128 rundll32.exe rundll32.exe PID 2128 wrote to memory of 2068 2128 rundll32.exe rundll32.exe PID 2128 wrote to memory of 2068 2128 rundll32.exe rundll32.exe PID 2068 wrote to memory of 4948 2068 rundll32.exe mssecsvc.exe PID 2068 wrote to memory of 4948 2068 rundll32.exe mssecsvc.exe PID 2068 wrote to memory of 4948 2068 rundll32.exe mssecsvc.exe
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\9fe0b783f824bdac40dc63586086224e.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:2128 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\9fe0b783f824bdac40dc63586086224e.dll,#12⤵
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:2068 -
C:\WINDOWS\mssecsvc.exeC:\WINDOWS\mssecsvc.exe3⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:4948 -
C:\WINDOWS\tasksche.exeC:\WINDOWS\tasksche.exe /i4⤵
- Executes dropped EXE
PID:2484
-
C:\WINDOWS\mssecsvc.exeC:\WINDOWS\mssecsvc.exe -m security1⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
PID:4104
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3.6MB
MD5b2695ce6c1dc92afb60444da9b990369
SHA100f2089f2f7cda94aed75335aec57a561192b002
SHA256a7ef88ac601e18d6af3b5fdecdf8d113b43adab01679a1bc9bdd7da42a88f754
SHA5127ef07f5afe496290587c7150d828684eed8837cbbd20ab9992f76d0e229c174edc480338294ad0d4e01b1374c235ca798944b21f5dab5b543bb519ce73f56e66
-
Filesize
3.6MB
MD5b2695ce6c1dc92afb60444da9b990369
SHA100f2089f2f7cda94aed75335aec57a561192b002
SHA256a7ef88ac601e18d6af3b5fdecdf8d113b43adab01679a1bc9bdd7da42a88f754
SHA5127ef07f5afe496290587c7150d828684eed8837cbbd20ab9992f76d0e229c174edc480338294ad0d4e01b1374c235ca798944b21f5dab5b543bb519ce73f56e66
-
Filesize
3.6MB
MD5b2695ce6c1dc92afb60444da9b990369
SHA100f2089f2f7cda94aed75335aec57a561192b002
SHA256a7ef88ac601e18d6af3b5fdecdf8d113b43adab01679a1bc9bdd7da42a88f754
SHA5127ef07f5afe496290587c7150d828684eed8837cbbd20ab9992f76d0e229c174edc480338294ad0d4e01b1374c235ca798944b21f5dab5b543bb519ce73f56e66
-
Filesize
3.4MB
MD5e1b1bad6bfaed0c6c8a19b52c600930d
SHA1b3d22823472ce2d50a387f62b8aa800249606fcb
SHA256f293750cc0df738d9dfe30ffe34c240247c26df72d384f64713085fc4246e22a
SHA512c1eff999083b1bce45e5da7413dda9ac4635848be4684bb89f9d8fcb1fea8c71f4d8bd19f3cd6ef1f66622c4bb4e346873ae2b903ac017374181a11ff1b25411