Analysis
-
max time kernel
170s -
max time network
174s -
platform
windows7_x64 -
resource
win7-20220718-en -
resource tags
arch:x64arch:x86image:win7-20220718-enlocale:en-usos:windows7-x64system -
submitted
20-07-2022 02:31
Static task
static1
Behavioral task
behavioral1
Sample
a1118e338f2ae1b5837396edb09ea62b.dll
Resource
win7-20220718-en
Behavioral task
behavioral2
Sample
a1118e338f2ae1b5837396edb09ea62b.dll
Resource
win10v2004-20220718-en
General
-
Target
a1118e338f2ae1b5837396edb09ea62b.dll
-
Size
5.0MB
-
MD5
a1118e338f2ae1b5837396edb09ea62b
-
SHA1
6b1ad64df7639acdb8a7dce2a9ddb230ebb91096
-
SHA256
15e65f0b7dfaa38ff7379b6ae524169761b01225ba178124cae538b692581ef6
-
SHA512
371f4af2863f564199f9b3d908784528b971255378cf2d7206913cff6c9508b984900e2471677bbdd800df2a7ae18a9a968171034df3189c13224aee5c83b0ac
Malware Config
Signatures
-
Wannacry
WannaCry is a ransomware cryptoworm.
-
Contacts a large (1276) amount of remote hosts 1 TTPs
This may indicate a network scan to discover remotely running services.
-
Executes dropped EXE 3 IoCs
Processes:
mssecsvc.exemssecsvc.exetasksche.exepid process 1112 mssecsvc.exe 1532 mssecsvc.exe 948 tasksche.exe -
Drops file in System32 directory 1 IoCs
Processes:
mssecsvc.exedescription ioc process File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\Temporary Internet Files\counters.dat mssecsvc.exe -
Drops file in Windows directory 2 IoCs
Processes:
rundll32.exemssecsvc.exedescription ioc process File created C:\WINDOWS\mssecsvc.exe rundll32.exe File created C:\WINDOWS\tasksche.exe mssecsvc.exe -
Modifies data under HKEY_USERS 24 IoCs
Processes:
mssecsvc.exedescription ioc process Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad mssecsvc.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\DefaultConnectionSettings = 4600000003000000090000000000000000000000000000000400000000000000000000000000000000000000000000000000000001000000020000000a7f00d5000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 mssecsvc.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\aa-9d-f8-8b-a5-59\WpadDecisionReason = "1" mssecsvc.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\aa-9d-f8-8b-a5-59\WpadDecision = "0" mssecsvc.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings mssecsvc.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ mssecsvc.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{7985A0AF-B22B-40D1-8CE4-A8185C83F455}\WpadDecisionReason = "1" mssecsvc.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{7985A0AF-B22B-40D1-8CE4-A8185C83F455}\WpadNetworkName = "Network 3" mssecsvc.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\aa-9d-f8-8b-a5-59 mssecsvc.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{7985A0AF-B22B-40D1-8CE4-A8185C83F455}\aa-9d-f8-8b-a5-59 mssecsvc.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\SavedLegacySettings = 4600000002000000090000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 mssecsvc.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Content\CachePrefix mssecsvc.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\AutoDetect = "1" mssecsvc.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Cookies\CachePrefix = "Cookie:" mssecsvc.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\History\CachePrefix = "Visited:" mssecsvc.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{7985A0AF-B22B-40D1-8CE4-A8185C83F455} mssecsvc.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\aa-9d-f8-8b-a5-59\WpadDecisionTime = e054a5aef19bd801 mssecsvc.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings mssecsvc.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\UNCAsIntranet = "0" mssecsvc.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ProxyEnable = "0" mssecsvc.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{7985A0AF-B22B-40D1-8CE4-A8185C83F455}\WpadDecisionTime = e054a5aef19bd801 mssecsvc.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{7985A0AF-B22B-40D1-8CE4-A8185C83F455}\WpadDecision = "0" mssecsvc.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections mssecsvc.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\DefaultConnectionSettings = 4600000002000000090000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 mssecsvc.exe -
Suspicious use of WriteProcessMemory 11 IoCs
Processes:
rundll32.exerundll32.exedescription pid process target process PID 540 wrote to memory of 1828 540 rundll32.exe rundll32.exe PID 540 wrote to memory of 1828 540 rundll32.exe rundll32.exe PID 540 wrote to memory of 1828 540 rundll32.exe rundll32.exe PID 540 wrote to memory of 1828 540 rundll32.exe rundll32.exe PID 540 wrote to memory of 1828 540 rundll32.exe rundll32.exe PID 540 wrote to memory of 1828 540 rundll32.exe rundll32.exe PID 540 wrote to memory of 1828 540 rundll32.exe rundll32.exe PID 1828 wrote to memory of 1112 1828 rundll32.exe mssecsvc.exe PID 1828 wrote to memory of 1112 1828 rundll32.exe mssecsvc.exe PID 1828 wrote to memory of 1112 1828 rundll32.exe mssecsvc.exe PID 1828 wrote to memory of 1112 1828 rundll32.exe mssecsvc.exe
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\a1118e338f2ae1b5837396edb09ea62b.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:540 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\a1118e338f2ae1b5837396edb09ea62b.dll,#12⤵
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:1828 -
C:\WINDOWS\mssecsvc.exeC:\WINDOWS\mssecsvc.exe3⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:1112 -
C:\WINDOWS\tasksche.exeC:\WINDOWS\tasksche.exe /i4⤵
- Executes dropped EXE
PID:948
-
C:\WINDOWS\mssecsvc.exeC:\WINDOWS\mssecsvc.exe -m security1⤵
- Executes dropped EXE
- Drops file in System32 directory
- Modifies data under HKEY_USERS
PID:1532
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3.6MB
MD539c86da8011c0cd923a9357842d678a0
SHA19c14c5be89ddf92cbd327ac8ee420b76bb043598
SHA256d287e023385b885911765941a9c06c149d0c92d3d45aea4a014da3004aa849fe
SHA512e25f27a8e8592ada9b4cc71163949e5749e0d8f4aa10abb01cef8521d6d574a93212824faa0a5aa0bbc7cbe376bd0ea87c0a4d5376f3275e1ad7ca8999513dcf
-
Filesize
3.6MB
MD539c86da8011c0cd923a9357842d678a0
SHA19c14c5be89ddf92cbd327ac8ee420b76bb043598
SHA256d287e023385b885911765941a9c06c149d0c92d3d45aea4a014da3004aa849fe
SHA512e25f27a8e8592ada9b4cc71163949e5749e0d8f4aa10abb01cef8521d6d574a93212824faa0a5aa0bbc7cbe376bd0ea87c0a4d5376f3275e1ad7ca8999513dcf
-
Filesize
3.6MB
MD539c86da8011c0cd923a9357842d678a0
SHA19c14c5be89ddf92cbd327ac8ee420b76bb043598
SHA256d287e023385b885911765941a9c06c149d0c92d3d45aea4a014da3004aa849fe
SHA512e25f27a8e8592ada9b4cc71163949e5749e0d8f4aa10abb01cef8521d6d574a93212824faa0a5aa0bbc7cbe376bd0ea87c0a4d5376f3275e1ad7ca8999513dcf
-
Filesize
3.4MB
MD53475b0e7e1d749c9b1b174da8c01d190
SHA169f737f2f05c008b4348732155e73235e71603d9
SHA256c66e7af0cf8c2882c6fa8db7973ae4ba045a03881514346fa3527e2c995329a9
SHA512a35f6fdfdabc32416b526ff0f68735e8a4aa48e635355b5437767ba712adf09684cd53caccd9636369db0d41b3195e72673dd3a7a150916326445964de9f7df9