Analysis
-
max time kernel
169s -
max time network
173s -
platform
windows10-2004_x64 -
resource
win10v2004-20220718-en -
resource tags
arch:x64arch:x86image:win10v2004-20220718-enlocale:en-usos:windows10-2004-x64system -
submitted
20-07-2022 02:31
Static task
static1
Behavioral task
behavioral1
Sample
a1118e338f2ae1b5837396edb09ea62b.dll
Resource
win7-20220718-en
Behavioral task
behavioral2
Sample
a1118e338f2ae1b5837396edb09ea62b.dll
Resource
win10v2004-20220718-en
General
-
Target
a1118e338f2ae1b5837396edb09ea62b.dll
-
Size
5.0MB
-
MD5
a1118e338f2ae1b5837396edb09ea62b
-
SHA1
6b1ad64df7639acdb8a7dce2a9ddb230ebb91096
-
SHA256
15e65f0b7dfaa38ff7379b6ae524169761b01225ba178124cae538b692581ef6
-
SHA512
371f4af2863f564199f9b3d908784528b971255378cf2d7206913cff6c9508b984900e2471677bbdd800df2a7ae18a9a968171034df3189c13224aee5c83b0ac
Malware Config
Signatures
-
Wannacry
WannaCry is a ransomware cryptoworm.
-
Contacts a large (3105) amount of remote hosts 1 TTPs
This may indicate a network scan to discover remotely running services.
-
Executes dropped EXE 3 IoCs
Processes:
mssecsvc.exemssecsvc.exetasksche.exepid process 4268 mssecsvc.exe 1692 mssecsvc.exe 4108 tasksche.exe -
Creates a large amount of network flows 1 TTPs
This may indicate a network scan to discover remotely running services.
-
Drops file in Windows directory 2 IoCs
Processes:
rundll32.exemssecsvc.exedescription ioc process File created C:\WINDOWS\mssecsvc.exe rundll32.exe File created C:\WINDOWS\tasksche.exe mssecsvc.exe -
Modifies data under HKEY_USERS 5 IoCs
Processes:
mssecsvc.exedescription ioc process Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ mssecsvc.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ProxyBypass = "1" mssecsvc.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\IntranetName = "1" mssecsvc.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\UNCAsIntranet = "1" mssecsvc.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\AutoDetect = "0" mssecsvc.exe -
Suspicious use of WriteProcessMemory 6 IoCs
Processes:
rundll32.exerundll32.exedescription pid process target process PID 3436 wrote to memory of 4140 3436 rundll32.exe rundll32.exe PID 3436 wrote to memory of 4140 3436 rundll32.exe rundll32.exe PID 3436 wrote to memory of 4140 3436 rundll32.exe rundll32.exe PID 4140 wrote to memory of 4268 4140 rundll32.exe mssecsvc.exe PID 4140 wrote to memory of 4268 4140 rundll32.exe mssecsvc.exe PID 4140 wrote to memory of 4268 4140 rundll32.exe mssecsvc.exe
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\a1118e338f2ae1b5837396edb09ea62b.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:3436 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\a1118e338f2ae1b5837396edb09ea62b.dll,#12⤵
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:4140 -
C:\WINDOWS\mssecsvc.exeC:\WINDOWS\mssecsvc.exe3⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:4268 -
C:\WINDOWS\tasksche.exeC:\WINDOWS\tasksche.exe /i4⤵
- Executes dropped EXE
PID:4108
-
C:\WINDOWS\mssecsvc.exeC:\WINDOWS\mssecsvc.exe -m security1⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
PID:1692
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3.6MB
MD539c86da8011c0cd923a9357842d678a0
SHA19c14c5be89ddf92cbd327ac8ee420b76bb043598
SHA256d287e023385b885911765941a9c06c149d0c92d3d45aea4a014da3004aa849fe
SHA512e25f27a8e8592ada9b4cc71163949e5749e0d8f4aa10abb01cef8521d6d574a93212824faa0a5aa0bbc7cbe376bd0ea87c0a4d5376f3275e1ad7ca8999513dcf
-
Filesize
3.6MB
MD539c86da8011c0cd923a9357842d678a0
SHA19c14c5be89ddf92cbd327ac8ee420b76bb043598
SHA256d287e023385b885911765941a9c06c149d0c92d3d45aea4a014da3004aa849fe
SHA512e25f27a8e8592ada9b4cc71163949e5749e0d8f4aa10abb01cef8521d6d574a93212824faa0a5aa0bbc7cbe376bd0ea87c0a4d5376f3275e1ad7ca8999513dcf
-
Filesize
3.6MB
MD539c86da8011c0cd923a9357842d678a0
SHA19c14c5be89ddf92cbd327ac8ee420b76bb043598
SHA256d287e023385b885911765941a9c06c149d0c92d3d45aea4a014da3004aa849fe
SHA512e25f27a8e8592ada9b4cc71163949e5749e0d8f4aa10abb01cef8521d6d574a93212824faa0a5aa0bbc7cbe376bd0ea87c0a4d5376f3275e1ad7ca8999513dcf
-
Filesize
3.4MB
MD53475b0e7e1d749c9b1b174da8c01d190
SHA169f737f2f05c008b4348732155e73235e71603d9
SHA256c66e7af0cf8c2882c6fa8db7973ae4ba045a03881514346fa3527e2c995329a9
SHA512a35f6fdfdabc32416b526ff0f68735e8a4aa48e635355b5437767ba712adf09684cd53caccd9636369db0d41b3195e72673dd3a7a150916326445964de9f7df9