Analysis
-
max time kernel
150s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20220718-en -
resource tags
arch:x64arch:x86image:win10v2004-20220718-enlocale:en-usos:windows10-2004-x64system -
submitted
20-07-2022 02:54
Static task
static1
Behavioral task
behavioral1
Sample
d71fc96dcd0ac37af94750945b4a3dd9.dll
Resource
win7-20220715-en
Behavioral task
behavioral2
Sample
d71fc96dcd0ac37af94750945b4a3dd9.dll
Resource
win10v2004-20220718-en
General
-
Target
d71fc96dcd0ac37af94750945b4a3dd9.dll
-
Size
5.0MB
-
MD5
d71fc96dcd0ac37af94750945b4a3dd9
-
SHA1
ab2e4824ecdb79267593c4d221202adcf8d5c6a4
-
SHA256
8de495d0f6c9b65bd1e5ef586b1f05864c0fb50485b8d71097c94ee2ca99121a
-
SHA512
5ed0804219d5d65c8ed4fe2e46c03a6f15f5cc2604bdc321acba658242fcdb00702b718bc9da3f88d5e13ebf3f5589cc902f71c7b3947b3f87ab355e0bb07d3d
Malware Config
Signatures
-
Wannacry
WannaCry is a ransomware cryptoworm.
-
Contacts a large (3219) amount of remote hosts 1 TTPs
This may indicate a network scan to discover remotely running services.
-
Executes dropped EXE 3 IoCs
Processes:
mssecsvc.exemssecsvc.exetasksche.exepid process 4452 mssecsvc.exe 1136 mssecsvc.exe 4180 tasksche.exe -
Creates a large amount of network flows 1 TTPs
This may indicate a network scan to discover remotely running services.
-
Drops file in Windows directory 2 IoCs
Processes:
mssecsvc.exerundll32.exedescription ioc process File created C:\WINDOWS\tasksche.exe mssecsvc.exe File created C:\WINDOWS\mssecsvc.exe rundll32.exe -
Suspicious use of WriteProcessMemory 6 IoCs
Processes:
rundll32.exerundll32.exedescription pid process target process PID 3104 wrote to memory of 4376 3104 rundll32.exe rundll32.exe PID 3104 wrote to memory of 4376 3104 rundll32.exe rundll32.exe PID 3104 wrote to memory of 4376 3104 rundll32.exe rundll32.exe PID 4376 wrote to memory of 4452 4376 rundll32.exe mssecsvc.exe PID 4376 wrote to memory of 4452 4376 rundll32.exe mssecsvc.exe PID 4376 wrote to memory of 4452 4376 rundll32.exe mssecsvc.exe
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\d71fc96dcd0ac37af94750945b4a3dd9.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:3104 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\d71fc96dcd0ac37af94750945b4a3dd9.dll,#12⤵
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:4376 -
C:\WINDOWS\mssecsvc.exeC:\WINDOWS\mssecsvc.exe3⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:4452 -
C:\WINDOWS\tasksche.exeC:\WINDOWS\tasksche.exe /i4⤵
- Executes dropped EXE
PID:4180
-
C:\WINDOWS\mssecsvc.exeC:\WINDOWS\mssecsvc.exe -m security1⤵
- Executes dropped EXE
PID:1136
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3.6MB
MD5c848124eba9515bfb134be8692777608
SHA12806978d37e083b30d583b0cd63f3ab808502b41
SHA256f2616af49773846acc9a3b59cfc8be589724f4e7308ac89f18decb2e40140885
SHA512b6e40ec538e2b2f63b5a92ec16c2d179a84cb2e1b9e3c7b01bb4c72c48b2a0825294f365fd17a301fc1fe42e28c50f7329ef0bffaeb713051d41e94e46a28c1f
-
Filesize
3.6MB
MD5c848124eba9515bfb134be8692777608
SHA12806978d37e083b30d583b0cd63f3ab808502b41
SHA256f2616af49773846acc9a3b59cfc8be589724f4e7308ac89f18decb2e40140885
SHA512b6e40ec538e2b2f63b5a92ec16c2d179a84cb2e1b9e3c7b01bb4c72c48b2a0825294f365fd17a301fc1fe42e28c50f7329ef0bffaeb713051d41e94e46a28c1f
-
Filesize
3.6MB
MD5c848124eba9515bfb134be8692777608
SHA12806978d37e083b30d583b0cd63f3ab808502b41
SHA256f2616af49773846acc9a3b59cfc8be589724f4e7308ac89f18decb2e40140885
SHA512b6e40ec538e2b2f63b5a92ec16c2d179a84cb2e1b9e3c7b01bb4c72c48b2a0825294f365fd17a301fc1fe42e28c50f7329ef0bffaeb713051d41e94e46a28c1f
-
Filesize
3.4MB
MD58c1273ee16cdc804a0baf74c6ec808a7
SHA1d824bf29c6eb16d12d1393324c52181b5710239e
SHA2565aeb1477f825598a6b4b00603428ba26875c4755f7ecc25c1670da182b54290d
SHA5126cb18d81fc76d6054a75cbf3c8f22d8725c5570d6cd2718186e998cb8b30ebd2974ef616c874ac78b34a8bd673300794c2063e03f552085d3eabb7609f1abba0