Analysis
-
max time kernel
151s -
max time network
153s -
platform
windows7_x64 -
resource
win7-20220718-en -
resource tags
arch:x64arch:x86image:win7-20220718-enlocale:en-usos:windows7-x64system -
submitted
20-07-2022 02:59
Static task
static1
Behavioral task
behavioral1
Sample
2a45a7ed67aab07387c67c30b04396c5.dll
Resource
win7-20220718-en
Behavioral task
behavioral2
Sample
2a45a7ed67aab07387c67c30b04396c5.dll
Resource
win10v2004-20220414-en
General
-
Target
2a45a7ed67aab07387c67c30b04396c5.dll
-
Size
5.0MB
-
MD5
2a45a7ed67aab07387c67c30b04396c5
-
SHA1
99e879f8aa85ca4d1647ee14db1988d1fb026b76
-
SHA256
a54dc9d2c7a0395fffce3e9385196abf4ff0694a8e22eb3e81f4656e8b4f91b5
-
SHA512
6fbc2a1f071d6db7119673cbeb005fc7b265f20d90f554c02a8c79c7d6f172d6fbc0ab223168cca0f56bee58ca2216917717e9c6b2fa5af3abe2be9fdefee3bf
Malware Config
Signatures
-
Wannacry
WannaCry is a ransomware cryptoworm.
-
Contacts a large (1260) amount of remote hosts 1 TTPs
This may indicate a network scan to discover remotely running services.
-
Executes dropped EXE 2 IoCs
Processes:
mssecsvr.exemssecsvr.exepid process 1612 mssecsvr.exe 952 mssecsvr.exe -
Drops file in System32 directory 1 IoCs
Processes:
mssecsvr.exedescription ioc process File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\Temporary Internet Files\counters.dat mssecsvr.exe -
Drops file in Windows directory 2 IoCs
Processes:
rundll32.exemssecsvr.exedescription ioc process File created C:\WINDOWS\mssecsvr.exe rundll32.exe File created C:\WINDOWS\tasksche.exe mssecsvr.exe -
Modifies data under HKEY_USERS 24 IoCs
Processes:
mssecsvr.exedescription ioc process Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\UNCAsIntranet = "0" mssecsvr.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\DefaultConnectionSettings = 4600000003000000090000000000000000000000000000000400000000000000000000000000000000000000000000000000000001000000020000000a7f00bc000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 mssecsvr.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{9C9B3BD9-4108-4BD3-B421-B3958D336EFE}\WpadDecision = "0" mssecsvr.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{9C9B3BD9-4108-4BD3-B421-B3958D336EFE}\WpadNetworkName = "Network 3" mssecsvr.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings mssecsvr.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\DefaultConnectionSettings = 4600000002000000090000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 mssecsvr.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ mssecsvr.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Cookies\CachePrefix = "Cookie:" mssecsvr.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\History\CachePrefix = "Visited:" mssecsvr.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{9C9B3BD9-4108-4BD3-B421-B3958D336EFE} mssecsvr.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings mssecsvr.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\AutoDetect = "1" mssecsvr.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Content\CachePrefix mssecsvr.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\ea-ad-7b-a7-b2-4b mssecsvr.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{9C9B3BD9-4108-4BD3-B421-B3958D336EFE}\ea-ad-7b-a7-b2-4b mssecsvr.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\ea-ad-7b-a7-b2-4b\WpadDecisionReason = "1" mssecsvr.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\ea-ad-7b-a7-b2-4b\WpadDecisionTime = d0f00677f59bd801 mssecsvr.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\ea-ad-7b-a7-b2-4b\WpadDecision = "0" mssecsvr.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections mssecsvr.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ProxyEnable = "0" mssecsvr.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\SavedLegacySettings = 4600000002000000090000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 mssecsvr.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad mssecsvr.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{9C9B3BD9-4108-4BD3-B421-B3958D336EFE}\WpadDecisionReason = "1" mssecsvr.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{9C9B3BD9-4108-4BD3-B421-B3958D336EFE}\WpadDecisionTime = d0f00677f59bd801 mssecsvr.exe -
Suspicious use of WriteProcessMemory 11 IoCs
Processes:
rundll32.exerundll32.exedescription pid process target process PID 1096 wrote to memory of 1412 1096 rundll32.exe rundll32.exe PID 1096 wrote to memory of 1412 1096 rundll32.exe rundll32.exe PID 1096 wrote to memory of 1412 1096 rundll32.exe rundll32.exe PID 1096 wrote to memory of 1412 1096 rundll32.exe rundll32.exe PID 1096 wrote to memory of 1412 1096 rundll32.exe rundll32.exe PID 1096 wrote to memory of 1412 1096 rundll32.exe rundll32.exe PID 1096 wrote to memory of 1412 1096 rundll32.exe rundll32.exe PID 1412 wrote to memory of 1612 1412 rundll32.exe mssecsvr.exe PID 1412 wrote to memory of 1612 1412 rundll32.exe mssecsvr.exe PID 1412 wrote to memory of 1612 1412 rundll32.exe mssecsvr.exe PID 1412 wrote to memory of 1612 1412 rundll32.exe mssecsvr.exe
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\2a45a7ed67aab07387c67c30b04396c5.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1096 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\2a45a7ed67aab07387c67c30b04396c5.dll,#12⤵
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:1412 -
C:\WINDOWS\mssecsvr.exeC:\WINDOWS\mssecsvr.exe3⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:1612
-
C:\WINDOWS\mssecsvr.exeC:\WINDOWS\mssecsvr.exe -m security1⤵
- Executes dropped EXE
- Drops file in System32 directory
- Modifies data under HKEY_USERS
PID:952
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2.2MB
MD5526350c48e2311699f793fa3cc5a8f6e
SHA1def340951878144f4e6fd78aa809303a1f5cec85
SHA256e43fab0d4d134237930888e13fcb91e28fb7236a7f7db4d9b29531c3fe1004dd
SHA512d2db85073e72f7fd4bb4811c135861733d0b5d0a8a7a1647803443284d3d12b4bdb1d8c0d1cb6b015ff4370f4d7f03aadc83d15359540b34eeeb411a4a612287
-
Filesize
2.2MB
MD5526350c48e2311699f793fa3cc5a8f6e
SHA1def340951878144f4e6fd78aa809303a1f5cec85
SHA256e43fab0d4d134237930888e13fcb91e28fb7236a7f7db4d9b29531c3fe1004dd
SHA512d2db85073e72f7fd4bb4811c135861733d0b5d0a8a7a1647803443284d3d12b4bdb1d8c0d1cb6b015ff4370f4d7f03aadc83d15359540b34eeeb411a4a612287
-
Filesize
2.2MB
MD5526350c48e2311699f793fa3cc5a8f6e
SHA1def340951878144f4e6fd78aa809303a1f5cec85
SHA256e43fab0d4d134237930888e13fcb91e28fb7236a7f7db4d9b29531c3fe1004dd
SHA512d2db85073e72f7fd4bb4811c135861733d0b5d0a8a7a1647803443284d3d12b4bdb1d8c0d1cb6b015ff4370f4d7f03aadc83d15359540b34eeeb411a4a612287