Analysis
-
max time kernel
150s -
max time network
154s -
platform
windows10-2004_x64 -
resource
win10v2004-20220414-en -
resource tags
arch:x64arch:x86image:win10v2004-20220414-enlocale:en-usos:windows10-2004-x64system -
submitted
20-07-2022 02:59
Static task
static1
Behavioral task
behavioral1
Sample
2a45a7ed67aab07387c67c30b04396c5.dll
Resource
win7-20220718-en
Behavioral task
behavioral2
Sample
2a45a7ed67aab07387c67c30b04396c5.dll
Resource
win10v2004-20220414-en
General
-
Target
2a45a7ed67aab07387c67c30b04396c5.dll
-
Size
5.0MB
-
MD5
2a45a7ed67aab07387c67c30b04396c5
-
SHA1
99e879f8aa85ca4d1647ee14db1988d1fb026b76
-
SHA256
a54dc9d2c7a0395fffce3e9385196abf4ff0694a8e22eb3e81f4656e8b4f91b5
-
SHA512
6fbc2a1f071d6db7119673cbeb005fc7b265f20d90f554c02a8c79c7d6f172d6fbc0ab223168cca0f56bee58ca2216917717e9c6b2fa5af3abe2be9fdefee3bf
Malware Config
Signatures
-
Wannacry
WannaCry is a ransomware cryptoworm.
-
Contacts a large (3228) amount of remote hosts 1 TTPs
This may indicate a network scan to discover remotely running services.
-
Executes dropped EXE 2 IoCs
Processes:
mssecsvr.exemssecsvr.exepid process 60 mssecsvr.exe 1552 mssecsvr.exe -
Creates a large amount of network flows 1 TTPs
This may indicate a network scan to discover remotely running services.
-
Drops file in Windows directory 2 IoCs
Processes:
rundll32.exemssecsvr.exedescription ioc process File created C:\WINDOWS\mssecsvr.exe rundll32.exe File created C:\WINDOWS\tasksche.exe mssecsvr.exe -
Modifies data under HKEY_USERS 5 IoCs
Processes:
mssecsvr.exedescription ioc process Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ mssecsvr.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ProxyBypass = "1" mssecsvr.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\IntranetName = "1" mssecsvr.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\UNCAsIntranet = "1" mssecsvr.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\AutoDetect = "0" mssecsvr.exe -
Suspicious use of WriteProcessMemory 6 IoCs
Processes:
rundll32.exerundll32.exedescription pid process target process PID 1576 wrote to memory of 3260 1576 rundll32.exe rundll32.exe PID 1576 wrote to memory of 3260 1576 rundll32.exe rundll32.exe PID 1576 wrote to memory of 3260 1576 rundll32.exe rundll32.exe PID 3260 wrote to memory of 60 3260 rundll32.exe mssecsvr.exe PID 3260 wrote to memory of 60 3260 rundll32.exe mssecsvr.exe PID 3260 wrote to memory of 60 3260 rundll32.exe mssecsvr.exe
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\2a45a7ed67aab07387c67c30b04396c5.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1576 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\2a45a7ed67aab07387c67c30b04396c5.dll,#12⤵
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:3260 -
C:\WINDOWS\mssecsvr.exeC:\WINDOWS\mssecsvr.exe3⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:60
-
C:\WINDOWS\mssecsvr.exeC:\WINDOWS\mssecsvr.exe -m security1⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
PID:1552
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2.2MB
MD5526350c48e2311699f793fa3cc5a8f6e
SHA1def340951878144f4e6fd78aa809303a1f5cec85
SHA256e43fab0d4d134237930888e13fcb91e28fb7236a7f7db4d9b29531c3fe1004dd
SHA512d2db85073e72f7fd4bb4811c135861733d0b5d0a8a7a1647803443284d3d12b4bdb1d8c0d1cb6b015ff4370f4d7f03aadc83d15359540b34eeeb411a4a612287
-
Filesize
2.2MB
MD5526350c48e2311699f793fa3cc5a8f6e
SHA1def340951878144f4e6fd78aa809303a1f5cec85
SHA256e43fab0d4d134237930888e13fcb91e28fb7236a7f7db4d9b29531c3fe1004dd
SHA512d2db85073e72f7fd4bb4811c135861733d0b5d0a8a7a1647803443284d3d12b4bdb1d8c0d1cb6b015ff4370f4d7f03aadc83d15359540b34eeeb411a4a612287
-
Filesize
2.2MB
MD5526350c48e2311699f793fa3cc5a8f6e
SHA1def340951878144f4e6fd78aa809303a1f5cec85
SHA256e43fab0d4d134237930888e13fcb91e28fb7236a7f7db4d9b29531c3fe1004dd
SHA512d2db85073e72f7fd4bb4811c135861733d0b5d0a8a7a1647803443284d3d12b4bdb1d8c0d1cb6b015ff4370f4d7f03aadc83d15359540b34eeeb411a4a612287