Analysis
-
max time kernel
151s -
max time network
153s -
platform
windows7_x64 -
resource
win7-20220718-en -
resource tags
arch:x64arch:x86image:win7-20220718-enlocale:en-usos:windows7-x64system -
submitted
20-07-2022 03:00
Static task
static1
Behavioral task
behavioral1
Sample
75bd0b8e4cd2bfcdca7271eaf6669564.dll
Resource
win7-20220718-en
Behavioral task
behavioral2
Sample
75bd0b8e4cd2bfcdca7271eaf6669564.dll
Resource
win10v2004-20220414-en
General
-
Target
75bd0b8e4cd2bfcdca7271eaf6669564.dll
-
Size
5.0MB
-
MD5
75bd0b8e4cd2bfcdca7271eaf6669564
-
SHA1
90d196a866208e23a01b6878d19fc1036e57ebb8
-
SHA256
786bee98d3899dd8d10e7da19c1f1232721946e235d60f7ae023b0c0832501c6
-
SHA512
12aef2c729e2cfbbc241027d370300f85bd97d52e2e1dbc960f39f7f2c31dd4fdab561fc5b1e3a38d9b018d7ec33e8a499879573c065652ba6be096aeaaa945b
Malware Config
Signatures
-
Wannacry
WannaCry is a ransomware cryptoworm.
-
Contacts a large (1258) amount of remote hosts 1 TTPs
This may indicate a network scan to discover remotely running services.
-
Executes dropped EXE 3 IoCs
Processes:
mssecsvc.exemssecsvc.exetasksche.exepid process 1544 mssecsvc.exe 848 mssecsvc.exe 1964 tasksche.exe -
Drops file in System32 directory 1 IoCs
Processes:
mssecsvc.exedescription ioc process File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\Temporary Internet Files\counters.dat mssecsvc.exe -
Drops file in Windows directory 2 IoCs
Processes:
rundll32.exemssecsvc.exedescription ioc process File created C:\WINDOWS\mssecsvc.exe rundll32.exe File created C:\WINDOWS\tasksche.exe mssecsvc.exe -
Modifies data under HKEY_USERS 1 IoCs
Processes:
mssecsvc.exedescription ioc process Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings mssecsvc.exe -
Suspicious use of WriteProcessMemory 11 IoCs
Processes:
rundll32.exerundll32.exedescription pid process target process PID 972 wrote to memory of 1120 972 rundll32.exe rundll32.exe PID 972 wrote to memory of 1120 972 rundll32.exe rundll32.exe PID 972 wrote to memory of 1120 972 rundll32.exe rundll32.exe PID 972 wrote to memory of 1120 972 rundll32.exe rundll32.exe PID 972 wrote to memory of 1120 972 rundll32.exe rundll32.exe PID 972 wrote to memory of 1120 972 rundll32.exe rundll32.exe PID 972 wrote to memory of 1120 972 rundll32.exe rundll32.exe PID 1120 wrote to memory of 1544 1120 rundll32.exe mssecsvc.exe PID 1120 wrote to memory of 1544 1120 rundll32.exe mssecsvc.exe PID 1120 wrote to memory of 1544 1120 rundll32.exe mssecsvc.exe PID 1120 wrote to memory of 1544 1120 rundll32.exe mssecsvc.exe
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\75bd0b8e4cd2bfcdca7271eaf6669564.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:972 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\75bd0b8e4cd2bfcdca7271eaf6669564.dll,#12⤵
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:1120 -
C:\WINDOWS\mssecsvc.exeC:\WINDOWS\mssecsvc.exe3⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:1544 -
C:\WINDOWS\tasksche.exeC:\WINDOWS\tasksche.exe /i4⤵
- Executes dropped EXE
PID:1964
-
C:\WINDOWS\mssecsvc.exeC:\WINDOWS\mssecsvc.exe -m security1⤵
- Executes dropped EXE
- Drops file in System32 directory
- Modifies data under HKEY_USERS
PID:848
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3.6MB
MD59cdbe95e20187bcab116d66cf42dff09
SHA11b0f6e3143049ec3c18c0f7f59ba83f60ba97b41
SHA25697daf7d5fa2a2a46ac2281c038fcf61b1e2d7e2225e79001410b38239e999f38
SHA5125fb8b821ca19cbfe09ed0ca7746a22e89711b7d6b8f8ed8c89cef28af3420e69c9471527c267876039bd703c05393969e9e9c97f65147ebfc811d4737a0b479a
-
Filesize
3.6MB
MD59cdbe95e20187bcab116d66cf42dff09
SHA11b0f6e3143049ec3c18c0f7f59ba83f60ba97b41
SHA25697daf7d5fa2a2a46ac2281c038fcf61b1e2d7e2225e79001410b38239e999f38
SHA5125fb8b821ca19cbfe09ed0ca7746a22e89711b7d6b8f8ed8c89cef28af3420e69c9471527c267876039bd703c05393969e9e9c97f65147ebfc811d4737a0b479a
-
Filesize
3.6MB
MD59cdbe95e20187bcab116d66cf42dff09
SHA11b0f6e3143049ec3c18c0f7f59ba83f60ba97b41
SHA25697daf7d5fa2a2a46ac2281c038fcf61b1e2d7e2225e79001410b38239e999f38
SHA5125fb8b821ca19cbfe09ed0ca7746a22e89711b7d6b8f8ed8c89cef28af3420e69c9471527c267876039bd703c05393969e9e9c97f65147ebfc811d4737a0b479a
-
Filesize
3.4MB
MD51837687121dcf66b2831305e24a363a6
SHA1e3b1badd355544832c3d7600f1d7322a94257fa2
SHA25685128a98bc1374071485ee2cb5e2f4f72a3880953bd896723d96829c03257e47
SHA512fb05b9333494aa033f621b98943b6dd7042025b5bbd74dd6aa32594d4f66031c1115756be5f454a92cd79c1ab9396ce4f2de1abcd662a2d18bfea8b30a1865e1