Analysis

  • max time kernel
    151s
  • max time network
    154s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220414-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220414-enlocale:en-usos:windows10-2004-x64system
  • submitted
    20-07-2022 03:00

General

  • Target

    75bd0b8e4cd2bfcdca7271eaf6669564.dll

  • Size

    5.0MB

  • MD5

    75bd0b8e4cd2bfcdca7271eaf6669564

  • SHA1

    90d196a866208e23a01b6878d19fc1036e57ebb8

  • SHA256

    786bee98d3899dd8d10e7da19c1f1232721946e235d60f7ae023b0c0832501c6

  • SHA512

    12aef2c729e2cfbbc241027d370300f85bd97d52e2e1dbc960f39f7f2c31dd4fdab561fc5b1e3a38d9b018d7ec33e8a499879573c065652ba6be096aeaaa945b

Malware Config

Signatures

  • Wannacry

    WannaCry is a ransomware cryptoworm.

  • Contacts a large (3161) amount of remote hosts 1 TTPs

    This may indicate a network scan to discover remotely running services.

  • Executes dropped EXE 3 IoCs
  • Creates a large amount of network flows 1 TTPs

    This may indicate a network scan to discover remotely running services.

  • Drops file in Windows directory 2 IoCs
  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Windows\system32\rundll32.exe
    rundll32.exe C:\Users\Admin\AppData\Local\Temp\75bd0b8e4cd2bfcdca7271eaf6669564.dll,#1
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2840
    • C:\Windows\SysWOW64\rundll32.exe
      rundll32.exe C:\Users\Admin\AppData\Local\Temp\75bd0b8e4cd2bfcdca7271eaf6669564.dll,#1
      2⤵
      • Drops file in Windows directory
      • Suspicious use of WriteProcessMemory
      PID:3452
      • C:\WINDOWS\mssecsvc.exe
        C:\WINDOWS\mssecsvc.exe
        3⤵
        • Executes dropped EXE
        • Drops file in Windows directory
        PID:3556
        • C:\WINDOWS\tasksche.exe
          C:\WINDOWS\tasksche.exe /i
          4⤵
          • Executes dropped EXE
          PID:4724
  • C:\WINDOWS\mssecsvc.exe
    C:\WINDOWS\mssecsvc.exe -m security
    1⤵
    • Executes dropped EXE
    PID:4052

Network

MITRE ATT&CK Matrix ATT&CK v6

Discovery

Network Service Scanning

2
T1046

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\WINDOWS\mssecsvc.exe
    Filesize

    3.6MB

    MD5

    9cdbe95e20187bcab116d66cf42dff09

    SHA1

    1b0f6e3143049ec3c18c0f7f59ba83f60ba97b41

    SHA256

    97daf7d5fa2a2a46ac2281c038fcf61b1e2d7e2225e79001410b38239e999f38

    SHA512

    5fb8b821ca19cbfe09ed0ca7746a22e89711b7d6b8f8ed8c89cef28af3420e69c9471527c267876039bd703c05393969e9e9c97f65147ebfc811d4737a0b479a

  • C:\Windows\mssecsvc.exe
    Filesize

    3.6MB

    MD5

    9cdbe95e20187bcab116d66cf42dff09

    SHA1

    1b0f6e3143049ec3c18c0f7f59ba83f60ba97b41

    SHA256

    97daf7d5fa2a2a46ac2281c038fcf61b1e2d7e2225e79001410b38239e999f38

    SHA512

    5fb8b821ca19cbfe09ed0ca7746a22e89711b7d6b8f8ed8c89cef28af3420e69c9471527c267876039bd703c05393969e9e9c97f65147ebfc811d4737a0b479a

  • C:\Windows\mssecsvc.exe
    Filesize

    3.6MB

    MD5

    9cdbe95e20187bcab116d66cf42dff09

    SHA1

    1b0f6e3143049ec3c18c0f7f59ba83f60ba97b41

    SHA256

    97daf7d5fa2a2a46ac2281c038fcf61b1e2d7e2225e79001410b38239e999f38

    SHA512

    5fb8b821ca19cbfe09ed0ca7746a22e89711b7d6b8f8ed8c89cef28af3420e69c9471527c267876039bd703c05393969e9e9c97f65147ebfc811d4737a0b479a

  • C:\Windows\tasksche.exe
    Filesize

    3.4MB

    MD5

    1837687121dcf66b2831305e24a363a6

    SHA1

    e3b1badd355544832c3d7600f1d7322a94257fa2

    SHA256

    85128a98bc1374071485ee2cb5e2f4f72a3880953bd896723d96829c03257e47

    SHA512

    fb05b9333494aa033f621b98943b6dd7042025b5bbd74dd6aa32594d4f66031c1115756be5f454a92cd79c1ab9396ce4f2de1abcd662a2d18bfea8b30a1865e1

  • memory/3452-130-0x0000000000000000-mapping.dmp
  • memory/3556-131-0x0000000000000000-mapping.dmp