Analysis
-
max time kernel
151s -
max time network
153s -
platform
windows7_x64 -
resource
win7-20220718-en -
resource tags
arch:x64arch:x86image:win7-20220718-enlocale:en-usos:windows7-x64system -
submitted
20-07-2022 03:03
Static task
static1
Behavioral task
behavioral1
Sample
4696987fb3ce51babd37d6c61cdc53a2.dll
Resource
win7-20220718-en
Behavioral task
behavioral2
Sample
4696987fb3ce51babd37d6c61cdc53a2.dll
Resource
win10v2004-20220414-en
General
-
Target
4696987fb3ce51babd37d6c61cdc53a2.dll
-
Size
5.0MB
-
MD5
4696987fb3ce51babd37d6c61cdc53a2
-
SHA1
4c1271091510cc5a087f2b70b62a9a509018c577
-
SHA256
154c56bb51ad5c9f3e5deb0adaf0cd502bd37abe06fa2a33a2d08a50293c4c19
-
SHA512
473191b99fdd09db4d001f4c5870ee5204fb5eea47faa6b0cb4dbf5346caf846d92c11b223d0845fdec6084954055f92b150631c3d96b1d419bb6e3c2675f4d3
Malware Config
Signatures
-
Wannacry
WannaCry is a ransomware cryptoworm.
-
Contacts a large (1263) amount of remote hosts 1 TTPs
This may indicate a network scan to discover remotely running services.
-
Executes dropped EXE 2 IoCs
Processes:
mssecsvr.exemssecsvr.exepid process 1452 mssecsvr.exe 1408 mssecsvr.exe -
Drops file in System32 directory 1 IoCs
Processes:
mssecsvr.exedescription ioc process File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\Temporary Internet Files\counters.dat mssecsvr.exe -
Drops file in Windows directory 2 IoCs
Processes:
mssecsvr.exerundll32.exedescription ioc process File created C:\WINDOWS\tasksche.exe mssecsvr.exe File created C:\WINDOWS\mssecsvr.exe rundll32.exe -
Modifies data under HKEY_USERS 24 IoCs
Processes:
mssecsvr.exedescription ioc process Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\DefaultConnectionSettings = 4600000002000000090000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 mssecsvr.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings mssecsvr.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Content\CachePrefix mssecsvr.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{3C30BD6C-E442-4C4B-8171-8241858DD52E}\WpadDecisionTime = a062ad06f69bd801 mssecsvr.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings mssecsvr.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ProxyEnable = "0" mssecsvr.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\SavedLegacySettings = 4600000002000000090000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 mssecsvr.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\22-26-7f-50-2d-c5\WpadDecisionReason = "1" mssecsvr.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections mssecsvr.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\History\CachePrefix = "Visited:" mssecsvr.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad mssecsvr.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\DefaultConnectionSettings = 4600000003000000090000000000000000000000000000000400000000000000000000000000000000000000000000000000000001000000020000000a7f00d2000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 mssecsvr.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{3C30BD6C-E442-4C4B-8171-8241858DD52E}\WpadNetworkName = "Network 3" mssecsvr.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\22-26-7f-50-2d-c5\WpadDecisionTime = a062ad06f69bd801 mssecsvr.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Cookies\CachePrefix = "Cookie:" mssecsvr.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\UNCAsIntranet = "0" mssecsvr.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\AutoDetect = "1" mssecsvr.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{3C30BD6C-E442-4C4B-8171-8241858DD52E} mssecsvr.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{3C30BD6C-E442-4C4B-8171-8241858DD52E}\WpadDecisionReason = "1" mssecsvr.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{3C30BD6C-E442-4C4B-8171-8241858DD52E}\WpadDecision = "0" mssecsvr.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\22-26-7f-50-2d-c5 mssecsvr.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{3C30BD6C-E442-4C4B-8171-8241858DD52E}\22-26-7f-50-2d-c5 mssecsvr.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ mssecsvr.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\22-26-7f-50-2d-c5\WpadDecision = "0" mssecsvr.exe -
Suspicious use of WriteProcessMemory 11 IoCs
Processes:
rundll32.exerundll32.exedescription pid process target process PID 1920 wrote to memory of 896 1920 rundll32.exe rundll32.exe PID 1920 wrote to memory of 896 1920 rundll32.exe rundll32.exe PID 1920 wrote to memory of 896 1920 rundll32.exe rundll32.exe PID 1920 wrote to memory of 896 1920 rundll32.exe rundll32.exe PID 1920 wrote to memory of 896 1920 rundll32.exe rundll32.exe PID 1920 wrote to memory of 896 1920 rundll32.exe rundll32.exe PID 1920 wrote to memory of 896 1920 rundll32.exe rundll32.exe PID 896 wrote to memory of 1452 896 rundll32.exe mssecsvr.exe PID 896 wrote to memory of 1452 896 rundll32.exe mssecsvr.exe PID 896 wrote to memory of 1452 896 rundll32.exe mssecsvr.exe PID 896 wrote to memory of 1452 896 rundll32.exe mssecsvr.exe
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\4696987fb3ce51babd37d6c61cdc53a2.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1920 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\4696987fb3ce51babd37d6c61cdc53a2.dll,#12⤵
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:896 -
C:\WINDOWS\mssecsvr.exeC:\WINDOWS\mssecsvr.exe3⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:1452
-
C:\WINDOWS\mssecsvr.exeC:\WINDOWS\mssecsvr.exe -m security1⤵
- Executes dropped EXE
- Drops file in System32 directory
- Modifies data under HKEY_USERS
PID:1408
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2.2MB
MD54d0974404e3280388a3e76496fe379db
SHA109ed10c0490b7545775866149e5d75c3bb5823bb
SHA2565478341baa7b7ed2d71f8e64efddd0ea495aeaa42bad6a979285ded6c4da652d
SHA512268ada1aedc03da856a051d161bbcee52ee0a8c7854abcbcd1ccd0b51f41535856407da606fb74f75463ec6d7f7444f13ca6ff86a7845e6a35d99f5db4a4dd25
-
Filesize
2.2MB
MD54d0974404e3280388a3e76496fe379db
SHA109ed10c0490b7545775866149e5d75c3bb5823bb
SHA2565478341baa7b7ed2d71f8e64efddd0ea495aeaa42bad6a979285ded6c4da652d
SHA512268ada1aedc03da856a051d161bbcee52ee0a8c7854abcbcd1ccd0b51f41535856407da606fb74f75463ec6d7f7444f13ca6ff86a7845e6a35d99f5db4a4dd25
-
Filesize
2.2MB
MD54d0974404e3280388a3e76496fe379db
SHA109ed10c0490b7545775866149e5d75c3bb5823bb
SHA2565478341baa7b7ed2d71f8e64efddd0ea495aeaa42bad6a979285ded6c4da652d
SHA512268ada1aedc03da856a051d161bbcee52ee0a8c7854abcbcd1ccd0b51f41535856407da606fb74f75463ec6d7f7444f13ca6ff86a7845e6a35d99f5db4a4dd25