Analysis
-
max time kernel
150s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20220414-en -
resource tags
arch:x64arch:x86image:win10v2004-20220414-enlocale:en-usos:windows10-2004-x64system -
submitted
20-07-2022 03:03
Static task
static1
Behavioral task
behavioral1
Sample
4696987fb3ce51babd37d6c61cdc53a2.dll
Resource
win7-20220718-en
Behavioral task
behavioral2
Sample
4696987fb3ce51babd37d6c61cdc53a2.dll
Resource
win10v2004-20220414-en
General
-
Target
4696987fb3ce51babd37d6c61cdc53a2.dll
-
Size
5.0MB
-
MD5
4696987fb3ce51babd37d6c61cdc53a2
-
SHA1
4c1271091510cc5a087f2b70b62a9a509018c577
-
SHA256
154c56bb51ad5c9f3e5deb0adaf0cd502bd37abe06fa2a33a2d08a50293c4c19
-
SHA512
473191b99fdd09db4d001f4c5870ee5204fb5eea47faa6b0cb4dbf5346caf846d92c11b223d0845fdec6084954055f92b150631c3d96b1d419bb6e3c2675f4d3
Malware Config
Signatures
-
Wannacry
WannaCry is a ransomware cryptoworm.
-
Contacts a large (3255) amount of remote hosts 1 TTPs
This may indicate a network scan to discover remotely running services.
-
Executes dropped EXE 2 IoCs
Processes:
mssecsvr.exemssecsvr.exepid process 3536 mssecsvr.exe 4164 mssecsvr.exe -
Creates a large amount of network flows 1 TTPs
This may indicate a network scan to discover remotely running services.
-
Drops file in Windows directory 2 IoCs
Processes:
rundll32.exemssecsvr.exedescription ioc process File created C:\WINDOWS\mssecsvr.exe rundll32.exe File created C:\WINDOWS\tasksche.exe mssecsvr.exe -
Modifies data under HKEY_USERS 5 IoCs
Processes:
mssecsvr.exedescription ioc process Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ mssecsvr.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ProxyBypass = "1" mssecsvr.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\IntranetName = "1" mssecsvr.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\UNCAsIntranet = "1" mssecsvr.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\AutoDetect = "0" mssecsvr.exe -
Suspicious use of WriteProcessMemory 6 IoCs
Processes:
rundll32.exerundll32.exedescription pid process target process PID 3172 wrote to memory of 4144 3172 rundll32.exe rundll32.exe PID 3172 wrote to memory of 4144 3172 rundll32.exe rundll32.exe PID 3172 wrote to memory of 4144 3172 rundll32.exe rundll32.exe PID 4144 wrote to memory of 3536 4144 rundll32.exe mssecsvr.exe PID 4144 wrote to memory of 3536 4144 rundll32.exe mssecsvr.exe PID 4144 wrote to memory of 3536 4144 rundll32.exe mssecsvr.exe
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\4696987fb3ce51babd37d6c61cdc53a2.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:3172 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\4696987fb3ce51babd37d6c61cdc53a2.dll,#12⤵
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:4144 -
C:\WINDOWS\mssecsvr.exeC:\WINDOWS\mssecsvr.exe3⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:3536
-
C:\WINDOWS\mssecsvr.exeC:\WINDOWS\mssecsvr.exe -m security1⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
PID:4164
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2.2MB
MD54d0974404e3280388a3e76496fe379db
SHA109ed10c0490b7545775866149e5d75c3bb5823bb
SHA2565478341baa7b7ed2d71f8e64efddd0ea495aeaa42bad6a979285ded6c4da652d
SHA512268ada1aedc03da856a051d161bbcee52ee0a8c7854abcbcd1ccd0b51f41535856407da606fb74f75463ec6d7f7444f13ca6ff86a7845e6a35d99f5db4a4dd25
-
Filesize
2.2MB
MD54d0974404e3280388a3e76496fe379db
SHA109ed10c0490b7545775866149e5d75c3bb5823bb
SHA2565478341baa7b7ed2d71f8e64efddd0ea495aeaa42bad6a979285ded6c4da652d
SHA512268ada1aedc03da856a051d161bbcee52ee0a8c7854abcbcd1ccd0b51f41535856407da606fb74f75463ec6d7f7444f13ca6ff86a7845e6a35d99f5db4a4dd25
-
Filesize
2.2MB
MD54d0974404e3280388a3e76496fe379db
SHA109ed10c0490b7545775866149e5d75c3bb5823bb
SHA2565478341baa7b7ed2d71f8e64efddd0ea495aeaa42bad6a979285ded6c4da652d
SHA512268ada1aedc03da856a051d161bbcee52ee0a8c7854abcbcd1ccd0b51f41535856407da606fb74f75463ec6d7f7444f13ca6ff86a7845e6a35d99f5db4a4dd25