Analysis

  • max time kernel
    151s
  • max time network
    153s
  • platform
    windows7_x64
  • resource
    win7-20220718-en
  • resource tags

    arch:x64arch:x86image:win7-20220718-enlocale:en-usos:windows7-x64system
  • submitted
    20-07-2022 03:02

General

  • Target

    ef11f47072fe3c055c5f5e735eb43d22.dll

  • Size

    5.0MB

  • MD5

    ef11f47072fe3c055c5f5e735eb43d22

  • SHA1

    b54d9167b063f67dea42e98f21649105881094db

  • SHA256

    efc3519b38a9b411542e89a1ed42b899dd78de56714efbaa64453d8380c83154

  • SHA512

    2585a2d39ccac69b6b949e3384ff8016ea65ed7be6f36231876eb21d13ac35de656a900234f554f44c6b644672fa53118ec1ddb9cec2564d9e891c183314de66

Malware Config

Signatures

  • Wannacry

    WannaCry is a ransomware cryptoworm.

  • Contacts a large (1030) amount of remote hosts 1 TTPs

    This may indicate a network scan to discover remotely running services.

  • Executes dropped EXE 3 IoCs
  • Drops file in System32 directory 1 IoCs
  • Drops file in Windows directory 2 IoCs
  • Modifies data under HKEY_USERS 24 IoCs
  • Suspicious use of WriteProcessMemory 11 IoCs

Processes

  • C:\Windows\system32\rundll32.exe
    rundll32.exe C:\Users\Admin\AppData\Local\Temp\ef11f47072fe3c055c5f5e735eb43d22.dll,#1
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1744
    • C:\Windows\SysWOW64\rundll32.exe
      rundll32.exe C:\Users\Admin\AppData\Local\Temp\ef11f47072fe3c055c5f5e735eb43d22.dll,#1
      2⤵
      • Drops file in Windows directory
      • Suspicious use of WriteProcessMemory
      PID:2008
      • C:\WINDOWS\mssecsvc.exe
        C:\WINDOWS\mssecsvc.exe
        3⤵
        • Executes dropped EXE
        • Drops file in Windows directory
        PID:1996
        • C:\WINDOWS\tasksche.exe
          C:\WINDOWS\tasksche.exe /i
          4⤵
          • Executes dropped EXE
          PID:1536
  • C:\WINDOWS\mssecsvc.exe
    C:\WINDOWS\mssecsvc.exe -m security
    1⤵
    • Executes dropped EXE
    • Drops file in System32 directory
    • Modifies data under HKEY_USERS
    PID:804

Network

MITRE ATT&CK Matrix ATT&CK v6

Discovery

Network Service Scanning

1
T1046

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\WINDOWS\mssecsvc.exe
    Filesize

    3.6MB

    MD5

    a2a2a629188be7d0c495254e50d45eb5

    SHA1

    b62549c4dc913a9edb44ae1764661e660670c378

    SHA256

    cd6df802336cf46b4ed4195f93f51507e90651467b6bb093af38c7e40727182e

    SHA512

    c1ef422fe630aca3803b421ee444b5b8b014b7c8e0c75d14d619208b1109d638727b9a2b48ded77a1d8530ba7f602b12925bd9fced7124113d5241820ee36397

  • C:\Windows\mssecsvc.exe
    Filesize

    3.6MB

    MD5

    a2a2a629188be7d0c495254e50d45eb5

    SHA1

    b62549c4dc913a9edb44ae1764661e660670c378

    SHA256

    cd6df802336cf46b4ed4195f93f51507e90651467b6bb093af38c7e40727182e

    SHA512

    c1ef422fe630aca3803b421ee444b5b8b014b7c8e0c75d14d619208b1109d638727b9a2b48ded77a1d8530ba7f602b12925bd9fced7124113d5241820ee36397

  • C:\Windows\mssecsvc.exe
    Filesize

    3.6MB

    MD5

    a2a2a629188be7d0c495254e50d45eb5

    SHA1

    b62549c4dc913a9edb44ae1764661e660670c378

    SHA256

    cd6df802336cf46b4ed4195f93f51507e90651467b6bb093af38c7e40727182e

    SHA512

    c1ef422fe630aca3803b421ee444b5b8b014b7c8e0c75d14d619208b1109d638727b9a2b48ded77a1d8530ba7f602b12925bd9fced7124113d5241820ee36397

  • C:\Windows\tasksche.exe
    Filesize

    3.4MB

    MD5

    3878287a5bc8e14c5ac5845fd8bdf10e

    SHA1

    38f3fa8615eb53267a625ff5f4825d86467a7bfa

    SHA256

    6b64090f7695103c76d9fcd18f4354decd1ae2625a216dc270044ffc7ed0d93d

    SHA512

    6d8518a53352f8ee98d47bfd4fae0943b308ff02bba88b5b493cba5202c949967a73447bd12aec03d1ab7514fdf39959ff84258ec2907da6716392885882d890

  • memory/1996-56-0x0000000000000000-mapping.dmp
  • memory/2008-54-0x0000000000000000-mapping.dmp
  • memory/2008-55-0x0000000076091000-0x0000000076093000-memory.dmp
    Filesize

    8KB