Analysis
-
max time kernel
150s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20220414-en -
resource tags
arch:x64arch:x86image:win10v2004-20220414-enlocale:en-usos:windows10-2004-x64system -
submitted
20-07-2022 03:02
Static task
static1
Behavioral task
behavioral1
Sample
ef11f47072fe3c055c5f5e735eb43d22.dll
Resource
win7-20220718-en
Behavioral task
behavioral2
Sample
ef11f47072fe3c055c5f5e735eb43d22.dll
Resource
win10v2004-20220414-en
General
-
Target
ef11f47072fe3c055c5f5e735eb43d22.dll
-
Size
5.0MB
-
MD5
ef11f47072fe3c055c5f5e735eb43d22
-
SHA1
b54d9167b063f67dea42e98f21649105881094db
-
SHA256
efc3519b38a9b411542e89a1ed42b899dd78de56714efbaa64453d8380c83154
-
SHA512
2585a2d39ccac69b6b949e3384ff8016ea65ed7be6f36231876eb21d13ac35de656a900234f554f44c6b644672fa53118ec1ddb9cec2564d9e891c183314de66
Malware Config
Signatures
-
Wannacry
WannaCry is a ransomware cryptoworm.
-
Contacts a large (3183) amount of remote hosts 1 TTPs
This may indicate a network scan to discover remotely running services.
-
Executes dropped EXE 3 IoCs
Processes:
mssecsvc.exemssecsvc.exetasksche.exepid process 2124 mssecsvc.exe 1688 mssecsvc.exe 4420 tasksche.exe -
Creates a large amount of network flows 1 TTPs
This may indicate a network scan to discover remotely running services.
-
Drops file in Windows directory 2 IoCs
Processes:
rundll32.exemssecsvc.exedescription ioc process File created C:\WINDOWS\mssecsvc.exe rundll32.exe File created C:\WINDOWS\tasksche.exe mssecsvc.exe -
Modifies data under HKEY_USERS 5 IoCs
Processes:
mssecsvc.exedescription ioc process Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ mssecsvc.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ProxyBypass = "1" mssecsvc.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\IntranetName = "1" mssecsvc.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\UNCAsIntranet = "1" mssecsvc.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\AutoDetect = "0" mssecsvc.exe -
Suspicious use of WriteProcessMemory 6 IoCs
Processes:
rundll32.exerundll32.exedescription pid process target process PID 4160 wrote to memory of 460 4160 rundll32.exe rundll32.exe PID 4160 wrote to memory of 460 4160 rundll32.exe rundll32.exe PID 4160 wrote to memory of 460 4160 rundll32.exe rundll32.exe PID 460 wrote to memory of 2124 460 rundll32.exe mssecsvc.exe PID 460 wrote to memory of 2124 460 rundll32.exe mssecsvc.exe PID 460 wrote to memory of 2124 460 rundll32.exe mssecsvc.exe
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\ef11f47072fe3c055c5f5e735eb43d22.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:4160 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\ef11f47072fe3c055c5f5e735eb43d22.dll,#12⤵
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:460 -
C:\WINDOWS\mssecsvc.exeC:\WINDOWS\mssecsvc.exe3⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:2124 -
C:\WINDOWS\tasksche.exeC:\WINDOWS\tasksche.exe /i4⤵
- Executes dropped EXE
PID:4420
-
C:\WINDOWS\mssecsvc.exeC:\WINDOWS\mssecsvc.exe -m security1⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
PID:1688
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3.6MB
MD5a2a2a629188be7d0c495254e50d45eb5
SHA1b62549c4dc913a9edb44ae1764661e660670c378
SHA256cd6df802336cf46b4ed4195f93f51507e90651467b6bb093af38c7e40727182e
SHA512c1ef422fe630aca3803b421ee444b5b8b014b7c8e0c75d14d619208b1109d638727b9a2b48ded77a1d8530ba7f602b12925bd9fced7124113d5241820ee36397
-
Filesize
3.6MB
MD5a2a2a629188be7d0c495254e50d45eb5
SHA1b62549c4dc913a9edb44ae1764661e660670c378
SHA256cd6df802336cf46b4ed4195f93f51507e90651467b6bb093af38c7e40727182e
SHA512c1ef422fe630aca3803b421ee444b5b8b014b7c8e0c75d14d619208b1109d638727b9a2b48ded77a1d8530ba7f602b12925bd9fced7124113d5241820ee36397
-
Filesize
3.6MB
MD5a2a2a629188be7d0c495254e50d45eb5
SHA1b62549c4dc913a9edb44ae1764661e660670c378
SHA256cd6df802336cf46b4ed4195f93f51507e90651467b6bb093af38c7e40727182e
SHA512c1ef422fe630aca3803b421ee444b5b8b014b7c8e0c75d14d619208b1109d638727b9a2b48ded77a1d8530ba7f602b12925bd9fced7124113d5241820ee36397
-
Filesize
3.4MB
MD53878287a5bc8e14c5ac5845fd8bdf10e
SHA138f3fa8615eb53267a625ff5f4825d86467a7bfa
SHA2566b64090f7695103c76d9fcd18f4354decd1ae2625a216dc270044ffc7ed0d93d
SHA5126d8518a53352f8ee98d47bfd4fae0943b308ff02bba88b5b493cba5202c949967a73447bd12aec03d1ab7514fdf39959ff84258ec2907da6716392885882d890