Analysis
-
max time kernel
150s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20220718-en -
resource tags
arch:x64arch:x86image:win10v2004-20220718-enlocale:en-usos:windows10-2004-x64system -
submitted
20-07-2022 03:12
Static task
static1
Behavioral task
behavioral1
Sample
14f964c2a20d1e25ffc3457367909b76.dll
Resource
win7-20220715-en
Behavioral task
behavioral2
Sample
14f964c2a20d1e25ffc3457367909b76.dll
Resource
win10v2004-20220718-en
General
-
Target
14f964c2a20d1e25ffc3457367909b76.dll
-
Size
5.0MB
-
MD5
14f964c2a20d1e25ffc3457367909b76
-
SHA1
38095333280b2976026866ee9efd050cb1646b94
-
SHA256
8984534b84ac860b4f2a8e99a6fe911b22cc21320ba1bb0c5a1bb1fd1d52bea1
-
SHA512
e28c163a09be95d29fe126b4f3bd393b60c52e70400180479fd4c1551fcaf47a366e4a4a158979504431d60b3300285b8c2574d23742515aec7b6c7ff9871f91
Malware Config
Signatures
-
Wannacry
WannaCry is a ransomware cryptoworm.
-
Contacts a large (2671) amount of remote hosts 1 TTPs
This may indicate a network scan to discover remotely running services.
-
Executes dropped EXE 3 IoCs
Processes:
mssecsvc.exemssecsvc.exetasksche.exepid process 4164 mssecsvc.exe 3892 mssecsvc.exe 3656 tasksche.exe -
Creates a large amount of network flows 1 TTPs
This may indicate a network scan to discover remotely running services.
-
Drops file in Windows directory 2 IoCs
Processes:
rundll32.exemssecsvc.exedescription ioc process File created C:\WINDOWS\mssecsvc.exe rundll32.exe File created C:\WINDOWS\tasksche.exe mssecsvc.exe -
Modifies data under HKEY_USERS 5 IoCs
Processes:
mssecsvc.exedescription ioc process Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ mssecsvc.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ProxyBypass = "1" mssecsvc.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\IntranetName = "1" mssecsvc.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\UNCAsIntranet = "1" mssecsvc.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\AutoDetect = "0" mssecsvc.exe -
Suspicious use of WriteProcessMemory 6 IoCs
Processes:
rundll32.exerundll32.exedescription pid process target process PID 4244 wrote to memory of 2516 4244 rundll32.exe rundll32.exe PID 4244 wrote to memory of 2516 4244 rundll32.exe rundll32.exe PID 4244 wrote to memory of 2516 4244 rundll32.exe rundll32.exe PID 2516 wrote to memory of 4164 2516 rundll32.exe mssecsvc.exe PID 2516 wrote to memory of 4164 2516 rundll32.exe mssecsvc.exe PID 2516 wrote to memory of 4164 2516 rundll32.exe mssecsvc.exe
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\14f964c2a20d1e25ffc3457367909b76.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:4244 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\14f964c2a20d1e25ffc3457367909b76.dll,#12⤵
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:2516 -
C:\WINDOWS\mssecsvc.exeC:\WINDOWS\mssecsvc.exe3⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:4164 -
C:\WINDOWS\tasksche.exeC:\WINDOWS\tasksche.exe /i4⤵
- Executes dropped EXE
PID:3656
-
C:\WINDOWS\mssecsvc.exeC:\WINDOWS\mssecsvc.exe -m security1⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
PID:3892
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3.6MB
MD5a955573b9cd03010b04bdf2c6a84fc15
SHA1a57f622ba69839692b8cee7d1c63e5a5efba8061
SHA2569d6e87ff69e756a16a62331500f493d21ee5a0e7d22b106a55832a95963d679f
SHA512be2961261c49c16ae324d8a8035341dd650cfcf793afd5f0c28712f54d1e74085fe112564093298c3c9e93a6944d085f7ebf77bfc72a025d7115dce6ed0a11c4
-
Filesize
3.6MB
MD5a955573b9cd03010b04bdf2c6a84fc15
SHA1a57f622ba69839692b8cee7d1c63e5a5efba8061
SHA2569d6e87ff69e756a16a62331500f493d21ee5a0e7d22b106a55832a95963d679f
SHA512be2961261c49c16ae324d8a8035341dd650cfcf793afd5f0c28712f54d1e74085fe112564093298c3c9e93a6944d085f7ebf77bfc72a025d7115dce6ed0a11c4
-
Filesize
3.6MB
MD5a955573b9cd03010b04bdf2c6a84fc15
SHA1a57f622ba69839692b8cee7d1c63e5a5efba8061
SHA2569d6e87ff69e756a16a62331500f493d21ee5a0e7d22b106a55832a95963d679f
SHA512be2961261c49c16ae324d8a8035341dd650cfcf793afd5f0c28712f54d1e74085fe112564093298c3c9e93a6944d085f7ebf77bfc72a025d7115dce6ed0a11c4
-
Filesize
3.4MB
MD5549c3ec0f0c0fb3687d3e696d9c8ac0a
SHA1aa0ed5c2e566d7b3d40511051bb69f10b99a802e
SHA256384f1b1ae92b7b5c0ee90a48773ab7cb77c1f3077e84cf5ac97f97c12838a01b
SHA51297180644fd902d11e317fb9ebcb06156ff9508cdd5103beec0a87aa983bfc791820966f168de5d2f61a26df4d3231473cd83434b8748fcfb34258a9a1434d9ee