Analysis
-
max time kernel
155s -
max time network
168s -
platform
windows7_x64 -
resource
win7-20220718-en -
resource tags
arch:x64arch:x86image:win7-20220718-enlocale:en-usos:windows7-x64system -
submitted
20-07-2022 03:11
Static task
static1
Behavioral task
behavioral1
Sample
384bb8e3c6009c75472ef44706ddcfe0.dll
Resource
win7-20220718-en
Behavioral task
behavioral2
Sample
384bb8e3c6009c75472ef44706ddcfe0.dll
Resource
win10v2004-20220718-en
General
-
Target
384bb8e3c6009c75472ef44706ddcfe0.dll
-
Size
5.0MB
-
MD5
384bb8e3c6009c75472ef44706ddcfe0
-
SHA1
926802147c70c1853621d01a04f2f47e0d5b3669
-
SHA256
dcb39eb8303e191e1bd95e6bd1aaf576f66c7db90e1ca4ee9133e8b66b1b0001
-
SHA512
b0e54f06d2a9ae073831ecf55cda446b40adad97599f2f3a49cfb91812c1ad54a0d6660ee700b63e6da0deb7b8b534508a1892e7503171e9c9af45e00926379d
Malware Config
Signatures
-
Wannacry
WannaCry is a ransomware cryptoworm.
-
Contacts a large (1200) amount of remote hosts 1 TTPs
This may indicate a network scan to discover remotely running services.
-
Executes dropped EXE 3 IoCs
Processes:
mssecsvc.exemssecsvc.exetasksche.exepid process 1780 mssecsvc.exe 876 mssecsvc.exe 1660 tasksche.exe -
Drops file in System32 directory 1 IoCs
Processes:
mssecsvc.exedescription ioc process File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\Temporary Internet Files\counters.dat mssecsvc.exe -
Drops file in Windows directory 2 IoCs
Processes:
rundll32.exemssecsvc.exedescription ioc process File created C:\WINDOWS\mssecsvc.exe rundll32.exe File created C:\WINDOWS\tasksche.exe mssecsvc.exe -
Modifies data under HKEY_USERS 24 IoCs
Processes:
mssecsvc.exedescription ioc process Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections mssecsvc.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Content\CachePrefix mssecsvc.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Cookies\CachePrefix = "Cookie:" mssecsvc.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\History\CachePrefix = "Visited:" mssecsvc.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{2C9489AD-0E39-4293-A892-E000DB223008}\WpadDecisionTime = f094c02ef79bd801 mssecsvc.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{2C9489AD-0E39-4293-A892-E000DB223008}\4a-47-e6-e1-5d-49 mssecsvc.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\4a-47-e6-e1-5d-49\WpadDecisionTime = f094c02ef79bd801 mssecsvc.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\4a-47-e6-e1-5d-49\WpadDecision = "0" mssecsvc.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings mssecsvc.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ProxyEnable = "0" mssecsvc.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ mssecsvc.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{2C9489AD-0E39-4293-A892-E000DB223008} mssecsvc.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{2C9489AD-0E39-4293-A892-E000DB223008}\WpadDecisionReason = "1" mssecsvc.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{2C9489AD-0E39-4293-A892-E000DB223008}\WpadDecision = "0" mssecsvc.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\DefaultConnectionSettings = 4600000002000000090000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 mssecsvc.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings mssecsvc.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\SavedLegacySettings = 4600000002000000090000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 mssecsvc.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\DefaultConnectionSettings = 4600000003000000090000000000000000000000000000000400000000000000000000000000000000000000000000000000000001000000020000000a7f00ca000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 mssecsvc.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{2C9489AD-0E39-4293-A892-E000DB223008}\WpadNetworkName = "Network 3" mssecsvc.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\UNCAsIntranet = "0" mssecsvc.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\AutoDetect = "1" mssecsvc.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad mssecsvc.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\4a-47-e6-e1-5d-49 mssecsvc.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\4a-47-e6-e1-5d-49\WpadDecisionReason = "1" mssecsvc.exe -
Suspicious use of WriteProcessMemory 11 IoCs
Processes:
rundll32.exerundll32.exedescription pid process target process PID 1236 wrote to memory of 1056 1236 rundll32.exe rundll32.exe PID 1236 wrote to memory of 1056 1236 rundll32.exe rundll32.exe PID 1236 wrote to memory of 1056 1236 rundll32.exe rundll32.exe PID 1236 wrote to memory of 1056 1236 rundll32.exe rundll32.exe PID 1236 wrote to memory of 1056 1236 rundll32.exe rundll32.exe PID 1236 wrote to memory of 1056 1236 rundll32.exe rundll32.exe PID 1236 wrote to memory of 1056 1236 rundll32.exe rundll32.exe PID 1056 wrote to memory of 1780 1056 rundll32.exe mssecsvc.exe PID 1056 wrote to memory of 1780 1056 rundll32.exe mssecsvc.exe PID 1056 wrote to memory of 1780 1056 rundll32.exe mssecsvc.exe PID 1056 wrote to memory of 1780 1056 rundll32.exe mssecsvc.exe
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\384bb8e3c6009c75472ef44706ddcfe0.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1236 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\384bb8e3c6009c75472ef44706ddcfe0.dll,#12⤵
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:1056 -
C:\WINDOWS\mssecsvc.exeC:\WINDOWS\mssecsvc.exe3⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:1780 -
C:\WINDOWS\tasksche.exeC:\WINDOWS\tasksche.exe /i4⤵
- Executes dropped EXE
PID:1660
-
C:\WINDOWS\mssecsvc.exeC:\WINDOWS\mssecsvc.exe -m security1⤵
- Executes dropped EXE
- Drops file in System32 directory
- Modifies data under HKEY_USERS
PID:876
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3.6MB
MD543994b637c783ce46721df8f239dccda
SHA13c319ade0f7da6b341f7ef161bd9d2fdd5d679ef
SHA256305069f00300db09afba6260de0f588ce10de2c8f015bef0a10682c46431713a
SHA512e7a162cc9dc71f2c1717ccb3738662438acd8a8d5dce3bb2e0b17a503af268145ff546cf154ed8087ff688ae51e346b59b15528f6427672a09919eb044f7351b
-
Filesize
3.6MB
MD543994b637c783ce46721df8f239dccda
SHA13c319ade0f7da6b341f7ef161bd9d2fdd5d679ef
SHA256305069f00300db09afba6260de0f588ce10de2c8f015bef0a10682c46431713a
SHA512e7a162cc9dc71f2c1717ccb3738662438acd8a8d5dce3bb2e0b17a503af268145ff546cf154ed8087ff688ae51e346b59b15528f6427672a09919eb044f7351b
-
Filesize
3.6MB
MD543994b637c783ce46721df8f239dccda
SHA13c319ade0f7da6b341f7ef161bd9d2fdd5d679ef
SHA256305069f00300db09afba6260de0f588ce10de2c8f015bef0a10682c46431713a
SHA512e7a162cc9dc71f2c1717ccb3738662438acd8a8d5dce3bb2e0b17a503af268145ff546cf154ed8087ff688ae51e346b59b15528f6427672a09919eb044f7351b
-
Filesize
3.4MB
MD5cfb4f9435b8486b68c79eb512b87e4b5
SHA1c093f2d1124422f286e0e960dfa93bddbcfc3bc7
SHA256d327d99d14bcd439ff7314bed102dfde82997ba223bb118d47bc548b637c6a55
SHA51247ffa7c2eed5074ff42bd832947ca7f87dde393e4677a23c5cff2c969c92ec513d2df6eaba8a5014fccb9f80d52c05f6ba7cb9664f05bfd53f94b8291be3bad6