Analysis
-
max time kernel
150s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20220718-en -
resource tags
arch:x64arch:x86image:win10v2004-20220718-enlocale:en-usos:windows10-2004-x64system -
submitted
20-07-2022 03:15
Static task
static1
Behavioral task
behavioral1
Sample
4bdb678d95f5d6284f95f9254cccb49f.dll
Resource
win7-20220718-en
Behavioral task
behavioral2
Sample
4bdb678d95f5d6284f95f9254cccb49f.dll
Resource
win10v2004-20220718-en
General
-
Target
4bdb678d95f5d6284f95f9254cccb49f.dll
-
Size
5.0MB
-
MD5
4bdb678d95f5d6284f95f9254cccb49f
-
SHA1
75585376ab7c97f79ec782a590b37ee01b821930
-
SHA256
82fbd5e91ad1a70839605f4985d6b6be7a5dbada644912119db7a2c25aa294b5
-
SHA512
5ff91cf3c499c01b7a9afaea66dfc62a982e3258b76f726f851a84c1883aa902a533e2c57141e39a62e0ae0ec9908568020431e732c8ed38134f9b725fe55e34
Malware Config
Signatures
-
Wannacry
WannaCry is a ransomware cryptoworm.
-
Contacts a large (3285) amount of remote hosts 1 TTPs
This may indicate a network scan to discover remotely running services.
-
Executes dropped EXE 3 IoCs
Processes:
mssecsvc.exemssecsvc.exetasksche.exepid process 1420 mssecsvc.exe 1620 mssecsvc.exe 1916 tasksche.exe -
Creates a large amount of network flows 1 TTPs
This may indicate a network scan to discover remotely running services.
-
Drops file in Windows directory 2 IoCs
Processes:
mssecsvc.exerundll32.exedescription ioc process File created C:\WINDOWS\tasksche.exe mssecsvc.exe File created C:\WINDOWS\mssecsvc.exe rundll32.exe -
Modifies data under HKEY_USERS 5 IoCs
Processes:
mssecsvc.exedescription ioc process Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\UNCAsIntranet = "1" mssecsvc.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\AutoDetect = "0" mssecsvc.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ mssecsvc.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ProxyBypass = "1" mssecsvc.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\IntranetName = "1" mssecsvc.exe -
Suspicious use of WriteProcessMemory 6 IoCs
Processes:
rundll32.exerundll32.exedescription pid process target process PID 3428 wrote to memory of 3732 3428 rundll32.exe rundll32.exe PID 3428 wrote to memory of 3732 3428 rundll32.exe rundll32.exe PID 3428 wrote to memory of 3732 3428 rundll32.exe rundll32.exe PID 3732 wrote to memory of 1420 3732 rundll32.exe mssecsvc.exe PID 3732 wrote to memory of 1420 3732 rundll32.exe mssecsvc.exe PID 3732 wrote to memory of 1420 3732 rundll32.exe mssecsvc.exe
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\4bdb678d95f5d6284f95f9254cccb49f.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:3428 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\4bdb678d95f5d6284f95f9254cccb49f.dll,#12⤵
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:3732 -
C:\WINDOWS\mssecsvc.exeC:\WINDOWS\mssecsvc.exe3⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:1420 -
C:\WINDOWS\tasksche.exeC:\WINDOWS\tasksche.exe /i4⤵
- Executes dropped EXE
PID:1916
-
C:\WINDOWS\mssecsvc.exeC:\WINDOWS\mssecsvc.exe -m security1⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
PID:1620
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3.6MB
MD5ccd3b3d1821abf3912be165c14db9246
SHA1a2269e467c06453badeca3ba1dd709cef3e82ca4
SHA2561317e24704306ab9bfc8c220935c0a9a0e3fa7ed74499b1a0d9be5cf5502d760
SHA512884f8981fc6ecbb8eebc5ee33de1426eef45f41ea3c4dbb696ce0f90aaffd7a07cbbd4dcf775e7d8bbee954d92fac5bbb21423174ef41b47e7f7f8270dbebbb5
-
Filesize
3.6MB
MD5ccd3b3d1821abf3912be165c14db9246
SHA1a2269e467c06453badeca3ba1dd709cef3e82ca4
SHA2561317e24704306ab9bfc8c220935c0a9a0e3fa7ed74499b1a0d9be5cf5502d760
SHA512884f8981fc6ecbb8eebc5ee33de1426eef45f41ea3c4dbb696ce0f90aaffd7a07cbbd4dcf775e7d8bbee954d92fac5bbb21423174ef41b47e7f7f8270dbebbb5
-
Filesize
3.6MB
MD5ccd3b3d1821abf3912be165c14db9246
SHA1a2269e467c06453badeca3ba1dd709cef3e82ca4
SHA2561317e24704306ab9bfc8c220935c0a9a0e3fa7ed74499b1a0d9be5cf5502d760
SHA512884f8981fc6ecbb8eebc5ee33de1426eef45f41ea3c4dbb696ce0f90aaffd7a07cbbd4dcf775e7d8bbee954d92fac5bbb21423174ef41b47e7f7f8270dbebbb5
-
Filesize
3.4MB
MD502b589c5ec944eb8c64c1b13b49f6cfe
SHA1988b21e6a1f08b8faa75e7647a0c46616366ca75
SHA2564edb742badddc3e019c7b90d70d209ca47de43fa666ed049be9070a8b52c3282
SHA512670b6ffd223c64d0fb3eaf29976dab6239d794d5fec73e1345eb4ee829655a115e703919ee96f3c12fd20ffff4035e99d4e4448952937c9f509659644892fd48