Analysis

  • max time kernel
    151s
  • max time network
    153s
  • platform
    windows7_x64
  • resource
    win7-20220718-en
  • resource tags

    arch:x64arch:x86image:win7-20220718-enlocale:en-usos:windows7-x64system
  • submitted
    20-07-2022 03:15

General

  • Target

    a9097ff46602fea3fb6e59ecc29d15b7.dll

  • Size

    5.0MB

  • MD5

    a9097ff46602fea3fb6e59ecc29d15b7

  • SHA1

    03acf8a9a382461e4d1980be39472f7c0490c766

  • SHA256

    633b81cf245a7c616d6ec09ac4a2093d4b1b5f484f81c9b7f4ad142e8a5b0f0d

  • SHA512

    462ea792b18377673603f2d3db3ca714ea92eae8a429e2f896cff7127679465951a78703def597d4d9fde30f07aabef30a37b20a5df580e6ea9941a49af4ed11

Malware Config

Signatures

  • Wannacry

    WannaCry is a ransomware cryptoworm.

  • Contacts a large (996) amount of remote hosts 1 TTPs

    This may indicate a network scan to discover remotely running services.

  • Executes dropped EXE 3 IoCs
  • Drops file in System32 directory 1 IoCs
  • Drops file in Windows directory 2 IoCs
  • Modifies data under HKEY_USERS 24 IoCs
  • Suspicious use of WriteProcessMemory 11 IoCs

Processes

  • C:\Windows\system32\rundll32.exe
    rundll32.exe C:\Users\Admin\AppData\Local\Temp\a9097ff46602fea3fb6e59ecc29d15b7.dll,#1
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:752
    • C:\Windows\SysWOW64\rundll32.exe
      rundll32.exe C:\Users\Admin\AppData\Local\Temp\a9097ff46602fea3fb6e59ecc29d15b7.dll,#1
      2⤵
      • Drops file in Windows directory
      • Suspicious use of WriteProcessMemory
      PID:336
      • C:\WINDOWS\mssecsvc.exe
        C:\WINDOWS\mssecsvc.exe
        3⤵
        • Executes dropped EXE
        • Drops file in Windows directory
        PID:1912
        • C:\WINDOWS\tasksche.exe
          C:\WINDOWS\tasksche.exe /i
          4⤵
          • Executes dropped EXE
          PID:1456
  • C:\WINDOWS\mssecsvc.exe
    C:\WINDOWS\mssecsvc.exe -m security
    1⤵
    • Executes dropped EXE
    • Drops file in System32 directory
    • Modifies data under HKEY_USERS
    PID:468

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\WINDOWS\mssecsvc.exe

    Filesize

    3.6MB

    MD5

    2ff55dfcbe060b38c067706b69580bbf

    SHA1

    0ccf0a375c85a1396837908acabe0bc290508860

    SHA256

    18533c7d5f0317d363fc17a470f594304827f06d58258969bc9ccde3ec1dbfe6

    SHA512

    30587dc0407fd6d2af7dc9c1b100ff74e2d9b9c052be87c9bc3f49246205462c2bd34ab93dde147cfccd17422d99488d8f5fe280c7834fc644434b0076c62167

  • C:\Windows\mssecsvc.exe

    Filesize

    3.6MB

    MD5

    2ff55dfcbe060b38c067706b69580bbf

    SHA1

    0ccf0a375c85a1396837908acabe0bc290508860

    SHA256

    18533c7d5f0317d363fc17a470f594304827f06d58258969bc9ccde3ec1dbfe6

    SHA512

    30587dc0407fd6d2af7dc9c1b100ff74e2d9b9c052be87c9bc3f49246205462c2bd34ab93dde147cfccd17422d99488d8f5fe280c7834fc644434b0076c62167

  • C:\Windows\mssecsvc.exe

    Filesize

    3.6MB

    MD5

    2ff55dfcbe060b38c067706b69580bbf

    SHA1

    0ccf0a375c85a1396837908acabe0bc290508860

    SHA256

    18533c7d5f0317d363fc17a470f594304827f06d58258969bc9ccde3ec1dbfe6

    SHA512

    30587dc0407fd6d2af7dc9c1b100ff74e2d9b9c052be87c9bc3f49246205462c2bd34ab93dde147cfccd17422d99488d8f5fe280c7834fc644434b0076c62167

  • C:\Windows\tasksche.exe

    Filesize

    3.4MB

    MD5

    94fe89675454f565792ceffe88f4ff8d

    SHA1

    888967d3ee02ea27602cc7a7897ac28f3ac02a9b

    SHA256

    ad823ae6518d2a3c55600ca0898a3fa6526df57237826f03ba7aa0f139039048

    SHA512

    8ab9167385244b75574806a30602dd7786092053649b543f1e6e383bea19c110d573d4f0c78cf36497c62f26b9d51fc74c5a530e342ccf32db4f5a09799dcfeb

  • memory/336-54-0x0000000000000000-mapping.dmp

  • memory/336-55-0x0000000074D61000-0x0000000074D63000-memory.dmp

    Filesize

    8KB

  • memory/1912-56-0x0000000000000000-mapping.dmp