Analysis
-
max time kernel
150s -
max time network
155s -
platform
windows10-2004_x64 -
resource
win10v2004-20220414-en -
resource tags
arch:x64arch:x86image:win10v2004-20220414-enlocale:en-usos:windows10-2004-x64system -
submitted
20-07-2022 03:17
Static task
static1
Behavioral task
behavioral1
Sample
722b31954ed4c69acd0fbcf17da21498.dll
Resource
win7-20220718-en
Behavioral task
behavioral2
Sample
722b31954ed4c69acd0fbcf17da21498.dll
Resource
win10v2004-20220414-en
General
-
Target
722b31954ed4c69acd0fbcf17da21498.dll
-
Size
5.0MB
-
MD5
722b31954ed4c69acd0fbcf17da21498
-
SHA1
8a11f9b56728b8210689cc7c37d81668f9db3b03
-
SHA256
eea8b675458d178fe1e1ef2cabe5243bd12e1d54f35c69d01d544d467d0a4c56
-
SHA512
70bd9370a0a0242cbe32bdb4b5ef9efc7d0efda6951bbbd88e5c020f79fceb082a1bf6b50d881b57cba46fc916f9acf8c216d34ddda9ebb5cf6a4c326efa2a47
Malware Config
Signatures
-
Wannacry
WannaCry is a ransomware cryptoworm.
-
Contacts a large (3270) amount of remote hosts 1 TTPs
This may indicate a network scan to discover remotely running services.
-
Executes dropped EXE 3 IoCs
Processes:
mssecsvc.exemssecsvc.exetasksche.exepid process 1544 mssecsvc.exe 4980 mssecsvc.exe 4612 tasksche.exe -
Creates a large amount of network flows 1 TTPs
This may indicate a network scan to discover remotely running services.
-
Drops file in Windows directory 2 IoCs
Processes:
rundll32.exemssecsvc.exedescription ioc process File created C:\WINDOWS\mssecsvc.exe rundll32.exe File created C:\WINDOWS\tasksche.exe mssecsvc.exe -
Modifies data under HKEY_USERS 5 IoCs
Processes:
mssecsvc.exedescription ioc process Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ mssecsvc.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ProxyBypass = "1" mssecsvc.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\IntranetName = "1" mssecsvc.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\UNCAsIntranet = "1" mssecsvc.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\AutoDetect = "0" mssecsvc.exe -
Suspicious use of WriteProcessMemory 6 IoCs
Processes:
rundll32.exerundll32.exedescription pid process target process PID 1736 wrote to memory of 872 1736 rundll32.exe rundll32.exe PID 1736 wrote to memory of 872 1736 rundll32.exe rundll32.exe PID 1736 wrote to memory of 872 1736 rundll32.exe rundll32.exe PID 872 wrote to memory of 1544 872 rundll32.exe mssecsvc.exe PID 872 wrote to memory of 1544 872 rundll32.exe mssecsvc.exe PID 872 wrote to memory of 1544 872 rundll32.exe mssecsvc.exe
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\722b31954ed4c69acd0fbcf17da21498.dll,#11⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\722b31954ed4c69acd0fbcf17da21498.dll,#12⤵
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
-
C:\WINDOWS\mssecsvc.exeC:\WINDOWS\mssecsvc.exe3⤵
- Executes dropped EXE
- Drops file in Windows directory
-
C:\WINDOWS\tasksche.exeC:\WINDOWS\tasksche.exe /i4⤵
- Executes dropped EXE
-
C:\WINDOWS\mssecsvc.exeC:\WINDOWS\mssecsvc.exe -m security1⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\WINDOWS\mssecsvc.exeFilesize
3.6MB
MD53b62838ba9ab56d3ec69bf595d76c509
SHA1576246bfad32f418a5050b84729b25e56723e910
SHA2564fddf8061ede2d251766e3002bb502c86a784746bea7c192c1d2314498787f04
SHA512548c44fd33c24749f8b28d378705114b3cee77c5c2b7e3662067f494826b41f2d6eeb55547b88568fce3f90fce962ab7187d6dbfc816aaeb4fbf1c9ce7721bb0
-
C:\Windows\mssecsvc.exeFilesize
3.6MB
MD53b62838ba9ab56d3ec69bf595d76c509
SHA1576246bfad32f418a5050b84729b25e56723e910
SHA2564fddf8061ede2d251766e3002bb502c86a784746bea7c192c1d2314498787f04
SHA512548c44fd33c24749f8b28d378705114b3cee77c5c2b7e3662067f494826b41f2d6eeb55547b88568fce3f90fce962ab7187d6dbfc816aaeb4fbf1c9ce7721bb0
-
C:\Windows\mssecsvc.exeFilesize
3.6MB
MD53b62838ba9ab56d3ec69bf595d76c509
SHA1576246bfad32f418a5050b84729b25e56723e910
SHA2564fddf8061ede2d251766e3002bb502c86a784746bea7c192c1d2314498787f04
SHA512548c44fd33c24749f8b28d378705114b3cee77c5c2b7e3662067f494826b41f2d6eeb55547b88568fce3f90fce962ab7187d6dbfc816aaeb4fbf1c9ce7721bb0
-
C:\Windows\tasksche.exeFilesize
3.4MB
MD537f931e90384f9c2b4e4faa8d7330579
SHA1222fbd46a9ef1ee4c3f0da7b8546986f64fea55f
SHA256a6a04c7b2efdab082346b54ebecf7a864afc99c10046395cba6939481bc40d48
SHA5124589f746e930c31d0c1e86cb2f4a9bb13da6fb6e2b251b20dbf4f9297a2aa30884f6f6cd3a0c4d35dfc9583917e114b1d628b13485c0406029ac28100294e292
-
memory/872-130-0x0000000000000000-mapping.dmp
-
memory/1544-131-0x0000000000000000-mapping.dmp