Analysis

  • max time kernel
    150s
  • max time network
    153s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220718-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220718-enlocale:en-usos:windows10-2004-x64system
  • submitted
    20-07-2022 03:19

General

  • Target

    8df901b394371435f697f65468303eb3.dll

  • Size

    5.0MB

  • MD5

    8df901b394371435f697f65468303eb3

  • SHA1

    9b6db81939b0b43b202f31c1f56de72fbfb7fb11

  • SHA256

    99c7b66c0df1b9225da8e149c6557767f9afb7341ee89491638ecc9769555bd2

  • SHA512

    3a94a223fc316f56fbd9e3603fcaa300ca1a5ab22e2dd3132f1009cbdca96a5e72a93c1ed42ac5d4174a183102caee6eedb0cbd68bc469a851aa38e93cb2d539

Malware Config

Signatures

  • Wannacry

    WannaCry is a ransomware cryptoworm.

  • Contacts a large (3086) amount of remote hosts 1 TTPs

    This may indicate a network scan to discover remotely running services.

  • Executes dropped EXE 3 IoCs
  • Creates a large amount of network flows 1 TTPs

    This may indicate a network scan to discover remotely running services.

  • Drops file in Windows directory 2 IoCs
  • Modifies data under HKEY_USERS 5 IoCs
  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Windows\system32\rundll32.exe
    rundll32.exe C:\Users\Admin\AppData\Local\Temp\8df901b394371435f697f65468303eb3.dll,#1
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2632
    • C:\Windows\SysWOW64\rundll32.exe
      rundll32.exe C:\Users\Admin\AppData\Local\Temp\8df901b394371435f697f65468303eb3.dll,#1
      2⤵
      • Drops file in Windows directory
      • Suspicious use of WriteProcessMemory
      PID:2228
      • C:\WINDOWS\mssecsvc.exe
        C:\WINDOWS\mssecsvc.exe
        3⤵
        • Executes dropped EXE
        • Drops file in Windows directory
        PID:4544
        • C:\WINDOWS\tasksche.exe
          C:\WINDOWS\tasksche.exe /i
          4⤵
          • Executes dropped EXE
          PID:1672
  • C:\WINDOWS\mssecsvc.exe
    C:\WINDOWS\mssecsvc.exe -m security
    1⤵
    • Executes dropped EXE
    • Modifies data under HKEY_USERS
    PID:1740

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\WINDOWS\mssecsvc.exe

    Filesize

    3.6MB

    MD5

    6ed8f46cab5a3dfe36054fe65b30026e

    SHA1

    62620d4f3e08aeccd95878c683090e60b7a6a221

    SHA256

    ebb9a19d9b280d560a651a089cd7148559c3a72b301cb8036cc4ed22259c587d

    SHA512

    3d9d6e6585f859daf083cec0231955d4a04d185468f15336f39f958837a3f19c223f8d47405b72f4e0088ad9c7c053067a94b939a1635d8eb8d76015b5d3be05

  • C:\Windows\mssecsvc.exe

    Filesize

    3.6MB

    MD5

    6ed8f46cab5a3dfe36054fe65b30026e

    SHA1

    62620d4f3e08aeccd95878c683090e60b7a6a221

    SHA256

    ebb9a19d9b280d560a651a089cd7148559c3a72b301cb8036cc4ed22259c587d

    SHA512

    3d9d6e6585f859daf083cec0231955d4a04d185468f15336f39f958837a3f19c223f8d47405b72f4e0088ad9c7c053067a94b939a1635d8eb8d76015b5d3be05

  • C:\Windows\mssecsvc.exe

    Filesize

    3.6MB

    MD5

    6ed8f46cab5a3dfe36054fe65b30026e

    SHA1

    62620d4f3e08aeccd95878c683090e60b7a6a221

    SHA256

    ebb9a19d9b280d560a651a089cd7148559c3a72b301cb8036cc4ed22259c587d

    SHA512

    3d9d6e6585f859daf083cec0231955d4a04d185468f15336f39f958837a3f19c223f8d47405b72f4e0088ad9c7c053067a94b939a1635d8eb8d76015b5d3be05

  • C:\Windows\tasksche.exe

    Filesize

    3.4MB

    MD5

    65f2298f3612c8ddf837b938c942cd7b

    SHA1

    fdf7a4694f5912630e6c24fd449870fa37fce3f9

    SHA256

    5c9e2b6c604f4a43845a261e6385866e20a3aaa7f59f595537e17812f33ed5db

    SHA512

    b313685298ddd7aea0abb5cc5212466464c3677781c65c66201851d760c247f8c36145a3f6cb35344d086b7bbeb86186dd39ea5c8a4216adcab1e86ada169d75

  • memory/2228-130-0x0000000000000000-mapping.dmp

  • memory/4544-131-0x0000000000000000-mapping.dmp