Analysis
-
max time kernel
151s -
max time network
153s -
platform
windows7_x64 -
resource
win7-20220718-en -
resource tags
arch:x64arch:x86image:win7-20220718-enlocale:en-usos:windows7-x64system -
submitted
20-07-2022 03:19
Static task
static1
Behavioral task
behavioral1
Sample
b075ffe9788c0befe9ba892d0844bfd0.dll
Resource
win7-20220718-en
Behavioral task
behavioral2
Sample
b075ffe9788c0befe9ba892d0844bfd0.dll
Resource
win10v2004-20220414-en
General
-
Target
b075ffe9788c0befe9ba892d0844bfd0.dll
-
Size
5.0MB
-
MD5
b075ffe9788c0befe9ba892d0844bfd0
-
SHA1
84e32ea54473058cb16a201a4ced98da96cb1046
-
SHA256
97df26af59eb3281d408e663ad03a4b035d355b5a61180fc1f56ffad6fa3cb46
-
SHA512
91163e3658ad204f2b7d79758f3bc0f78ce07e1d75108a9df9f823baeea91ba1713415075d02b32d688318e1d1331debcabe66e063c7d98a28374499fc6fa039
Malware Config
Signatures
-
Wannacry
WannaCry is a ransomware cryptoworm.
-
Contacts a large (1201) amount of remote hosts 1 TTPs
This may indicate a network scan to discover remotely running services.
-
Executes dropped EXE 3 IoCs
Processes:
mssecsvc.exemssecsvc.exetasksche.exepid process 1080 mssecsvc.exe 1984 mssecsvc.exe 1188 tasksche.exe -
Drops file in System32 directory 1 IoCs
Processes:
mssecsvc.exedescription ioc process File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\Temporary Internet Files\counters.dat mssecsvc.exe -
Drops file in Windows directory 2 IoCs
Processes:
rundll32.exemssecsvc.exedescription ioc process File created C:\WINDOWS\mssecsvc.exe rundll32.exe File created C:\WINDOWS\tasksche.exe mssecsvc.exe -
Modifies data under HKEY_USERS 24 IoCs
Processes:
mssecsvc.exedescription ioc process Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings mssecsvc.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ProxyEnable = "0" mssecsvc.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ mssecsvc.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Cookies\CachePrefix = "Cookie:" mssecsvc.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\History\CachePrefix = "Visited:" mssecsvc.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{0EEF80D3-138B-418F-AD92-0CB3E092E7FE} mssecsvc.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings mssecsvc.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Content\CachePrefix mssecsvc.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad mssecsvc.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{0EEF80D3-138B-418F-AD92-0CB3E092E7FE}\WpadDecisionReason = "1" mssecsvc.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\1a-87-9c-f9-89-17 mssecsvc.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\1a-87-9c-f9-89-17\WpadDecisionTime = e09fe643f89bd801 mssecsvc.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections mssecsvc.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\SavedLegacySettings = 4600000002000000090000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 mssecsvc.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\UNCAsIntranet = "0" mssecsvc.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\AutoDetect = "1" mssecsvc.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{0EEF80D3-138B-418F-AD92-0CB3E092E7FE}\WpadDecision = "0" mssecsvc.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{0EEF80D3-138B-418F-AD92-0CB3E092E7FE}\WpadNetworkName = "Network 3" mssecsvc.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{0EEF80D3-138B-418F-AD92-0CB3E092E7FE}\1a-87-9c-f9-89-17 mssecsvc.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\DefaultConnectionSettings = 4600000002000000090000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 mssecsvc.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\DefaultConnectionSettings = 4600000003000000090000000000000000000000000000000400000000000000000000000000000000000000000000000000000001000000020000000a7f00c6000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 mssecsvc.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{0EEF80D3-138B-418F-AD92-0CB3E092E7FE}\WpadDecisionTime = e09fe643f89bd801 mssecsvc.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\1a-87-9c-f9-89-17\WpadDecisionReason = "1" mssecsvc.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\1a-87-9c-f9-89-17\WpadDecision = "0" mssecsvc.exe -
Suspicious use of WriteProcessMemory 11 IoCs
Processes:
rundll32.exerundll32.exedescription pid process target process PID 768 wrote to memory of 1144 768 rundll32.exe rundll32.exe PID 768 wrote to memory of 1144 768 rundll32.exe rundll32.exe PID 768 wrote to memory of 1144 768 rundll32.exe rundll32.exe PID 768 wrote to memory of 1144 768 rundll32.exe rundll32.exe PID 768 wrote to memory of 1144 768 rundll32.exe rundll32.exe PID 768 wrote to memory of 1144 768 rundll32.exe rundll32.exe PID 768 wrote to memory of 1144 768 rundll32.exe rundll32.exe PID 1144 wrote to memory of 1080 1144 rundll32.exe mssecsvc.exe PID 1144 wrote to memory of 1080 1144 rundll32.exe mssecsvc.exe PID 1144 wrote to memory of 1080 1144 rundll32.exe mssecsvc.exe PID 1144 wrote to memory of 1080 1144 rundll32.exe mssecsvc.exe
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\b075ffe9788c0befe9ba892d0844bfd0.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:768 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\b075ffe9788c0befe9ba892d0844bfd0.dll,#12⤵
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:1144 -
C:\WINDOWS\mssecsvc.exeC:\WINDOWS\mssecsvc.exe3⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:1080 -
C:\WINDOWS\tasksche.exeC:\WINDOWS\tasksche.exe /i4⤵
- Executes dropped EXE
PID:1188
-
C:\WINDOWS\mssecsvc.exeC:\WINDOWS\mssecsvc.exe -m security1⤵
- Executes dropped EXE
- Drops file in System32 directory
- Modifies data under HKEY_USERS
PID:1984
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3.6MB
MD51a48a7039c683ba289ccb65853839fb3
SHA1db5c80198d33e8c73bdee5689dda140fbba4d286
SHA2566c2334686c26ae41d2239cabe33b2bee9301adcaf99a11a728c34fdd69a94779
SHA512f70b981eaa3912c2d5bd4c018049181bf691a8a5b5f52d60f93efe4f12edf571a8c60385debe4e8df3326399044efd556910209008148fc01fb0f66d672074d9
-
Filesize
3.6MB
MD51a48a7039c683ba289ccb65853839fb3
SHA1db5c80198d33e8c73bdee5689dda140fbba4d286
SHA2566c2334686c26ae41d2239cabe33b2bee9301adcaf99a11a728c34fdd69a94779
SHA512f70b981eaa3912c2d5bd4c018049181bf691a8a5b5f52d60f93efe4f12edf571a8c60385debe4e8df3326399044efd556910209008148fc01fb0f66d672074d9
-
Filesize
3.6MB
MD51a48a7039c683ba289ccb65853839fb3
SHA1db5c80198d33e8c73bdee5689dda140fbba4d286
SHA2566c2334686c26ae41d2239cabe33b2bee9301adcaf99a11a728c34fdd69a94779
SHA512f70b981eaa3912c2d5bd4c018049181bf691a8a5b5f52d60f93efe4f12edf571a8c60385debe4e8df3326399044efd556910209008148fc01fb0f66d672074d9
-
Filesize
3.4MB
MD53bf1ef7d2e1802553efa25effb50361b
SHA1e0b066fb51266cb92ef998b580b14009438a7ab2
SHA256a01bd7f28cd0e27d5f8d37e87fb4c36ee980761b0cad0faa354bfb75f35527c1
SHA5126c5c0dc19b587a9fe4efc20ee89c60e310fb7d6214404016b4c55f7052f3977bed4eeb57d2302c0a3f1ef4916e25f62d1774e362f7621db4fb82e800e254d4d9