Analysis
-
max time kernel
154s -
max time network
183s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
25-08-2022 19:33
Static task
static1
Behavioral task
behavioral1
Sample
b986859e09e5eda5c996a7368d75cd63.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
b986859e09e5eda5c996a7368d75cd63.exe
Resource
win10v2004-20220812-en
General
-
Target
b986859e09e5eda5c996a7368d75cd63.exe
-
Size
3.6MB
-
MD5
b986859e09e5eda5c996a7368d75cd63
-
SHA1
2c62d02457e5d1ff5e0652047b77d5518b02f1d9
-
SHA256
7e6d06f5424093737b32866e419b18a9c9e9493311def0e9b2c8e4158ced4f8d
-
SHA512
3c7b5acb380f5c9aed9046f34acb39e74c5625e047b34ab26262525a53eb44e6a701aaefe5d541f2dd13130f6b801b48271225ccb599b742257f637267f4e9d1
-
SSDEEP
98304:a9PoBhz1aRxcSUDk36SAEdhvw3R8yAVp2H:a9Pe1Cxcxk3ZAEGR8yc4H
Malware Config
Signatures
-
Wannacry
WannaCry is a ransomware cryptoworm.
-
Contacts a large (885) amount of remote hosts 1 TTPs
This may indicate a network scan to discover remotely running services.
-
Drops file in System32 directory 1 IoCs
Processes:
b986859e09e5eda5c996a7368d75cd63.exedescription ioc process File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\Temporary Internet Files\counters.dat b986859e09e5eda5c996a7368d75cd63.exe -
Drops file in Windows directory 1 IoCs
Processes:
b986859e09e5eda5c996a7368d75cd63.exedescription ioc process File created C:\WINDOWS\tasksche.exe b986859e09e5eda5c996a7368d75cd63.exe -
Modifies data under HKEY_USERS 24 IoCs
Processes:
b986859e09e5eda5c996a7368d75cd63.exedescription ioc process Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{44705F7C-6AA8-4ED6-A2F5-774BD2740C95}\WpadDecisionTime = f09db68acab8d801 b986859e09e5eda5c996a7368d75cd63.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{44705F7C-6AA8-4ED6-A2F5-774BD2740C95}\WpadNetworkName = "Network 3" b986859e09e5eda5c996a7368d75cd63.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\3a-b1-ff-15-a0-08 b986859e09e5eda5c996a7368d75cd63.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\AutoDetect = "1" b986859e09e5eda5c996a7368d75cd63.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Content\CachePrefix b986859e09e5eda5c996a7368d75cd63.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{44705F7C-6AA8-4ED6-A2F5-774BD2740C95}\WpadDecisionReason = "1" b986859e09e5eda5c996a7368d75cd63.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\SavedLegacySettings = 4600000002000000090000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 b986859e09e5eda5c996a7368d75cd63.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad b986859e09e5eda5c996a7368d75cd63.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{44705F7C-6AA8-4ED6-A2F5-774BD2740C95}\3a-b1-ff-15-a0-08 b986859e09e5eda5c996a7368d75cd63.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings b986859e09e5eda5c996a7368d75cd63.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings b986859e09e5eda5c996a7368d75cd63.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ProxyEnable = "0" b986859e09e5eda5c996a7368d75cd63.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{44705F7C-6AA8-4ED6-A2F5-774BD2740C95}\WpadDecision = "0" b986859e09e5eda5c996a7368d75cd63.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\3a-b1-ff-15-a0-08\WpadDecisionTime = f09db68acab8d801 b986859e09e5eda5c996a7368d75cd63.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\3a-b1-ff-15-a0-08\WpadDecision = "0" b986859e09e5eda5c996a7368d75cd63.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\DefaultConnectionSettings = 4600000002000000090000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 b986859e09e5eda5c996a7368d75cd63.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ b986859e09e5eda5c996a7368d75cd63.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\UNCAsIntranet = "0" b986859e09e5eda5c996a7368d75cd63.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\DefaultConnectionSettings = 4600000003000000090000000000000000000000000000000400000000000000000000000000000000000000000000000000000001000000020000000a7f0091000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 b986859e09e5eda5c996a7368d75cd63.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{44705F7C-6AA8-4ED6-A2F5-774BD2740C95} b986859e09e5eda5c996a7368d75cd63.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\3a-b1-ff-15-a0-08\WpadDecisionReason = "1" b986859e09e5eda5c996a7368d75cd63.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections b986859e09e5eda5c996a7368d75cd63.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Cookies\CachePrefix = "Cookie:" b986859e09e5eda5c996a7368d75cd63.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\History\CachePrefix = "Visited:" b986859e09e5eda5c996a7368d75cd63.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
b986859e09e5eda5c996a7368d75cd63.exeb986859e09e5eda5c996a7368d75cd63.exepid process 1652 b986859e09e5eda5c996a7368d75cd63.exe 1120 b986859e09e5eda5c996a7368d75cd63.exe -
Suspicious behavior: MapViewOfSection 44 IoCs
Processes:
b986859e09e5eda5c996a7368d75cd63.exeb986859e09e5eda5c996a7368d75cd63.exepid process 1652 b986859e09e5eda5c996a7368d75cd63.exe 1652 b986859e09e5eda5c996a7368d75cd63.exe 1652 b986859e09e5eda5c996a7368d75cd63.exe 1652 b986859e09e5eda5c996a7368d75cd63.exe 1652 b986859e09e5eda5c996a7368d75cd63.exe 1652 b986859e09e5eda5c996a7368d75cd63.exe 1652 b986859e09e5eda5c996a7368d75cd63.exe 1652 b986859e09e5eda5c996a7368d75cd63.exe 1652 b986859e09e5eda5c996a7368d75cd63.exe 1652 b986859e09e5eda5c996a7368d75cd63.exe 1652 b986859e09e5eda5c996a7368d75cd63.exe 1652 b986859e09e5eda5c996a7368d75cd63.exe 1652 b986859e09e5eda5c996a7368d75cd63.exe 1652 b986859e09e5eda5c996a7368d75cd63.exe 1652 b986859e09e5eda5c996a7368d75cd63.exe 1652 b986859e09e5eda5c996a7368d75cd63.exe 1652 b986859e09e5eda5c996a7368d75cd63.exe 1652 b986859e09e5eda5c996a7368d75cd63.exe 1652 b986859e09e5eda5c996a7368d75cd63.exe 1652 b986859e09e5eda5c996a7368d75cd63.exe 1652 b986859e09e5eda5c996a7368d75cd63.exe 1120 b986859e09e5eda5c996a7368d75cd63.exe 1120 b986859e09e5eda5c996a7368d75cd63.exe 1120 b986859e09e5eda5c996a7368d75cd63.exe 1120 b986859e09e5eda5c996a7368d75cd63.exe 1120 b986859e09e5eda5c996a7368d75cd63.exe 1120 b986859e09e5eda5c996a7368d75cd63.exe 1120 b986859e09e5eda5c996a7368d75cd63.exe 1120 b986859e09e5eda5c996a7368d75cd63.exe 1120 b986859e09e5eda5c996a7368d75cd63.exe 1120 b986859e09e5eda5c996a7368d75cd63.exe 1120 b986859e09e5eda5c996a7368d75cd63.exe 1120 b986859e09e5eda5c996a7368d75cd63.exe 1120 b986859e09e5eda5c996a7368d75cd63.exe 1120 b986859e09e5eda5c996a7368d75cd63.exe 1120 b986859e09e5eda5c996a7368d75cd63.exe 1120 b986859e09e5eda5c996a7368d75cd63.exe 1120 b986859e09e5eda5c996a7368d75cd63.exe 1120 b986859e09e5eda5c996a7368d75cd63.exe 1120 b986859e09e5eda5c996a7368d75cd63.exe 1120 b986859e09e5eda5c996a7368d75cd63.exe 1120 b986859e09e5eda5c996a7368d75cd63.exe 1120 b986859e09e5eda5c996a7368d75cd63.exe 1120 b986859e09e5eda5c996a7368d75cd63.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
b986859e09e5eda5c996a7368d75cd63.exeb986859e09e5eda5c996a7368d75cd63.exedescription pid process Token: SeDebugPrivilege 1652 b986859e09e5eda5c996a7368d75cd63.exe Token: SeDebugPrivilege 1120 b986859e09e5eda5c996a7368d75cd63.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
b986859e09e5eda5c996a7368d75cd63.exedescription pid process target process PID 1652 wrote to memory of 372 1652 b986859e09e5eda5c996a7368d75cd63.exe wininit.exe PID 1652 wrote to memory of 372 1652 b986859e09e5eda5c996a7368d75cd63.exe wininit.exe PID 1652 wrote to memory of 372 1652 b986859e09e5eda5c996a7368d75cd63.exe wininit.exe PID 1652 wrote to memory of 372 1652 b986859e09e5eda5c996a7368d75cd63.exe wininit.exe PID 1652 wrote to memory of 372 1652 b986859e09e5eda5c996a7368d75cd63.exe wininit.exe PID 1652 wrote to memory of 372 1652 b986859e09e5eda5c996a7368d75cd63.exe wininit.exe PID 1652 wrote to memory of 384 1652 b986859e09e5eda5c996a7368d75cd63.exe csrss.exe PID 1652 wrote to memory of 384 1652 b986859e09e5eda5c996a7368d75cd63.exe csrss.exe PID 1652 wrote to memory of 384 1652 b986859e09e5eda5c996a7368d75cd63.exe csrss.exe PID 1652 wrote to memory of 384 1652 b986859e09e5eda5c996a7368d75cd63.exe csrss.exe PID 1652 wrote to memory of 384 1652 b986859e09e5eda5c996a7368d75cd63.exe csrss.exe PID 1652 wrote to memory of 384 1652 b986859e09e5eda5c996a7368d75cd63.exe csrss.exe PID 1652 wrote to memory of 420 1652 b986859e09e5eda5c996a7368d75cd63.exe winlogon.exe PID 1652 wrote to memory of 420 1652 b986859e09e5eda5c996a7368d75cd63.exe winlogon.exe PID 1652 wrote to memory of 420 1652 b986859e09e5eda5c996a7368d75cd63.exe winlogon.exe PID 1652 wrote to memory of 420 1652 b986859e09e5eda5c996a7368d75cd63.exe winlogon.exe PID 1652 wrote to memory of 420 1652 b986859e09e5eda5c996a7368d75cd63.exe winlogon.exe PID 1652 wrote to memory of 420 1652 b986859e09e5eda5c996a7368d75cd63.exe winlogon.exe PID 1652 wrote to memory of 464 1652 b986859e09e5eda5c996a7368d75cd63.exe services.exe PID 1652 wrote to memory of 464 1652 b986859e09e5eda5c996a7368d75cd63.exe services.exe PID 1652 wrote to memory of 464 1652 b986859e09e5eda5c996a7368d75cd63.exe services.exe PID 1652 wrote to memory of 464 1652 b986859e09e5eda5c996a7368d75cd63.exe services.exe PID 1652 wrote to memory of 464 1652 b986859e09e5eda5c996a7368d75cd63.exe services.exe PID 1652 wrote to memory of 464 1652 b986859e09e5eda5c996a7368d75cd63.exe services.exe PID 1652 wrote to memory of 480 1652 b986859e09e5eda5c996a7368d75cd63.exe lsass.exe PID 1652 wrote to memory of 480 1652 b986859e09e5eda5c996a7368d75cd63.exe lsass.exe PID 1652 wrote to memory of 480 1652 b986859e09e5eda5c996a7368d75cd63.exe lsass.exe PID 1652 wrote to memory of 480 1652 b986859e09e5eda5c996a7368d75cd63.exe lsass.exe PID 1652 wrote to memory of 480 1652 b986859e09e5eda5c996a7368d75cd63.exe lsass.exe PID 1652 wrote to memory of 480 1652 b986859e09e5eda5c996a7368d75cd63.exe lsass.exe PID 1652 wrote to memory of 488 1652 b986859e09e5eda5c996a7368d75cd63.exe lsm.exe PID 1652 wrote to memory of 488 1652 b986859e09e5eda5c996a7368d75cd63.exe lsm.exe PID 1652 wrote to memory of 488 1652 b986859e09e5eda5c996a7368d75cd63.exe lsm.exe PID 1652 wrote to memory of 488 1652 b986859e09e5eda5c996a7368d75cd63.exe lsm.exe PID 1652 wrote to memory of 488 1652 b986859e09e5eda5c996a7368d75cd63.exe lsm.exe PID 1652 wrote to memory of 488 1652 b986859e09e5eda5c996a7368d75cd63.exe lsm.exe PID 1652 wrote to memory of 580 1652 b986859e09e5eda5c996a7368d75cd63.exe svchost.exe PID 1652 wrote to memory of 580 1652 b986859e09e5eda5c996a7368d75cd63.exe svchost.exe PID 1652 wrote to memory of 580 1652 b986859e09e5eda5c996a7368d75cd63.exe svchost.exe PID 1652 wrote to memory of 580 1652 b986859e09e5eda5c996a7368d75cd63.exe svchost.exe PID 1652 wrote to memory of 580 1652 b986859e09e5eda5c996a7368d75cd63.exe svchost.exe PID 1652 wrote to memory of 580 1652 b986859e09e5eda5c996a7368d75cd63.exe svchost.exe PID 1652 wrote to memory of 660 1652 b986859e09e5eda5c996a7368d75cd63.exe svchost.exe PID 1652 wrote to memory of 660 1652 b986859e09e5eda5c996a7368d75cd63.exe svchost.exe PID 1652 wrote to memory of 660 1652 b986859e09e5eda5c996a7368d75cd63.exe svchost.exe PID 1652 wrote to memory of 660 1652 b986859e09e5eda5c996a7368d75cd63.exe svchost.exe PID 1652 wrote to memory of 660 1652 b986859e09e5eda5c996a7368d75cd63.exe svchost.exe PID 1652 wrote to memory of 660 1652 b986859e09e5eda5c996a7368d75cd63.exe svchost.exe PID 1652 wrote to memory of 736 1652 b986859e09e5eda5c996a7368d75cd63.exe svchost.exe PID 1652 wrote to memory of 736 1652 b986859e09e5eda5c996a7368d75cd63.exe svchost.exe PID 1652 wrote to memory of 736 1652 b986859e09e5eda5c996a7368d75cd63.exe svchost.exe PID 1652 wrote to memory of 736 1652 b986859e09e5eda5c996a7368d75cd63.exe svchost.exe PID 1652 wrote to memory of 736 1652 b986859e09e5eda5c996a7368d75cd63.exe svchost.exe PID 1652 wrote to memory of 736 1652 b986859e09e5eda5c996a7368d75cd63.exe svchost.exe PID 1652 wrote to memory of 792 1652 b986859e09e5eda5c996a7368d75cd63.exe svchost.exe PID 1652 wrote to memory of 792 1652 b986859e09e5eda5c996a7368d75cd63.exe svchost.exe PID 1652 wrote to memory of 792 1652 b986859e09e5eda5c996a7368d75cd63.exe svchost.exe PID 1652 wrote to memory of 792 1652 b986859e09e5eda5c996a7368d75cd63.exe svchost.exe PID 1652 wrote to memory of 792 1652 b986859e09e5eda5c996a7368d75cd63.exe svchost.exe PID 1652 wrote to memory of 792 1652 b986859e09e5eda5c996a7368d75cd63.exe svchost.exe PID 1652 wrote to memory of 832 1652 b986859e09e5eda5c996a7368d75cd63.exe svchost.exe PID 1652 wrote to memory of 832 1652 b986859e09e5eda5c996a7368d75cd63.exe svchost.exe PID 1652 wrote to memory of 832 1652 b986859e09e5eda5c996a7368d75cd63.exe svchost.exe PID 1652 wrote to memory of 832 1652 b986859e09e5eda5c996a7368d75cd63.exe svchost.exe
Processes
-
C:\Windows\system32\lsass.exeC:\Windows\system32\lsass.exe1⤵
-
\\?\C:\Windows\system32\wbem\WMIADAP.EXEwmiadap.exe /F /T /R1⤵
-
C:\Windows\system32\sppsvc.exeC:\Windows\system32\sppsvc.exe1⤵
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalServiceAndNoImpersonation1⤵
-
C:\Users\Admin\AppData\Local\Temp\b986859e09e5eda5c996a7368d75cd63.exe"C:\Users\Admin\AppData\Local\Temp\b986859e09e5eda5c996a7368d75cd63.exe"1⤵
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
-
C:\Windows\system32\Dwm.exe"C:\Windows\system32\Dwm.exe"1⤵
-
C:\Windows\system32\taskhost.exe"taskhost.exe"1⤵
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalServiceNoNetwork1⤵
-
C:\Windows\System32\spoolsv.exeC:\Windows\System32\spoolsv.exe1⤵
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k NetworkService1⤵
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs1⤵
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalService1⤵
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted1⤵
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted1⤵
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k RPCSS1⤵
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k DcomLaunch1⤵
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}2⤵
-
C:\Windows\system32\lsm.exeC:\Windows\system32\lsm.exe1⤵
-
C:\Windows\system32\services.exeC:\Windows\system32\services.exe1⤵
-
C:\Users\Admin\AppData\Local\Temp\b986859e09e5eda5c996a7368d75cd63.exeC:\Users\Admin\AppData\Local\Temp\b986859e09e5eda5c996a7368d75cd63.exe -m security2⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\system32\winlogon.exewinlogon.exe1⤵
-
C:\Windows\system32\csrss.exe%SystemRoot%\system32\csrss.exe ObjectDirectory=\Windows SharedSection=1024,20480,768 Windows=On SubSystemType=Windows ServerDll=basesrv,1 ServerDll=winsrv:UserServerDllInitialization,3 ServerDll=winsrv:ConServerDllInitialization,2 ServerDll=sxssrv,4 ProfileControl=Off MaxRequestThreads=161⤵
-
C:\Windows\system32\wininit.exewininit.exe1⤵
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/1120-57-0x0000000000400000-0x0000000000A70000-memory.dmpFilesize
6.4MB
-
memory/1652-54-0x0000000075D01000-0x0000000075D03000-memory.dmpFilesize
8KB
-
memory/1652-55-0x0000000000400000-0x0000000000A70000-memory.dmpFilesize
6.4MB
-
memory/1652-58-0x0000000000400000-0x0000000000A70000-memory.dmpFilesize
6.4MB
-
memory/1652-59-0x000000007EF80000-0x000000007EF89000-memory.dmpFilesize
36KB