Analysis
-
max time kernel
151s -
max time network
154s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
27-10-2022 02:40
Static task
static1
Behavioral task
behavioral1
Sample
306592b5c9ddf51d26225e51da3d8f9c3b3e51dc6b101043998cb3fce57cdc7f.dll
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
306592b5c9ddf51d26225e51da3d8f9c3b3e51dc6b101043998cb3fce57cdc7f.dll
Resource
win10v2004-20220812-en
General
-
Target
306592b5c9ddf51d26225e51da3d8f9c3b3e51dc6b101043998cb3fce57cdc7f.dll
-
Size
5.0MB
-
MD5
e5253585af59f9701f1a788ae87b9e73
-
SHA1
e1b192fbbde83210802b354dcef2c37aaa180ee2
-
SHA256
306592b5c9ddf51d26225e51da3d8f9c3b3e51dc6b101043998cb3fce57cdc7f
-
SHA512
3cda3ffa99b88ca95c5b52da8a189eac285b9401238355f375b202acbf338b688cb63cb375af791d8a9de38785201f6121a363f5239eb94e41aaff8d67751f70
-
SSDEEP
24576:RbLgudQhZdmMSirYbcMNgef0QeQjG/D8kIqRYoAdNL:RnNQ8MSPbcBVQej/1IN
Malware Config
Signatures
-
Wannacry
WannaCry is a ransomware cryptoworm.
-
Contacts a large (1250) amount of remote hosts 1 TTPs
This may indicate a network scan to discover remotely running services.
-
Executes dropped EXE 2 IoCs
pid Process 1740 mssecsvr.exe 788 mssecsvr.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\Temporary Internet Files\counters.dat mssecsvr.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\WINDOWS\mssecsvr.exe rundll32.exe File created C:\WINDOWS\tasksche.exe mssecsvr.exe -
Modifies data under HKEY_USERS 24 IoCs
description ioc Process Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings mssecsvr.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\UNCAsIntranet = "0" mssecsvr.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad mssecsvr.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\b2-23-73-78-76-09 mssecsvr.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\b2-23-73-78-76-09\WpadDecisionReason = "1" mssecsvr.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\b2-23-73-78-76-09\WpadDecisionTime = 108a1442bee9d801 mssecsvr.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\History\CachePrefix = "Visited:" mssecsvr.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{867A7009-F514-4AD4-B2CC-1953DC11829C} mssecsvr.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{867A7009-F514-4AD4-B2CC-1953DC11829C}\b2-23-73-78-76-09 mssecsvr.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\b2-23-73-78-76-09\WpadDecision = "0" mssecsvr.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{867A7009-F514-4AD4-B2CC-1953DC11829C}\WpadDecision = "0" mssecsvr.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ProxyEnable = "0" mssecsvr.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\SavedLegacySettings = 4600000002000000090000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 mssecsvr.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\AutoDetect = "1" mssecsvr.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Cookies\CachePrefix = "Cookie:" mssecsvr.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\DefaultConnectionSettings = 4600000003000000090000000000000000000000000000000400000000000000000000000000000000000000000000000000000001000000020000000a7f0080000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 mssecsvr.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{867A7009-F514-4AD4-B2CC-1953DC11829C}\WpadDecisionReason = "1" mssecsvr.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{867A7009-F514-4AD4-B2CC-1953DC11829C}\WpadNetworkName = "Network 3" mssecsvr.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections mssecsvr.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\DefaultConnectionSettings = 4600000002000000090000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 mssecsvr.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings mssecsvr.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ mssecsvr.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Content\CachePrefix mssecsvr.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{867A7009-F514-4AD4-B2CC-1953DC11829C}\WpadDecisionTime = 108a1442bee9d801 mssecsvr.exe -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 1348 wrote to memory of 1236 1348 rundll32.exe 26 PID 1348 wrote to memory of 1236 1348 rundll32.exe 26 PID 1348 wrote to memory of 1236 1348 rundll32.exe 26 PID 1348 wrote to memory of 1236 1348 rundll32.exe 26 PID 1348 wrote to memory of 1236 1348 rundll32.exe 26 PID 1348 wrote to memory of 1236 1348 rundll32.exe 26 PID 1348 wrote to memory of 1236 1348 rundll32.exe 26 PID 1236 wrote to memory of 1740 1236 rundll32.exe 27 PID 1236 wrote to memory of 1740 1236 rundll32.exe 27 PID 1236 wrote to memory of 1740 1236 rundll32.exe 27 PID 1236 wrote to memory of 1740 1236 rundll32.exe 27
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\306592b5c9ddf51d26225e51da3d8f9c3b3e51dc6b101043998cb3fce57cdc7f.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1348 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\306592b5c9ddf51d26225e51da3d8f9c3b3e51dc6b101043998cb3fce57cdc7f.dll,#12⤵
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:1236 -
C:\WINDOWS\mssecsvr.exeC:\WINDOWS\mssecsvr.exe3⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:1740
-
-
-
C:\WINDOWS\mssecsvr.exeC:\WINDOWS\mssecsvr.exe -m security1⤵
- Executes dropped EXE
- Drops file in System32 directory
- Modifies data under HKEY_USERS
PID:788
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2.2MB
MD57bb4ef4acf0262ab3cc0dc4ed6956ea1
SHA164ea497a3279880a1f098bf9af008687c68b7574
SHA256fd41be5e8598ecc061cafeee6c8aada1eb8c5cb557017d81c8fa11aca811bc3f
SHA5121c6e2e248576d5623b14f14c41af644666cb8b4dd00612b00dfa915f54778d98dcf6546efb297a162e030cd6f5ceabed03209ff9d05e386aa3563d1958afd6be
-
Filesize
2.2MB
MD57bb4ef4acf0262ab3cc0dc4ed6956ea1
SHA164ea497a3279880a1f098bf9af008687c68b7574
SHA256fd41be5e8598ecc061cafeee6c8aada1eb8c5cb557017d81c8fa11aca811bc3f
SHA5121c6e2e248576d5623b14f14c41af644666cb8b4dd00612b00dfa915f54778d98dcf6546efb297a162e030cd6f5ceabed03209ff9d05e386aa3563d1958afd6be
-
Filesize
2.2MB
MD57bb4ef4acf0262ab3cc0dc4ed6956ea1
SHA164ea497a3279880a1f098bf9af008687c68b7574
SHA256fd41be5e8598ecc061cafeee6c8aada1eb8c5cb557017d81c8fa11aca811bc3f
SHA5121c6e2e248576d5623b14f14c41af644666cb8b4dd00612b00dfa915f54778d98dcf6546efb297a162e030cd6f5ceabed03209ff9d05e386aa3563d1958afd6be