Analysis
-
max time kernel
152s -
max time network
195s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
06/11/2022, 15:20
Static task
static1
Behavioral task
behavioral1
Sample
33eed073312dea621896609573b450fc3588a3b87c0d01580942fc4a207f5634.dll
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
33eed073312dea621896609573b450fc3588a3b87c0d01580942fc4a207f5634.dll
Resource
win10v2004-20220812-en
General
-
Target
33eed073312dea621896609573b450fc3588a3b87c0d01580942fc4a207f5634.dll
-
Size
5.0MB
-
MD5
32899ed3680e121ffa948bca159a9136
-
SHA1
9c58da55106e8f067c009de32c592bd815e43905
-
SHA256
33eed073312dea621896609573b450fc3588a3b87c0d01580942fc4a207f5634
-
SHA512
124723e738caf608ceb355cee04dd2ef6fe0f098168502fbae9b2a79035303a6bcd5ddede0757523d8790e09ed2edd719a9cb8b3255d95316468b4026cacbea0
-
SSDEEP
98304:+DqPoBVxcSUDk36SAEdhvxWa9P593R8yAVp2H:+DqPKxcxk3ZAEUadzR8yc4H
Malware Config
Signatures
-
Wannacry
WannaCry is a ransomware cryptoworm.
-
Contacts a large (3037) amount of remote hosts 1 TTPs
This may indicate a network scan to discover remotely running services.
-
Executes dropped EXE 3 IoCs
pid Process 4356 mssecsvc.exe 4900 mssecsvc.exe 3480 tasksche.exe -
Creates a large amount of network flows 1 TTPs
This may indicate a network scan to discover remotely running services.
-
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\WINDOWS\mssecsvc.exe rundll32.exe File created C:\WINDOWS\tasksche.exe mssecsvc.exe -
Modifies data under HKEY_USERS 5 IoCs
description ioc Process Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ mssecsvc.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ProxyBypass = "1" mssecsvc.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\IntranetName = "1" mssecsvc.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\UNCAsIntranet = "1" mssecsvc.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\AutoDetect = "0" mssecsvc.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 2624 wrote to memory of 4440 2624 rundll32.exe 79 PID 2624 wrote to memory of 4440 2624 rundll32.exe 79 PID 2624 wrote to memory of 4440 2624 rundll32.exe 79 PID 4440 wrote to memory of 4356 4440 rundll32.exe 80 PID 4440 wrote to memory of 4356 4440 rundll32.exe 80 PID 4440 wrote to memory of 4356 4440 rundll32.exe 80
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\33eed073312dea621896609573b450fc3588a3b87c0d01580942fc4a207f5634.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:2624 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\33eed073312dea621896609573b450fc3588a3b87c0d01580942fc4a207f5634.dll,#12⤵
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:4440 -
C:\WINDOWS\mssecsvc.exeC:\WINDOWS\mssecsvc.exe3⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:4356 -
C:\WINDOWS\tasksche.exeC:\WINDOWS\tasksche.exe /i4⤵
- Executes dropped EXE
PID:3480
-
-
-
-
C:\WINDOWS\mssecsvc.exeC:\WINDOWS\mssecsvc.exe -m security1⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
PID:4900
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3.6MB
MD5b00ac29fc13dbda8bf27df3d5e9d472f
SHA1305d1f78dce03cee9a5d42114781a0fd91c2438f
SHA2568d1f187c6b502b63b488fa6c09a96b9e04f4543cdf4fda487ef09f5d54d5bdfa
SHA512b436c75bfd0cb99c8d148978eaa637235913abb912c2335afef8d3cae2d702a688839a672aad2cb0694254f83fac092c960a7385a69cdca1f0857f7e81ab5ede
-
Filesize
3.6MB
MD5b00ac29fc13dbda8bf27df3d5e9d472f
SHA1305d1f78dce03cee9a5d42114781a0fd91c2438f
SHA2568d1f187c6b502b63b488fa6c09a96b9e04f4543cdf4fda487ef09f5d54d5bdfa
SHA512b436c75bfd0cb99c8d148978eaa637235913abb912c2335afef8d3cae2d702a688839a672aad2cb0694254f83fac092c960a7385a69cdca1f0857f7e81ab5ede
-
Filesize
3.6MB
MD5b00ac29fc13dbda8bf27df3d5e9d472f
SHA1305d1f78dce03cee9a5d42114781a0fd91c2438f
SHA2568d1f187c6b502b63b488fa6c09a96b9e04f4543cdf4fda487ef09f5d54d5bdfa
SHA512b436c75bfd0cb99c8d148978eaa637235913abb912c2335afef8d3cae2d702a688839a672aad2cb0694254f83fac092c960a7385a69cdca1f0857f7e81ab5ede
-
Filesize
3.4MB
MD566e0a6be9cca0a982107306168b62a1f
SHA1129af8a4a95fa5641c3f1fb060986cfad3c14c1f
SHA2569815f51f6ec415b1fe99ed0fb05841c947cdd52c626e4a96d6d4c01594b5d247
SHA5124ab571c66169423cf53be4b5629e8f72f128f72f63be30084c756a64bf3f9a0d681aceba326cc9df37694e831112305a22401e2a08e7c15059464e265e42e891