Analysis
-
max time kernel
151s -
max time network
155s -
platform
windows10-2004_x64 -
resource
win10v2004-20220901-en -
resource tags
arch:x64arch:x86image:win10v2004-20220901-enlocale:en-usos:windows10-2004-x64system -
submitted
29-11-2022 08:40
Static task
static1
Behavioral task
behavioral1
Sample
7a60943b74e7d36a2b1b922f07432a83.dll
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
7a60943b74e7d36a2b1b922f07432a83.dll
Resource
win10v2004-20220901-en
General
-
Target
7a60943b74e7d36a2b1b922f07432a83.dll
-
Size
5.0MB
-
MD5
7a60943b74e7d36a2b1b922f07432a83
-
SHA1
a037d09259b42f0d8da5ee0cf3e0a53d994506e0
-
SHA256
536d57cc6472a9464de16f0b875fa3884a7bdbb3cdfbfc2391cc63698d93403f
-
SHA512
f466588c3862d9bf5bbe8c32f4e5daa7df9a3e22abcc83cc07c1b88a5026f19594a14f84758025f6204bf8329300053ce6817b9765419bc601296089f7120b08
-
SSDEEP
98304:d8qPoBhz1aRxcSUDk36SAkhu3R8yAVp2:d8qPe1Cxcxk3ZAzR8yc4
Malware Config
Signatures
-
Wannacry
WannaCry is a ransomware cryptoworm.
-
Executes dropped EXE 3 IoCs
Processes:
mssecsvc.exemssecsvc.exetasksche.exepid process 464 mssecsvc.exe 260 mssecsvc.exe 1152 tasksche.exe -
Creates a large amount of network flows 1 TTPs
This may indicate a network scan to discover remotely running services.
-
Drops file in Windows directory 2 IoCs
Processes:
rundll32.exemssecsvc.exedescription ioc process File created C:\WINDOWS\mssecsvc.exe rundll32.exe File created C:\WINDOWS\tasksche.exe mssecsvc.exe -
Suspicious use of WriteProcessMemory 6 IoCs
Processes:
rundll32.exerundll32.exedescription pid process target process PID 1724 wrote to memory of 4012 1724 rundll32.exe rundll32.exe PID 1724 wrote to memory of 4012 1724 rundll32.exe rundll32.exe PID 1724 wrote to memory of 4012 1724 rundll32.exe rundll32.exe PID 4012 wrote to memory of 464 4012 rundll32.exe mssecsvc.exe PID 4012 wrote to memory of 464 4012 rundll32.exe mssecsvc.exe PID 4012 wrote to memory of 464 4012 rundll32.exe mssecsvc.exe
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\7a60943b74e7d36a2b1b922f07432a83.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1724 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\7a60943b74e7d36a2b1b922f07432a83.dll,#12⤵
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:4012 -
C:\WINDOWS\mssecsvc.exeC:\WINDOWS\mssecsvc.exe3⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:464 -
C:\WINDOWS\tasksche.exeC:\WINDOWS\tasksche.exe /i4⤵
- Executes dropped EXE
PID:1152
-
C:\WINDOWS\mssecsvc.exeC:\WINDOWS\mssecsvc.exe -m security1⤵
- Executes dropped EXE
PID:260
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3.6MB
MD521c6f57c2537b69b693692525a9a9b7b
SHA1e16591bad0302a8d67a1088f49939fa63df939cc
SHA256ab3d3940cb490414874db8b24d670390c22c99966c3d15cf2cb7bd1342032bf3
SHA51201e1b44f691c8a4d7c84100bf2ed01bee0df96f9d7e1209aac4aa7c72738cc9d0e208a6533284498860af9fd9cca001349c4268d58283679e2e2e5d8688f7236
-
Filesize
3.6MB
MD521c6f57c2537b69b693692525a9a9b7b
SHA1e16591bad0302a8d67a1088f49939fa63df939cc
SHA256ab3d3940cb490414874db8b24d670390c22c99966c3d15cf2cb7bd1342032bf3
SHA51201e1b44f691c8a4d7c84100bf2ed01bee0df96f9d7e1209aac4aa7c72738cc9d0e208a6533284498860af9fd9cca001349c4268d58283679e2e2e5d8688f7236
-
Filesize
3.6MB
MD521c6f57c2537b69b693692525a9a9b7b
SHA1e16591bad0302a8d67a1088f49939fa63df939cc
SHA256ab3d3940cb490414874db8b24d670390c22c99966c3d15cf2cb7bd1342032bf3
SHA51201e1b44f691c8a4d7c84100bf2ed01bee0df96f9d7e1209aac4aa7c72738cc9d0e208a6533284498860af9fd9cca001349c4268d58283679e2e2e5d8688f7236
-
Filesize
3.4MB
MD58812b0e876464ebe1e95a2c3ce33ab86
SHA14f2e2c0314381fada60acd6906c6d496f29a9570
SHA25649e85257359b97b88df921b8dcd81c2c285b3bd746016c85a94dd35d5e609085
SHA512d6619145dcaa8131b7200a4cde1eec7b5d708fc3fa1334d229a28e6e70a018323c9e15f66fd4e06b151d9a367d258d2263548a050bde57bae462f631377ac8d7