Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
22/12/2023, 02:54
Static task
static1
Behavioral task
behavioral1
Sample
5731423bdd4b80b4e8a1909abef784f4.dll
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
5731423bdd4b80b4e8a1909abef784f4.dll
Resource
win10v2004-20231215-en
General
-
Target
5731423bdd4b80b4e8a1909abef784f4.dll
-
Size
5.0MB
-
MD5
5731423bdd4b80b4e8a1909abef784f4
-
SHA1
eb81706c0a8ba8374968aaa221bf09ade1e12f00
-
SHA256
0373ca1f4a99994da7eda257fcf8bd7050a126287e1cbae051a063df5abe4959
-
SHA512
e9aac8251a2f16678465fd20cbe7742087a66921cc7505fca5c053a5a189c4b2f92c8dcf8230dad758b84a1f98e3a234469c69aa4b4d1afaf7ccae9b5c946474
-
SSDEEP
49152:RnhqMSPbcBVQej/1INRx+TSqTdd1HkQo6SAARdhn:1hqPoBhz1aRxcSUZk36SAEdh
Malware Config
Signatures
-
Wannacry
WannaCry is a ransomware cryptoworm.
-
Contacts a large (3213) amount of remote hosts 1 TTPs
This may indicate a network scan to discover remotely running services.
-
Executes dropped EXE 2 IoCs
pid Process 4228 mssecsvr.exe 2472 mssecsvr.exe -
Creates a large amount of network flows 1 TTPs
This may indicate a network scan to discover remotely running services.
-
Drops file in System32 directory 4 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\INetCookies mssecsvr.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\History\History.IE5 mssecsvr.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\INetCache\Content.IE5 mssecsvr.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\INetCache\IE mssecsvr.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\WINDOWS\mssecsvr.exe rundll32.exe File created C:\WINDOWS\tasksche.exe mssecsvr.exe -
Modifies data under HKEY_USERS 15 IoCs
description ioc Process Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion mssecsvr.exe Key created \REGISTRY\USER\.DEFAULT\Software mssecsvr.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows mssecsvr.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\History\CachePrefix = "Visited:" mssecsvr.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\IntranetName = "1" mssecsvr.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Content\CachePrefix mssecsvr.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Cookies\CachePrefix = "Cookie:" mssecsvr.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\UNCAsIntranet = "1" mssecsvr.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ProxyBypass = "1" mssecsvr.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\AutoDetect = "0" mssecsvr.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\P3P\History mssecsvr.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft mssecsvr.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings mssecsvr.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\P3P mssecsvr.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ mssecsvr.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 4872 wrote to memory of 3632 4872 rundll32.exe 87 PID 4872 wrote to memory of 3632 4872 rundll32.exe 87 PID 4872 wrote to memory of 3632 4872 rundll32.exe 87 PID 3632 wrote to memory of 4228 3632 rundll32.exe 88 PID 3632 wrote to memory of 4228 3632 rundll32.exe 88 PID 3632 wrote to memory of 4228 3632 rundll32.exe 88
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\5731423bdd4b80b4e8a1909abef784f4.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:4872 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\5731423bdd4b80b4e8a1909abef784f4.dll,#12⤵
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:3632 -
C:\WINDOWS\mssecsvr.exeC:\WINDOWS\mssecsvr.exe3⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:4228
-
-
-
C:\WINDOWS\mssecsvr.exeC:\WINDOWS\mssecsvr.exe -m security1⤵
- Executes dropped EXE
- Drops file in System32 directory
- Modifies data under HKEY_USERS
PID:2472
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2.2MB
MD5f776768c678108a3a91893a184a8caad
SHA11681e4b030314d16011f510b970dc29db9ba45f9
SHA256d5210c77c1efe449cd81312f235aaacaac647e330ad65e3ddcf47040ce11fdd1
SHA51254aedff5e5ab80db9bcab5fc3d2b490ba5d548589cf1ffe195101ea44068a9aa72d68f281f1472c70d80488bbe0e521f1828aaadfb45490dff3816deda0a66be
-
Filesize
2.0MB
MD55eddabbe06fafce645c85b2b6d63ee9d
SHA1628e4205b06108b11419ae1b4352ea6660b02626
SHA256635da44e3b068ba8beb170040b5596b7e95d58a8a00bcb62def2f843751fc3ea
SHA512abdf79ecb6c20bb7fc297328da1a7d51aaf528b8a11424b37e600b113ebff4b7f8e7e4bc4b9d5d878194ff7a5bf6c7ca5850f11ca5fd596d4280ec46fe8f0588
-
Filesize
1.0MB
MD560f6c8835e564b76c0a7f86e14181d0f
SHA19d93fd2ff6ffe40f7278fe8f2743ee5ec023645d
SHA256c7f3a2e4a91b00d54016c255de134b6375149392da6edbc5dcaf3435e9f44549
SHA512ac3b09bc423389bab528767e8cd277eaecfe894c59dfe755d654e00be83e3759fc7051116393f7fc3e9036fe76b4b3c0928f95569e390f22c50c0e1ecc0876d2