Resubmissions

25-03-2024 16:24

240325-twmx2sfe7x 10

25-03-2024 16:11

240325-tnb6ksce86 10

Analysis

  • max time kernel
    300s
  • max time network
    301s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    25-03-2024 16:24

General

  • Target

    ce223b231f2862124386c585e9b95ca1.dll

  • Size

    5.0MB

  • MD5

    ce223b231f2862124386c585e9b95ca1

  • SHA1

    61673e2be7e3479a818eb98339692bc7e4a5b79c

  • SHA256

    92bc02116a72b13d359ba88e0984ea09d2eb230fbf711d92a0c961e08274a09e

  • SHA512

    dede42923cae7167fcff56ae1131e6cb5a9c8ef14d76d1be84211504685d628fa1abf658a7ec89d0bca976c35ef6eb58f93e4f59ffcc4c27468e3e44c0ac4faa

  • SSDEEP

    12288:TQbLgmluyQhMbaIMu7L5NVErCA4z2g6rTcbckPU82900Ve7zw+K+DHeQYSUjEXF5:MbLguVQhfdmMSirYbcMNgef0QeQjG

Malware Config

Signatures

  • Wannacry

    WannaCry is a ransomware cryptoworm.

  • Contacts a large (7583) amount of remote hosts 1 TTPs

    This may indicate a network scan to discover remotely running services.

  • Executes dropped EXE 2 IoCs
  • Creates a large amount of network flows 1 TTPs

    This may indicate a network scan to discover remotely running services.

  • Drops file in System32 directory 3 IoCs
  • Drops file in Windows directory 2 IoCs
  • Modifies data under HKEY_USERS 24 IoCs
  • Suspicious use of AdjustPrivilegeToken 46 IoCs
  • Suspicious use of SetWindowsHookEx 4 IoCs
  • Suspicious use of WriteProcessMemory 17 IoCs

Processes

  • C:\Windows\system32\rundll32.exe
    rundll32.exe C:\Users\Admin\AppData\Local\Temp\ce223b231f2862124386c585e9b95ca1.dll,#1
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2520
    • C:\Windows\SysWOW64\rundll32.exe
      rundll32.exe C:\Users\Admin\AppData\Local\Temp\ce223b231f2862124386c585e9b95ca1.dll,#1
      2⤵
      • Drops file in Windows directory
      • Suspicious use of WriteProcessMemory
      PID:2764
      • C:\WINDOWS\mssecsvr.exe
        C:\WINDOWS\mssecsvr.exe
        3⤵
        • Executes dropped EXE
        • Drops file in Windows directory
        PID:2912
  • C:\WINDOWS\mssecsvr.exe
    C:\WINDOWS\mssecsvr.exe -m security
    1⤵
    • Executes dropped EXE
    • Drops file in System32 directory
    • Modifies data under HKEY_USERS
    PID:2716
  • C:\Windows\system32\mmc.exe
    "C:\Windows\system32\mmc.exe" "C:\Windows\system32\eventvwr.msc" /s
    1⤵
    • Drops file in System32 directory
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2300
    • C:\Windows\Microsoft.NET\Framework64\v2.0.50727\dw20.exe
      dw20.exe -x -s 1188
      2⤵
        PID:112
    • C:\Windows\system32\mmc.exe
      "C:\Windows\system32\mmc.exe" "C:\Windows\system32\eventvwr.msc" /s
      1⤵
      • Drops file in System32 directory
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:2452
      • C:\Windows\Microsoft.NET\Framework64\v2.0.50727\dw20.exe
        dw20.exe -x -s 1196
        2⤵
          PID:2684

      Network

      MITRE ATT&CK Enterprise v15

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Windows\mssecsvr.exe

        Filesize

        2.2MB

        MD5

        60a91a498c0f1ffddef484c5a4d42564

        SHA1

        a15dcd408c0aee1f5f38b50528583bdee6536227

        SHA256

        03dc66c9970481c5958d247f9eba93a6a7ad9f9bbf94845b9fbea8ed1e1e0757

        SHA512

        e7b7a308227fc3c72d8d1bd262389257e1f2fa419f6ceff58f73a06f850245f6e1068ea74cf42388ee2ca2712d7b5d9a2ce0e6f7264c3885b82c1caa70891e55

      • memory/112-23-0x00000000023D0000-0x00000000023D1000-memory.dmp

        Filesize

        4KB

      • memory/2300-15-0x0000000004920000-0x00000000049A0000-memory.dmp

        Filesize

        512KB

      • memory/2300-19-0x0000000004920000-0x00000000049A0000-memory.dmp

        Filesize

        512KB

      • memory/2300-11-0x0000000004920000-0x00000000049A0000-memory.dmp

        Filesize

        512KB

      • memory/2300-25-0x000007FEF4B20000-0x000007FEF54BD000-memory.dmp

        Filesize

        9.6MB

      • memory/2300-13-0x0000000004920000-0x00000000049A0000-memory.dmp

        Filesize

        512KB

      • memory/2300-14-0x000000001D6C0000-0x000000001DA06000-memory.dmp

        Filesize

        3.3MB

      • memory/2300-9-0x0000000002920000-0x000000000293E000-memory.dmp

        Filesize

        120KB

      • memory/2300-22-0x0000000004920000-0x00000000049A0000-memory.dmp

        Filesize

        512KB

      • memory/2300-20-0x0000000004920000-0x00000000049A0000-memory.dmp

        Filesize

        512KB

      • memory/2300-21-0x000007FFFFF00000-0x000007FFFFF10000-memory.dmp

        Filesize

        64KB

      • memory/2300-18-0x0000000004920000-0x00000000049A0000-memory.dmp

        Filesize

        512KB

      • memory/2300-17-0x0000000004920000-0x00000000049A0000-memory.dmp

        Filesize

        512KB

      • memory/2300-16-0x0000000004920000-0x00000000049A0000-memory.dmp

        Filesize

        512KB

      • memory/2300-10-0x000007FEF4B20000-0x000007FEF54BD000-memory.dmp

        Filesize

        9.6MB

      • memory/2300-8-0x00000000021B0000-0x00000000021B1000-memory.dmp

        Filesize

        4KB

      • memory/2300-24-0x00000000021B0000-0x00000000021B1000-memory.dmp

        Filesize

        4KB

      • memory/2300-12-0x000007FEF4B20000-0x000007FEF54BD000-memory.dmp

        Filesize

        9.6MB

      • memory/2452-29-0x0000000004B80000-0x0000000004C00000-memory.dmp

        Filesize

        512KB

      • memory/2452-37-0x0000000004B80000-0x0000000004C00000-memory.dmp

        Filesize

        512KB

      • memory/2452-28-0x000007FEF4AE0000-0x000007FEF547D000-memory.dmp

        Filesize

        9.6MB

      • memory/2452-38-0x0000000004B80000-0x0000000004C00000-memory.dmp

        Filesize

        512KB

      • memory/2452-27-0x0000000002700000-0x000000000271E000-memory.dmp

        Filesize

        120KB

      • memory/2452-31-0x000000001D8F0000-0x000000001DC36000-memory.dmp

        Filesize

        3.3MB

      • memory/2452-32-0x0000000004B80000-0x0000000004C00000-memory.dmp

        Filesize

        512KB

      • memory/2452-26-0x0000000002150000-0x0000000002151000-memory.dmp

        Filesize

        4KB

      • memory/2452-30-0x000007FEF4AE0000-0x000007FEF547D000-memory.dmp

        Filesize

        9.6MB

      • memory/2452-33-0x0000000004B80000-0x0000000004C00000-memory.dmp

        Filesize

        512KB

      • memory/2452-36-0x0000000004B80000-0x0000000004C00000-memory.dmp

        Filesize

        512KB

      • memory/2452-35-0x0000000004B80000-0x0000000004C00000-memory.dmp

        Filesize

        512KB

      • memory/2452-34-0x0000000004B80000-0x0000000004C00000-memory.dmp

        Filesize

        512KB

      • memory/2452-39-0x0000000004B80000-0x0000000004C00000-memory.dmp

        Filesize

        512KB

      • memory/2452-41-0x000007FEF4AE0000-0x000007FEF547D000-memory.dmp

        Filesize

        9.6MB

      • memory/2684-40-0x0000000000460000-0x0000000000461000-memory.dmp

        Filesize

        4KB