Analysis
-
max time kernel
150s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
02-07-2024 18:52
Static task
static1
Behavioral task
behavioral1
Sample
464e7eba3b108d5e2345dba64a301cae607ade4f3854bb067a506166706794d8.dll
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
464e7eba3b108d5e2345dba64a301cae607ade4f3854bb067a506166706794d8.dll
Resource
win10v2004-20240508-en
General
-
Target
464e7eba3b108d5e2345dba64a301cae607ade4f3854bb067a506166706794d8.dll
-
Size
5.0MB
-
MD5
71bd4a312860c24c970394aba25d2ee4
-
SHA1
62d9cb05f6342204fa243b49e0460f620c531756
-
SHA256
464e7eba3b108d5e2345dba64a301cae607ade4f3854bb067a506166706794d8
-
SHA512
af171a1b9582c072adda6f8cf4b92dc91a40a9cceb53a212fd2905da75f3e4e9640fe3511089c2dd2808c7df6429183a5f8a9c55f5567e0c575f92c7c8db94a2
-
SSDEEP
24576:RbLgurgDdmMSirYbcMNgef0QeQjGZ6M+vbOSSqTPVXmiH:RnsEMSPbcBVQejl+TSqTdX1H
Malware Config
Signatures
-
Wannacry
WannaCry is a ransomware cryptoworm.
-
Contacts a large (2696) amount of remote hosts 1 TTPs
This may indicate a network scan to discover remotely running services.
-
Executes dropped EXE 2 IoCs
pid Process 212 mssecsvr.exe 3512 mssecsvr.exe -
Creates a large amount of network flows 1 TTPs
This may indicate a network scan to discover remotely running services.
-
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\WINDOWS\mssecsvr.exe rundll32.exe File created C:\WINDOWS\tasksche.exe mssecsvr.exe -
Modifies data under HKEY_USERS 5 IoCs
description ioc Process Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ProxyBypass = "1" mssecsvr.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\IntranetName = "1" mssecsvr.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\UNCAsIntranet = "1" mssecsvr.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\AutoDetect = "0" mssecsvr.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ mssecsvr.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 2196 wrote to memory of 5012 2196 rundll32.exe 81 PID 2196 wrote to memory of 5012 2196 rundll32.exe 81 PID 2196 wrote to memory of 5012 2196 rundll32.exe 81 PID 5012 wrote to memory of 212 5012 rundll32.exe 82 PID 5012 wrote to memory of 212 5012 rundll32.exe 82 PID 5012 wrote to memory of 212 5012 rundll32.exe 82
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\464e7eba3b108d5e2345dba64a301cae607ade4f3854bb067a506166706794d8.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:2196 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\464e7eba3b108d5e2345dba64a301cae607ade4f3854bb067a506166706794d8.dll,#12⤵
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:5012 -
C:\WINDOWS\mssecsvr.exeC:\WINDOWS\mssecsvr.exe3⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:212
-
-
-
C:\WINDOWS\mssecsvr.exeC:\WINDOWS\mssecsvr.exe -m security1⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
PID:3512
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2.2MB
MD5db4e800452e34eebc2d8751793a34f8c
SHA16d3d4ab240604d7ec8f2bceb26e825d250e50359
SHA256ecf02f7f35c19878a78eb38440dfdb257ca3e859741eea263cedcb34f9450ed9
SHA512b34f0fdeaf0f8d3b918d732ff965dcde2e77089962e3034ad5bde08fadf39bc73f9f11474263eecbdeffc3672abd706ab9d08907c33c1dc2810c2061088348f1