Analysis
-
max time kernel
150s -
max time network
159s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
02-07-2024 20:26
Static task
static1
Behavioral task
behavioral1
Sample
9443b99b4839e7df78a09682c686ff54464d3edd9635bd05cf3c5e6211215c85.dll
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
9443b99b4839e7df78a09682c686ff54464d3edd9635bd05cf3c5e6211215c85.dll
Resource
win10v2004-20240508-en
General
-
Target
9443b99b4839e7df78a09682c686ff54464d3edd9635bd05cf3c5e6211215c85.dll
-
Size
5.0MB
-
MD5
7823636f9ce01306178c1ee7772ad831
-
SHA1
8895257915c33299a6bc30b064267d5959aa4440
-
SHA256
9443b99b4839e7df78a09682c686ff54464d3edd9635bd05cf3c5e6211215c85
-
SHA512
bba25f09d4e6162a9d013343bec1b71fb1737e97bd3816fca3f366a33fdc3eee93bd6c6eb3097e7efed02aa325f55312fd6e1aff039b07d43d9376747b120e54
-
SSDEEP
12288:yvbLgPlu+QhMbaIMu7L5NVErCA4z2g6rTcbckPU82900Ve7zw+K+DWe:SbLgddQhfdmMSirYbcMNgef0Z
Malware Config
Signatures
-
Wannacry
WannaCry is a ransomware cryptoworm.
-
Contacts a large (2686) amount of remote hosts 1 TTPs
This may indicate a network scan to discover remotely running services.
-
Executes dropped EXE 3 IoCs
pid Process 1544 mssecsvc.exe 2860 mssecsvc.exe 216 tasksche.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\WINDOWS\tasksche.exe mssecsvc.exe File created C:\WINDOWS\mssecsvc.exe rundll32.exe -
Modifies data under HKEY_USERS 5 IoCs
description ioc Process Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\AutoDetect = "0" mssecsvc.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ mssecsvc.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ProxyBypass = "1" mssecsvc.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\IntranetName = "1" mssecsvc.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\UNCAsIntranet = "1" mssecsvc.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 4480 wrote to memory of 936 4480 rundll32.exe 81 PID 4480 wrote to memory of 936 4480 rundll32.exe 81 PID 4480 wrote to memory of 936 4480 rundll32.exe 81 PID 936 wrote to memory of 1544 936 rundll32.exe 82 PID 936 wrote to memory of 1544 936 rundll32.exe 82 PID 936 wrote to memory of 1544 936 rundll32.exe 82
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\9443b99b4839e7df78a09682c686ff54464d3edd9635bd05cf3c5e6211215c85.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:4480 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\9443b99b4839e7df78a09682c686ff54464d3edd9635bd05cf3c5e6211215c85.dll,#12⤵
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:936 -
C:\WINDOWS\mssecsvc.exeC:\WINDOWS\mssecsvc.exe3⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:1544 -
C:\WINDOWS\tasksche.exeC:\WINDOWS\tasksche.exe /i4⤵
- Executes dropped EXE
PID:216
-
-
-
-
C:\WINDOWS\mssecsvc.exeC:\WINDOWS\mssecsvc.exe -m security1⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
PID:2860
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3.6MB
MD515527dc4d7c60836e7f3458073fa8be9
SHA18d06fc2029c35e27069ddb6fd22b167f7fbe4b09
SHA256864ab3e65fcc93d75cea25920a24cd068cbd9a5b6d6f25bf625fc4e4e070848b
SHA51290117053131d77eda07bc5279535dcc0de5af787564c993878a2b006d85332675341bbcf4aaaa1c45a77c7fefa63262e9a9bff68aecb2d5ce5ed249cf21b30d2
-
Filesize
3.4MB
MD5a8ce75464228a717b735cf3105a702a9
SHA1e13da728e8e1461b05a670bf8af87fb22e83f2bd
SHA256b474d51deda614d1af02d050e2a1ab65388831baef98cd225273d112e55bb990
SHA51240996e61585b8386c6a4b8ab5f97213a27e138c2f7fb0a14a0b51415b9888eb869e960840a17077a4c1276b4ce9fa7a9710511f44c5179ea2fad1f7f2bd24baa