Analysis
-
max time kernel
150s -
max time network
150s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
04-07-2024 09:33
Static task
static1
Behavioral task
behavioral1
Sample
464e7eba3b108d5e2345dba64a301cae607ade4f3854bb067a506166706794d8.dll
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
464e7eba3b108d5e2345dba64a301cae607ade4f3854bb067a506166706794d8.dll
Resource
win10v2004-20240508-en
General
-
Target
464e7eba3b108d5e2345dba64a301cae607ade4f3854bb067a506166706794d8.dll
-
Size
5.0MB
-
MD5
71bd4a312860c24c970394aba25d2ee4
-
SHA1
62d9cb05f6342204fa243b49e0460f620c531756
-
SHA256
464e7eba3b108d5e2345dba64a301cae607ade4f3854bb067a506166706794d8
-
SHA512
af171a1b9582c072adda6f8cf4b92dc91a40a9cceb53a212fd2905da75f3e4e9640fe3511089c2dd2808c7df6429183a5f8a9c55f5567e0c575f92c7c8db94a2
-
SSDEEP
24576:RbLgurgDdmMSirYbcMNgef0QeQjGZ6M+vbOSSqTPVXmiH:RnsEMSPbcBVQejl+TSqTdX1H
Malware Config
Signatures
-
Wannacry
WannaCry is a ransomware cryptoworm.
-
Contacts a large (3270) amount of remote hosts 1 TTPs
This may indicate a network scan to discover remotely running services.
-
Executes dropped EXE 2 IoCs
pid Process 1196 mssecsvr.exe 2696 mssecsvr.exe -
Creates a large amount of network flows 1 TTPs
This may indicate a network scan to discover remotely running services.
-
Drops file in System32 directory 5 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\Temporary Internet Files\counters.dat mssecsvr.exe File created C:\Windows\SysWOW64\config\systemprofile\AppData\Roaming\Microsoft\Windows\Cookies\JXK2A065.txt mssecsvr.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Roaming\Microsoft\Windows\Cookies\JXK2A065.txt mssecsvr.exe File created C:\Windows\SysWOW64\config\systemprofile\AppData\Roaming\Microsoft\Windows\Cookies\BHR258JW.txt mssecsvr.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Roaming\Microsoft\Windows\Cookies\BHR258JW.txt mssecsvr.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\WINDOWS\mssecsvr.exe rundll32.exe File created C:\WINDOWS\tasksche.exe mssecsvr.exe -
Modifies data under HKEY_USERS 24 IoCs
description ioc Process Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings mssecsvr.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{A01742AB-C193-40E0-8E18-E8FFABDC3C98}\WpadDecisionTime = a0eff043f5cdda01 mssecsvr.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{A01742AB-C193-40E0-8E18-E8FFABDC3C98}\WpadDecision = "0" mssecsvr.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{A01742AB-C193-40E0-8E18-E8FFABDC3C98}\WpadDecisionReason = "1" mssecsvr.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\UNCAsIntranet = "0" mssecsvr.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\History\CachePrefix = "Visited:" mssecsvr.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{A01742AB-C193-40E0-8E18-E8FFABDC3C98} mssecsvr.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad mssecsvr.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\DefaultConnectionSettings = 4600000003000000090000000000000000000000000000000400000000000000000000000000000000000000000000000000000001000000020000000a7f0027000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 mssecsvr.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{A01742AB-C193-40E0-8E18-E8FFABDC3C98}\WpadNetworkName = "Network 3" mssecsvr.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{A01742AB-C193-40E0-8E18-E8FFABDC3C98}\2a-a4-8d-e0-8f-8d mssecsvr.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\2a-a4-8d-e0-8f-8d\WpadDecisionReason = "1" mssecsvr.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings mssecsvr.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\DefaultConnectionSettings = 4600000002000000090000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 mssecsvr.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\SavedLegacySettings = 4600000002000000090000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 mssecsvr.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\2a-a4-8d-e0-8f-8d\WpadDecision = "0" mssecsvr.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\AutoDetect = "1" mssecsvr.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Content\CachePrefix mssecsvr.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Cookies\CachePrefix = "Cookie:" mssecsvr.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\2a-a4-8d-e0-8f-8d mssecsvr.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\2a-a4-8d-e0-8f-8d\WpadDecisionTime = a0eff043f5cdda01 mssecsvr.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections mssecsvr.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ProxyEnable = "0" mssecsvr.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ mssecsvr.exe -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 1736 wrote to memory of 2472 1736 rundll32.exe 28 PID 1736 wrote to memory of 2472 1736 rundll32.exe 28 PID 1736 wrote to memory of 2472 1736 rundll32.exe 28 PID 1736 wrote to memory of 2472 1736 rundll32.exe 28 PID 1736 wrote to memory of 2472 1736 rundll32.exe 28 PID 1736 wrote to memory of 2472 1736 rundll32.exe 28 PID 1736 wrote to memory of 2472 1736 rundll32.exe 28 PID 2472 wrote to memory of 1196 2472 rundll32.exe 29 PID 2472 wrote to memory of 1196 2472 rundll32.exe 29 PID 2472 wrote to memory of 1196 2472 rundll32.exe 29 PID 2472 wrote to memory of 1196 2472 rundll32.exe 29
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\464e7eba3b108d5e2345dba64a301cae607ade4f3854bb067a506166706794d8.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1736 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\464e7eba3b108d5e2345dba64a301cae607ade4f3854bb067a506166706794d8.dll,#12⤵
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:2472 -
C:\WINDOWS\mssecsvr.exeC:\WINDOWS\mssecsvr.exe3⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:1196
-
-
-
C:\WINDOWS\mssecsvr.exeC:\WINDOWS\mssecsvr.exe -m security1⤵
- Executes dropped EXE
- Drops file in System32 directory
- Modifies data under HKEY_USERS
PID:2696
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2.2MB
MD5db4e800452e34eebc2d8751793a34f8c
SHA16d3d4ab240604d7ec8f2bceb26e825d250e50359
SHA256ecf02f7f35c19878a78eb38440dfdb257ca3e859741eea263cedcb34f9450ed9
SHA512b34f0fdeaf0f8d3b918d732ff965dcde2e77089962e3034ad5bde08fadf39bc73f9f11474263eecbdeffc3672abd706ab9d08907c33c1dc2810c2061088348f1