Resubmissions
04-07-2024 11:25
240704-njkn9sycpd 1004-07-2024 10:31
240704-mkf7sswbnj 1004-07-2024 09:44
240704-lqjpfaxarc 10Analysis
-
max time kernel
150s -
max time network
150s -
platform
windows7_x64 -
resource
win7-20240419-en -
resource tags
arch:x64arch:x86image:win7-20240419-enlocale:en-usos:windows7-x64system -
submitted
04-07-2024 09:44
Static task
static1
Behavioral task
behavioral1
Sample
8623833369df77caf48fea8fbb02991288ec704408a6b2ab8f080e50c073bde3.dll
Resource
win7-20240419-en
Behavioral task
behavioral2
Sample
8623833369df77caf48fea8fbb02991288ec704408a6b2ab8f080e50c073bde3.dll
Resource
win10v2004-20240611-en
General
-
Target
8623833369df77caf48fea8fbb02991288ec704408a6b2ab8f080e50c073bde3.dll
-
Size
5.0MB
-
MD5
ee5f76b5cc4312095074df3967b13617
-
SHA1
254d83a07c6171e926d624080d60c0715fb19f13
-
SHA256
8623833369df77caf48fea8fbb02991288ec704408a6b2ab8f080e50c073bde3
-
SHA512
2f9e0aeb58827a6564efc495e4e195a930c75e7892761346094af58a7250789bc55e80e88be73a80f60b4a403671eadbd9e98c5c88325a73d813e6102bef5fa4
-
SSDEEP
49152:znAQqMSPbcBVQej/1INRx+TSqTdX1HkQo6SAARdhnvxJM0H9:TDqPoBhz1aRxcSUDk36SAEdhvxWa9
Malware Config
Signatures
-
Wannacry
WannaCry is a ransomware cryptoworm.
-
Contacts a large (3102) amount of remote hosts 1 TTPs
This may indicate a network scan to discover remotely running services.
-
Executes dropped EXE 3 IoCs
pid Process 1628 mssecsvc.exe 2952 mssecsvc.exe 2624 tasksche.exe -
Creates a large amount of network flows 1 TTPs
This may indicate a network scan to discover remotely running services.
-
Drops file in System32 directory 1 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\Temporary Internet Files\counters.dat mssecsvc.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\WINDOWS\mssecsvc.exe rundll32.exe File created C:\WINDOWS\tasksche.exe mssecsvc.exe -
Modifies data under HKEY_USERS 24 IoCs
description ioc Process Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\SavedLegacySettings = 4600000002000000090000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 mssecsvc.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\UNCAsIntranet = "0" mssecsvc.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\AutoDetect = "1" mssecsvc.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\History\CachePrefix = "Visited:" mssecsvc.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{3F83ABE6-C52E-484D-9215-0F8583251404}\56-42-83-c4-9d-5b mssecsvc.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\56-42-83-c4-9d-5b\WpadDecisionReason = "1" mssecsvc.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ProxyEnable = "0" mssecsvc.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Content\CachePrefix mssecsvc.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Cookies\CachePrefix = "Cookie:" mssecsvc.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{3F83ABE6-C52E-484D-9215-0F8583251404}\WpadNetworkName = "Network 3" mssecsvc.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\56-42-83-c4-9d-5b\WpadDecision = "0" mssecsvc.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings mssecsvc.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{3F83ABE6-C52E-484D-9215-0F8583251404} mssecsvc.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{3F83ABE6-C52E-484D-9215-0F8583251404}\WpadDecisionTime = d0f53bbcf6cdda01 mssecsvc.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\56-42-83-c4-9d-5b mssecsvc.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\56-42-83-c4-9d-5b\WpadDecisionTime = d0f53bbcf6cdda01 mssecsvc.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings mssecsvc.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections mssecsvc.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\DefaultConnectionSettings = 4600000002000000090000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 mssecsvc.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ mssecsvc.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad mssecsvc.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\DefaultConnectionSettings = 4600000003000000090000000000000000000000000000000400000000000000000000000000000000000000000000000000000001000000020000000a7f00da000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 mssecsvc.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{3F83ABE6-C52E-484D-9215-0F8583251404}\WpadDecisionReason = "1" mssecsvc.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{3F83ABE6-C52E-484D-9215-0F8583251404}\WpadDecision = "0" mssecsvc.exe -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 2100 wrote to memory of 2084 2100 rundll32.exe 28 PID 2100 wrote to memory of 2084 2100 rundll32.exe 28 PID 2100 wrote to memory of 2084 2100 rundll32.exe 28 PID 2100 wrote to memory of 2084 2100 rundll32.exe 28 PID 2100 wrote to memory of 2084 2100 rundll32.exe 28 PID 2100 wrote to memory of 2084 2100 rundll32.exe 28 PID 2100 wrote to memory of 2084 2100 rundll32.exe 28 PID 2084 wrote to memory of 1628 2084 rundll32.exe 29 PID 2084 wrote to memory of 1628 2084 rundll32.exe 29 PID 2084 wrote to memory of 1628 2084 rundll32.exe 29 PID 2084 wrote to memory of 1628 2084 rundll32.exe 29
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\8623833369df77caf48fea8fbb02991288ec704408a6b2ab8f080e50c073bde3.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:2100 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\8623833369df77caf48fea8fbb02991288ec704408a6b2ab8f080e50c073bde3.dll,#12⤵
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:2084 -
C:\WINDOWS\mssecsvc.exeC:\WINDOWS\mssecsvc.exe3⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:1628 -
C:\WINDOWS\tasksche.exeC:\WINDOWS\tasksche.exe /i4⤵
- Executes dropped EXE
PID:2624
-
-
-
-
C:\WINDOWS\mssecsvc.exeC:\WINDOWS\mssecsvc.exe -m security1⤵
- Executes dropped EXE
- Drops file in System32 directory
- Modifies data under HKEY_USERS
PID:2952
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3.6MB
MD59890c9dbf8c659fa98130bba6c38683f
SHA142ae2ad8a47176f67f71f4b69552e37401a62d38
SHA256860069ce5390b85cfff852295d2113ea0d052003f8c769c20184962aae6b37d6
SHA512b5a196a8a9b25f57bc075ed117dbfe991f3cd7fff33f598cee5e1109caf749431221098098127fb2e0bdf8c820ccf236fe1a863c8f33c12dc7c055b33eca2d60
-
Filesize
3.4MB
MD5dbcd133912ef8b511909bceafe6eb16d
SHA1cdeb4dc71a6287ad3dc42de4ecd5cd160eae3ea2
SHA2565265873b0641f1875701a126fcf56d45d1f4a91de77ee4e1ca5507a5062c362a
SHA5121a5d5c78de9609bf60b62ab595dc4e1cd90ad9f3582b45052c1837578d10d86ab533340a3251db143ea19a8a157329bdd622a1ac88e3416883eab3b15a05a8cf