Analysis
-
max time kernel
150s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20240611-en -
resource tags
arch:x64arch:x86image:win10v2004-20240611-enlocale:en-usos:windows10-2004-x64system -
submitted
04-07-2024 09:45
Static task
static1
Behavioral task
behavioral1
Sample
9443b99b4839e7df78a09682c686ff54464d3edd9635bd05cf3c5e6211215c85.dll
Resource
win7-20240419-en
Behavioral task
behavioral2
Sample
9443b99b4839e7df78a09682c686ff54464d3edd9635bd05cf3c5e6211215c85.dll
Resource
win10v2004-20240611-en
General
-
Target
9443b99b4839e7df78a09682c686ff54464d3edd9635bd05cf3c5e6211215c85.dll
-
Size
5.0MB
-
MD5
7823636f9ce01306178c1ee7772ad831
-
SHA1
8895257915c33299a6bc30b064267d5959aa4440
-
SHA256
9443b99b4839e7df78a09682c686ff54464d3edd9635bd05cf3c5e6211215c85
-
SHA512
bba25f09d4e6162a9d013343bec1b71fb1737e97bd3816fca3f366a33fdc3eee93bd6c6eb3097e7efed02aa325f55312fd6e1aff039b07d43d9376747b120e54
-
SSDEEP
12288:yvbLgPlu+QhMbaIMu7L5NVErCA4z2g6rTcbckPU82900Ve7zw+K+DWe:SbLgddQhfdmMSirYbcMNgef0Z
Malware Config
Signatures
-
Wannacry
WannaCry is a ransomware cryptoworm.
-
Contacts a large (3349) amount of remote hosts 1 TTPs
This may indicate a network scan to discover remotely running services.
-
Executes dropped EXE 3 IoCs
pid Process 3400 mssecsvc.exe 4576 mssecsvc.exe 4484 tasksche.exe -
Creates a large amount of network flows 1 TTPs
This may indicate a network scan to discover remotely running services.
-
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\WINDOWS\tasksche.exe mssecsvc.exe File created C:\WINDOWS\mssecsvc.exe rundll32.exe -
Modifies data under HKEY_USERS 5 IoCs
description ioc Process Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\UNCAsIntranet = "1" mssecsvc.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\AutoDetect = "0" mssecsvc.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ mssecsvc.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ProxyBypass = "1" mssecsvc.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\IntranetName = "1" mssecsvc.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 4488 wrote to memory of 3268 4488 rundll32.exe 94 PID 4488 wrote to memory of 3268 4488 rundll32.exe 94 PID 4488 wrote to memory of 3268 4488 rundll32.exe 94 PID 3268 wrote to memory of 3400 3268 rundll32.exe 95 PID 3268 wrote to memory of 3400 3268 rundll32.exe 95 PID 3268 wrote to memory of 3400 3268 rundll32.exe 95
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\9443b99b4839e7df78a09682c686ff54464d3edd9635bd05cf3c5e6211215c85.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:4488 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\9443b99b4839e7df78a09682c686ff54464d3edd9635bd05cf3c5e6211215c85.dll,#12⤵
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:3268 -
C:\WINDOWS\mssecsvc.exeC:\WINDOWS\mssecsvc.exe3⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:3400 -
C:\WINDOWS\tasksche.exeC:\WINDOWS\tasksche.exe /i4⤵
- Executes dropped EXE
PID:4484
-
-
-
-
C:\WINDOWS\mssecsvc.exeC:\WINDOWS\mssecsvc.exe -m security1⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
PID:4576
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --field-trial-handle=4192,i,2029050989380753659,15333598055019363793,262144 --variations-seed-version --mojo-platform-channel-handle=4540 /prefetch:81⤵PID:4876
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3.6MB
MD515527dc4d7c60836e7f3458073fa8be9
SHA18d06fc2029c35e27069ddb6fd22b167f7fbe4b09
SHA256864ab3e65fcc93d75cea25920a24cd068cbd9a5b6d6f25bf625fc4e4e070848b
SHA51290117053131d77eda07bc5279535dcc0de5af787564c993878a2b006d85332675341bbcf4aaaa1c45a77c7fefa63262e9a9bff68aecb2d5ce5ed249cf21b30d2
-
Filesize
3.4MB
MD5a8ce75464228a717b735cf3105a702a9
SHA1e13da728e8e1461b05a670bf8af87fb22e83f2bd
SHA256b474d51deda614d1af02d050e2a1ab65388831baef98cd225273d112e55bb990
SHA51240996e61585b8386c6a4b8ab5f97213a27e138c2f7fb0a14a0b51415b9888eb869e960840a17077a4c1276b4ce9fa7a9710511f44c5179ea2fad1f7f2bd24baa