Resubmissions

04-07-2024 11:25

240704-njkn9sycpd 10

04-07-2024 10:31

240704-mkf7sswbnj 10

04-07-2024 09:44

240704-lqjpfaxarc 10

Analysis

  • max time kernel
    150s
  • max time network
    150s
  • platform
    windows7_x64
  • resource
    win7-20240508-en
  • resource tags

    arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system
  • submitted
    04-07-2024 10:31

General

  • Target

    8623833369df77caf48fea8fbb02991288ec704408a6b2ab8f080e50c073bde3.dll

  • Size

    5.0MB

  • MD5

    ee5f76b5cc4312095074df3967b13617

  • SHA1

    254d83a07c6171e926d624080d60c0715fb19f13

  • SHA256

    8623833369df77caf48fea8fbb02991288ec704408a6b2ab8f080e50c073bde3

  • SHA512

    2f9e0aeb58827a6564efc495e4e195a930c75e7892761346094af58a7250789bc55e80e88be73a80f60b4a403671eadbd9e98c5c88325a73d813e6102bef5fa4

  • SSDEEP

    49152:znAQqMSPbcBVQej/1INRx+TSqTdX1HkQo6SAARdhnvxJM0H9:TDqPoBhz1aRxcSUDk36SAEdhvxWa9

Malware Config

Signatures

  • Wannacry

    WannaCry is a ransomware cryptoworm.

  • Contacts a large (3236) amount of remote hosts 1 TTPs

    This may indicate a network scan to discover remotely running services.

  • Executes dropped EXE 3 IoCs
  • Creates a large amount of network flows 1 TTPs

    This may indicate a network scan to discover remotely running services.

  • Drops file in System32 directory 1 IoCs
  • Drops file in Windows directory 2 IoCs
  • Modifies data under HKEY_USERS 24 IoCs
  • Suspicious use of WriteProcessMemory 11 IoCs

Processes

  • C:\Windows\system32\rundll32.exe
    rundll32.exe C:\Users\Admin\AppData\Local\Temp\8623833369df77caf48fea8fbb02991288ec704408a6b2ab8f080e50c073bde3.dll,#1
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:3008
    • C:\Windows\SysWOW64\rundll32.exe
      rundll32.exe C:\Users\Admin\AppData\Local\Temp\8623833369df77caf48fea8fbb02991288ec704408a6b2ab8f080e50c073bde3.dll,#1
      2⤵
      • Drops file in Windows directory
      • Suspicious use of WriteProcessMemory
      PID:2400
      • C:\WINDOWS\mssecsvc.exe
        C:\WINDOWS\mssecsvc.exe
        3⤵
        • Executes dropped EXE
        • Drops file in Windows directory
        PID:3020
        • C:\WINDOWS\tasksche.exe
          C:\WINDOWS\tasksche.exe /i
          4⤵
          • Executes dropped EXE
          PID:2784
  • C:\WINDOWS\mssecsvc.exe
    C:\WINDOWS\mssecsvc.exe -m security
    1⤵
    • Executes dropped EXE
    • Drops file in System32 directory
    • Modifies data under HKEY_USERS
    PID:2684

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Windows\mssecsvc.exe

    Filesize

    3.6MB

    MD5

    9890c9dbf8c659fa98130bba6c38683f

    SHA1

    42ae2ad8a47176f67f71f4b69552e37401a62d38

    SHA256

    860069ce5390b85cfff852295d2113ea0d052003f8c769c20184962aae6b37d6

    SHA512

    b5a196a8a9b25f57bc075ed117dbfe991f3cd7fff33f598cee5e1109caf749431221098098127fb2e0bdf8c820ccf236fe1a863c8f33c12dc7c055b33eca2d60

  • C:\Windows\tasksche.exe

    Filesize

    3.4MB

    MD5

    dbcd133912ef8b511909bceafe6eb16d

    SHA1

    cdeb4dc71a6287ad3dc42de4ecd5cd160eae3ea2

    SHA256

    5265873b0641f1875701a126fcf56d45d1f4a91de77ee4e1ca5507a5062c362a

    SHA512

    1a5d5c78de9609bf60b62ab595dc4e1cd90ad9f3582b45052c1837578d10d86ab533340a3251db143ea19a8a157329bdd622a1ac88e3416883eab3b15a05a8cf