Analysis
-
max time kernel
120s -
max time network
121s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
12-09-2024 01:46
Static task
static1
Behavioral task
behavioral1
Sample
d65a8271ee567a12f3a558876e630d00N.dll
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
d65a8271ee567a12f3a558876e630d00N.dll
Resource
win10v2004-20240802-en
General
-
Target
d65a8271ee567a12f3a558876e630d00N.dll
-
Size
5.0MB
-
MD5
d65a8271ee567a12f3a558876e630d00
-
SHA1
c6245cf9f029cd5ddf647d8a2c8650295b54cc32
-
SHA256
75af5c958601b8319dfc63678f0861dc715456ce1815abe16298e9e21fb3f1a3
-
SHA512
d8a0c6aba930e49912ed5224e22add82cf8c5d76cc550ba2dbb50a717c58a7e8c48a83c9a18d04fdea5d35fc918c95dbcbeecaf414514184710288d430e84a49
-
SSDEEP
98304:Y8qPoBhz1aRxcSUDk36SAEdhvxWa9P593R8s3:Y8qPe1Cxcxk3ZAEUadzR8s
Malware Config
Signatures
-
Modifies firewall policy service 3 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List\C:\WINDOWS\mssecsvc.exe = "C:\\WINDOWS\\mssecsvc.exe:*:enabled:@shell32.dll,-1" mssecsvc.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List mssecsvc.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile mssecsvc.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications mssecsvc.exe -
Wannacry
WannaCry is a ransomware cryptoworm.
-
Contacts a large (2297) amount of remote hosts 1 TTPs
This may indicate a network scan to discover remotely running services.
-
Executes dropped EXE 2 IoCs
pid Process 3952 mssecsvc.exe 2396 mssecsvc.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\WINDOWS\mssecsvc.exe rundll32.exe File created C:\WINDOWS\tasksche.exe mssecsvc.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 3024 3952 WerFault.exe 84 -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mssecsvc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mssecsvc.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 3952 mssecsvc.exe 3952 mssecsvc.exe 2396 mssecsvc.exe 2396 mssecsvc.exe -
Suspicious behavior: MapViewOfSection 64 IoCs
pid Process 3952 mssecsvc.exe 3952 mssecsvc.exe 3952 mssecsvc.exe 3952 mssecsvc.exe 3952 mssecsvc.exe 3952 mssecsvc.exe 3952 mssecsvc.exe 3952 mssecsvc.exe 3952 mssecsvc.exe 3952 mssecsvc.exe 3952 mssecsvc.exe 3952 mssecsvc.exe 3952 mssecsvc.exe 3952 mssecsvc.exe 3952 mssecsvc.exe 3952 mssecsvc.exe 3952 mssecsvc.exe 3952 mssecsvc.exe 3952 mssecsvc.exe 3952 mssecsvc.exe 3952 mssecsvc.exe 3952 mssecsvc.exe 3952 mssecsvc.exe 3952 mssecsvc.exe 3952 mssecsvc.exe 3952 mssecsvc.exe 3952 mssecsvc.exe 3952 mssecsvc.exe 3952 mssecsvc.exe 3952 mssecsvc.exe 3952 mssecsvc.exe 3952 mssecsvc.exe 3952 mssecsvc.exe 3952 mssecsvc.exe 3952 mssecsvc.exe 3952 mssecsvc.exe 3952 mssecsvc.exe 3952 mssecsvc.exe 3952 mssecsvc.exe 3952 mssecsvc.exe 3952 mssecsvc.exe 3952 mssecsvc.exe 3952 mssecsvc.exe 3952 mssecsvc.exe 3952 mssecsvc.exe 3952 mssecsvc.exe 3952 mssecsvc.exe 3952 mssecsvc.exe 3952 mssecsvc.exe 3952 mssecsvc.exe 3952 mssecsvc.exe 3952 mssecsvc.exe 3952 mssecsvc.exe 3952 mssecsvc.exe 3952 mssecsvc.exe 3952 mssecsvc.exe 3952 mssecsvc.exe 3952 mssecsvc.exe 3952 mssecsvc.exe 3952 mssecsvc.exe 3952 mssecsvc.exe 3952 mssecsvc.exe 3952 mssecsvc.exe 3952 mssecsvc.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 3952 mssecsvc.exe Token: SeDebugPrivilege 2396 mssecsvc.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1980 wrote to memory of 3036 1980 rundll32.exe 83 PID 1980 wrote to memory of 3036 1980 rundll32.exe 83 PID 1980 wrote to memory of 3036 1980 rundll32.exe 83 PID 3036 wrote to memory of 3952 3036 rundll32.exe 84 PID 3036 wrote to memory of 3952 3036 rundll32.exe 84 PID 3036 wrote to memory of 3952 3036 rundll32.exe 84 PID 3952 wrote to memory of 612 3952 mssecsvc.exe 5 PID 3952 wrote to memory of 612 3952 mssecsvc.exe 5 PID 3952 wrote to memory of 612 3952 mssecsvc.exe 5 PID 3952 wrote to memory of 612 3952 mssecsvc.exe 5 PID 3952 wrote to memory of 612 3952 mssecsvc.exe 5 PID 3952 wrote to memory of 612 3952 mssecsvc.exe 5 PID 3952 wrote to memory of 668 3952 mssecsvc.exe 7 PID 3952 wrote to memory of 668 3952 mssecsvc.exe 7 PID 3952 wrote to memory of 668 3952 mssecsvc.exe 7 PID 3952 wrote to memory of 668 3952 mssecsvc.exe 7 PID 3952 wrote to memory of 668 3952 mssecsvc.exe 7 PID 3952 wrote to memory of 668 3952 mssecsvc.exe 7 PID 3952 wrote to memory of 776 3952 mssecsvc.exe 8 PID 3952 wrote to memory of 776 3952 mssecsvc.exe 8 PID 3952 wrote to memory of 776 3952 mssecsvc.exe 8 PID 3952 wrote to memory of 776 3952 mssecsvc.exe 8 PID 3952 wrote to memory of 776 3952 mssecsvc.exe 8 PID 3952 wrote to memory of 776 3952 mssecsvc.exe 8 PID 3952 wrote to memory of 784 3952 mssecsvc.exe 9 PID 3952 wrote to memory of 784 3952 mssecsvc.exe 9 PID 3952 wrote to memory of 784 3952 mssecsvc.exe 9 PID 3952 wrote to memory of 784 3952 mssecsvc.exe 9 PID 3952 wrote to memory of 784 3952 mssecsvc.exe 9 PID 3952 wrote to memory of 784 3952 mssecsvc.exe 9 PID 3952 wrote to memory of 792 3952 mssecsvc.exe 10 PID 3952 wrote to memory of 792 3952 mssecsvc.exe 10 PID 3952 wrote to memory of 792 3952 mssecsvc.exe 10 PID 3952 wrote to memory of 792 3952 mssecsvc.exe 10 PID 3952 wrote to memory of 792 3952 mssecsvc.exe 10 PID 3952 wrote to memory of 792 3952 mssecsvc.exe 10 PID 3952 wrote to memory of 900 3952 mssecsvc.exe 11 PID 3952 wrote to memory of 900 3952 mssecsvc.exe 11 PID 3952 wrote to memory of 900 3952 mssecsvc.exe 11 PID 3952 wrote to memory of 900 3952 mssecsvc.exe 11 PID 3952 wrote to memory of 900 3952 mssecsvc.exe 11 PID 3952 wrote to memory of 900 3952 mssecsvc.exe 11 PID 3952 wrote to memory of 952 3952 mssecsvc.exe 12 PID 3952 wrote to memory of 952 3952 mssecsvc.exe 12 PID 3952 wrote to memory of 952 3952 mssecsvc.exe 12 PID 3952 wrote to memory of 952 3952 mssecsvc.exe 12 PID 3952 wrote to memory of 952 3952 mssecsvc.exe 12 PID 3952 wrote to memory of 952 3952 mssecsvc.exe 12 PID 3952 wrote to memory of 60 3952 mssecsvc.exe 13 PID 3952 wrote to memory of 60 3952 mssecsvc.exe 13 PID 3952 wrote to memory of 60 3952 mssecsvc.exe 13 PID 3952 wrote to memory of 60 3952 mssecsvc.exe 13 PID 3952 wrote to memory of 60 3952 mssecsvc.exe 13 PID 3952 wrote to memory of 60 3952 mssecsvc.exe 13 PID 3952 wrote to memory of 388 3952 mssecsvc.exe 14 PID 3952 wrote to memory of 388 3952 mssecsvc.exe 14 PID 3952 wrote to memory of 388 3952 mssecsvc.exe 14 PID 3952 wrote to memory of 388 3952 mssecsvc.exe 14 PID 3952 wrote to memory of 388 3952 mssecsvc.exe 14 PID 3952 wrote to memory of 388 3952 mssecsvc.exe 14 PID 3952 wrote to memory of 948 3952 mssecsvc.exe 15 PID 3952 wrote to memory of 948 3952 mssecsvc.exe 15 PID 3952 wrote to memory of 948 3952 mssecsvc.exe 15 PID 3952 wrote to memory of 948 3952 mssecsvc.exe 15
Processes
-
C:\Windows\system32\winlogon.exewinlogon.exe1⤵PID:612
-
C:\Windows\system32\fontdrvhost.exe"fontdrvhost.exe"2⤵PID:776
-
-
C:\Windows\system32\dwm.exe"dwm.exe"2⤵PID:60
-
-
C:\Windows\system32\lsass.exeC:\Windows\system32\lsass.exe1⤵PID:668
-
C:\Windows\system32\fontdrvhost.exe"fontdrvhost.exe"1⤵PID:784
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k DcomLaunch -p1⤵PID:792
-
C:\Windows\system32\wbem\unsecapp.exeC:\Windows\system32\wbem\unsecapp.exe -Embedding2⤵PID:2928
-
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}2⤵PID:3768
-
-
C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe"C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca2⤵PID:3860
-
-
C:\Windows\System32\RuntimeBroker.exeC:\Windows\System32\RuntimeBroker.exe -Embedding2⤵PID:3924
-
-
C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe"C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca2⤵PID:4016
-
-
C:\Windows\System32\RuntimeBroker.exeC:\Windows\System32\RuntimeBroker.exe -Embedding2⤵PID:3424
-
-
C:\Windows\system32\SppExtComObj.exeC:\Windows\system32\SppExtComObj.exe -Embedding2⤵PID:1600
-
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}2⤵PID:908
-
-
C:\Windows\SystemApps\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\InputApp\TextInputHost.exe"C:\Windows\SystemApps\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\InputApp\TextInputHost.exe" -ServerName:InputApp.AppX9jnwykgrccxc8by3hsrsh07r423xzvav.mca2⤵PID:4416
-
-
C:\Windows\System32\RuntimeBroker.exeC:\Windows\System32\RuntimeBroker.exe -Embedding2⤵PID:2160
-
-
C:\Windows\system32\backgroundTaskHost.exe"C:\Windows\system32\backgroundTaskHost.exe" -ServerName:App.AppXmtcan0h2tfbfy7k9kn8hbxb6dmzz1zh0.mca2⤵PID:624
-
-
C:\Windows\System32\RuntimeBroker.exeC:\Windows\System32\RuntimeBroker.exe -Embedding2⤵PID:1276
-
-
C:\Windows\System32\RuntimeBroker.exeC:\Windows\System32\RuntimeBroker.exe -Embedding2⤵PID:4872
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k RPCSS -p1⤵PID:900
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k DcomLaunch -p -s LSM1⤵PID:952
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s gpsvc1⤵PID:388
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalServiceNoNetwork -p1⤵PID:948
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted -p -s lmhosts1⤵PID:996
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted -p -s NcbService1⤵PID:1128
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted -p -s EventLog1⤵PID:1136
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalServiceNetworkRestricted -p -s TimeBrokerSvc1⤵PID:1144
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s Schedule1⤵PID:1152
-
C:\Windows\system32\taskhostw.exetaskhostw.exe {222A245B-E637-4AE9-A93F-A59CA119A75E}2⤵PID:772
-
-
C:\Windows\system32\MusNotification.exeC:\Windows\system32\MusNotification.exe2⤵PID:2204
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalService -p -s DispBrokerDesktopSvc1⤵PID:1268
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s ProfSvc1⤵PID:1300
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalService -p -s nsi1⤵PID:1316
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalServiceNetworkRestricted -p -s Dhcp1⤵PID:1384
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s UserManager1⤵PID:1408
-
C:\Windows\system32\sihost.exesihost.exe2⤵PID:2952
-
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k netsvcs -p -s Themes1⤵PID:1556
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalService -p -s EventSystem1⤵PID:1572
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k NetworkService -p -s NlaSvc1⤵PID:1616
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s SENS1⤵PID:1680
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted -p -s AudioEndpointBuilder1⤵PID:1708
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalService -p -s netprofm1⤵PID:1772
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted -p1⤵PID:1788
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted -p1⤵PID:1876
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k NetworkService -p -s Dnscache1⤵PID:1892
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k netsvcs -p -s ShellHWDetection1⤵PID:1940
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k appmodel -p -s StateRepository1⤵PID:1948
-
C:\Windows\System32\spoolsv.exeC:\Windows\System32\spoolsv.exe1⤵PID:1816
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalServiceNoNetworkFirewall -p1⤵PID:2080
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k NetworkService -p -s LanmanWorkstation1⤵PID:2148
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s Winmgmt1⤵PID:2172
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted -s RmSvc1⤵PID:2220
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k NetworkServiceNetworkRestricted -p -s PolicyAgent1⤵PID:2400
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s IKEEXT1⤵PID:2408
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k NetworkService -p -s CryptSvc1⤵PID:2556
-
C:\Windows\sysmon.exeC:\Windows\sysmon.exe1⤵PID:2576
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted -p -s TrkWks1⤵PID:2660
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s LanmanServer1⤵PID:2688
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s WpnService1⤵PID:2700
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k UnistackSvcGroup -s CDPUserSvc1⤵PID:3044
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s TokenBroker1⤵PID:3124
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:3396
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\d65a8271ee567a12f3a558876e630d00N.dll,#12⤵
- Suspicious use of WriteProcessMemory
PID:1980 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\d65a8271ee567a12f3a558876e630d00N.dll,#13⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3036 -
C:\WINDOWS\mssecsvc.exeC:\WINDOWS\mssecsvc.exe4⤵
- Modifies firewall policy service
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3952 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3952 -s 12605⤵
- Program crash
PID:3024
-
-
-
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalService -p -s CDPSvc1⤵PID:3408
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k ClipboardSvcGroup -p -s cbdhsvc1⤵PID:3572
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s wlidsvc1⤵PID:4964
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalServiceNetworkRestricted -p -s WinHttpAutoProxySvc1⤵PID:1076
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted -p -s StorSvc1⤵PID:4544
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalServiceAndNoImpersonation -p -s SSDPSRV1⤵PID:1924
-
C:\Program Files\Common Files\Microsoft Shared\ClickToRun\OfficeClickToRun.exe"C:\Program Files\Common Files\Microsoft Shared\ClickToRun\OfficeClickToRun.exe" /service1⤵PID:2828
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalService -p -s LicenseManager1⤵PID:4848
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalServiceNetworkRestricted -p -s NgcCtnrSvc1⤵PID:316
-
C:\WINDOWS\mssecsvc.exeC:\WINDOWS\mssecsvc.exe -m security1⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2396
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 360 -p 3952 -ip 39521⤵PID:3032
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3.6MB
MD5ae4a397ecf04a951388f8ddc4d563f3f
SHA18e8b24cb26eea9106a62ec78f0dc6d55b589da5d
SHA256776a6083f9e55c5288fd73046970c734edd8ab2b2ef55708a902db97916695fe
SHA512a9e6161960df322d15ec0375d8185f19e70771e768375253b3736dc7c6b92a3edfecfbab6f9d0e46812292a103e50871e83092eb6ecd4e883d655c6b669dc0f0