Analysis
-
max time kernel
150s -
max time network
150s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
17-10-2024 02:17
Static task
static1
Behavioral task
behavioral1
Sample
deb01890f1ee68d9dad5e1cbd83b335d05e49d9d3a8afed9aedbca3f58576199.dll
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
deb01890f1ee68d9dad5e1cbd83b335d05e49d9d3a8afed9aedbca3f58576199.dll
Resource
win10v2004-20241007-en
General
-
Target
deb01890f1ee68d9dad5e1cbd83b335d05e49d9d3a8afed9aedbca3f58576199.dll
-
Size
5.0MB
-
MD5
3f4a0b6e1b81aa64cd0653814a5f87db
-
SHA1
1923a8c8784551bb0f4d4ff9154fd4ced6c36f64
-
SHA256
deb01890f1ee68d9dad5e1cbd83b335d05e49d9d3a8afed9aedbca3f58576199
-
SHA512
b5e644537758e27eb586ff55cde5baffe8f0c67d9e40e855f76ce13f2eb323a9fd12643fea5498b8e24fe835c45bdb3d8d2ebecf4b35cbc0d1b3ad3eecacf222
-
SSDEEP
24576:JbLgdeQhfdmMSirYbcMNgef0QeQjG/D8kIqc+9kEmzKAxGqcCZ:JnjQqMSPbcBVQej/1IKQB
Malware Config
Signatures
-
Wannacry
WannaCry is a ransomware cryptoworm.
-
Contacts a large (3324) amount of remote hosts 1 TTPs
This may indicate a network scan to discover remotely running services.
-
Executes dropped EXE 3 IoCs
Processes:
mssecsvc.exemssecsvc.exetasksche.exepid Process 1212 mssecsvc.exe 1984 mssecsvc.exe 2224 tasksche.exe -
Creates a large amount of network flows 1 TTPs
This may indicate a network scan to discover remotely running services.
-
Drops file in System32 directory 1 IoCs
Processes:
mssecsvc.exedescription ioc Process File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\Temporary Internet Files\counters.dat mssecsvc.exe -
Drops file in Windows directory 2 IoCs
Processes:
rundll32.exemssecsvc.exedescription ioc Process File created C:\WINDOWS\mssecsvc.exe rundll32.exe File created C:\WINDOWS\tasksche.exe mssecsvc.exe -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
rundll32.exemssecsvc.exemssecsvc.exedescription ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mssecsvc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mssecsvc.exe -
Modifies data under HKEY_USERS 1 IoCs
Processes:
mssecsvc.exedescription ioc Process Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings mssecsvc.exe -
Suspicious use of WriteProcessMemory 11 IoCs
Processes:
rundll32.exerundll32.exedescription pid Process procid_target PID 1620 wrote to memory of 1900 1620 rundll32.exe 30 PID 1620 wrote to memory of 1900 1620 rundll32.exe 30 PID 1620 wrote to memory of 1900 1620 rundll32.exe 30 PID 1620 wrote to memory of 1900 1620 rundll32.exe 30 PID 1620 wrote to memory of 1900 1620 rundll32.exe 30 PID 1620 wrote to memory of 1900 1620 rundll32.exe 30 PID 1620 wrote to memory of 1900 1620 rundll32.exe 30 PID 1900 wrote to memory of 1212 1900 rundll32.exe 31 PID 1900 wrote to memory of 1212 1900 rundll32.exe 31 PID 1900 wrote to memory of 1212 1900 rundll32.exe 31 PID 1900 wrote to memory of 1212 1900 rundll32.exe 31
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\deb01890f1ee68d9dad5e1cbd83b335d05e49d9d3a8afed9aedbca3f58576199.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1620 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\deb01890f1ee68d9dad5e1cbd83b335d05e49d9d3a8afed9aedbca3f58576199.dll,#12⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1900 -
C:\WINDOWS\mssecsvc.exeC:\WINDOWS\mssecsvc.exe3⤵
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:1212 -
C:\WINDOWS\tasksche.exeC:\WINDOWS\tasksche.exe /i4⤵
- Executes dropped EXE
PID:2224
-
-
-
-
C:\WINDOWS\mssecsvc.exeC:\WINDOWS\mssecsvc.exe -m security1⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies data under HKEY_USERS
PID:1984
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3.6MB
MD52881dcec8784a58b7ca35526929f06f0
SHA1e74c5e828031d5df27a8db840146d2a7dfa90874
SHA2564028d63190bab7ed15140842ce0e0bfac2772bbf528ffa76cd55b97f5004a378
SHA512851220c1dcf98befefdb3f244abeecfb53ecaca4488c1670b578abae3aa5539a9c4cc7fbf3a127460326c21dc1aeaa5386c91513afab3ffccb52d329ba46e374
-
Filesize
3.4MB
MD55b9b946ff68efdec98f3be57f92e427b
SHA18bf852917b57079a2caa87029848c6f2e84c51ec
SHA25680a7bd6d9a7b5945f66478e9a5ff96a91a28c64336f5245e7f7fc2aeaa752b01
SHA5124702c354f68048d32678452052718f401fa9a90e024ea54c337866faf22a92ecacba9c73dc8fb5dc4a8ae8e74be0c3ad44d06783f14bd4bb0c60554ba232f75c