Analysis

  • max time kernel
    150s
  • max time network
    150s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    17-10-2024 02:17

General

  • Target

    deb01890f1ee68d9dad5e1cbd83b335d05e49d9d3a8afed9aedbca3f58576199.dll

  • Size

    5.0MB

  • MD5

    3f4a0b6e1b81aa64cd0653814a5f87db

  • SHA1

    1923a8c8784551bb0f4d4ff9154fd4ced6c36f64

  • SHA256

    deb01890f1ee68d9dad5e1cbd83b335d05e49d9d3a8afed9aedbca3f58576199

  • SHA512

    b5e644537758e27eb586ff55cde5baffe8f0c67d9e40e855f76ce13f2eb323a9fd12643fea5498b8e24fe835c45bdb3d8d2ebecf4b35cbc0d1b3ad3eecacf222

  • SSDEEP

    24576:JbLgdeQhfdmMSirYbcMNgef0QeQjG/D8kIqc+9kEmzKAxGqcCZ:JnjQqMSPbcBVQej/1IKQB

Malware Config

Signatures

  • Wannacry

    WannaCry is a ransomware cryptoworm.

  • Contacts a large (3324) amount of remote hosts 1 TTPs

    This may indicate a network scan to discover remotely running services.

  • Executes dropped EXE 3 IoCs
  • Creates a large amount of network flows 1 TTPs

    This may indicate a network scan to discover remotely running services.

  • Drops file in System32 directory 1 IoCs
  • Drops file in Windows directory 2 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies data under HKEY_USERS 1 IoCs
  • Suspicious use of WriteProcessMemory 11 IoCs

Processes

  • C:\Windows\system32\rundll32.exe
    rundll32.exe C:\Users\Admin\AppData\Local\Temp\deb01890f1ee68d9dad5e1cbd83b335d05e49d9d3a8afed9aedbca3f58576199.dll,#1
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1620
    • C:\Windows\SysWOW64\rundll32.exe
      rundll32.exe C:\Users\Admin\AppData\Local\Temp\deb01890f1ee68d9dad5e1cbd83b335d05e49d9d3a8afed9aedbca3f58576199.dll,#1
      2⤵
      • Drops file in Windows directory
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:1900
      • C:\WINDOWS\mssecsvc.exe
        C:\WINDOWS\mssecsvc.exe
        3⤵
        • Executes dropped EXE
        • Drops file in Windows directory
        • System Location Discovery: System Language Discovery
        PID:1212
        • C:\WINDOWS\tasksche.exe
          C:\WINDOWS\tasksche.exe /i
          4⤵
          • Executes dropped EXE
          PID:2224
  • C:\WINDOWS\mssecsvc.exe
    C:\WINDOWS\mssecsvc.exe -m security
    1⤵
    • Executes dropped EXE
    • Drops file in System32 directory
    • System Location Discovery: System Language Discovery
    • Modifies data under HKEY_USERS
    PID:1984

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Windows\mssecsvc.exe

    Filesize

    3.6MB

    MD5

    2881dcec8784a58b7ca35526929f06f0

    SHA1

    e74c5e828031d5df27a8db840146d2a7dfa90874

    SHA256

    4028d63190bab7ed15140842ce0e0bfac2772bbf528ffa76cd55b97f5004a378

    SHA512

    851220c1dcf98befefdb3f244abeecfb53ecaca4488c1670b578abae3aa5539a9c4cc7fbf3a127460326c21dc1aeaa5386c91513afab3ffccb52d329ba46e374

  • C:\Windows\tasksche.exe

    Filesize

    3.4MB

    MD5

    5b9b946ff68efdec98f3be57f92e427b

    SHA1

    8bf852917b57079a2caa87029848c6f2e84c51ec

    SHA256

    80a7bd6d9a7b5945f66478e9a5ff96a91a28c64336f5245e7f7fc2aeaa752b01

    SHA512

    4702c354f68048d32678452052718f401fa9a90e024ea54c337866faf22a92ecacba9c73dc8fb5dc4a8ae8e74be0c3ad44d06783f14bd4bb0c60554ba232f75c