Analysis
-
max time kernel
150s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
17-10-2024 02:17
Static task
static1
Behavioral task
behavioral1
Sample
deb01890f1ee68d9dad5e1cbd83b335d05e49d9d3a8afed9aedbca3f58576199.dll
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
deb01890f1ee68d9dad5e1cbd83b335d05e49d9d3a8afed9aedbca3f58576199.dll
Resource
win10v2004-20241007-en
General
-
Target
deb01890f1ee68d9dad5e1cbd83b335d05e49d9d3a8afed9aedbca3f58576199.dll
-
Size
5.0MB
-
MD5
3f4a0b6e1b81aa64cd0653814a5f87db
-
SHA1
1923a8c8784551bb0f4d4ff9154fd4ced6c36f64
-
SHA256
deb01890f1ee68d9dad5e1cbd83b335d05e49d9d3a8afed9aedbca3f58576199
-
SHA512
b5e644537758e27eb586ff55cde5baffe8f0c67d9e40e855f76ce13f2eb323a9fd12643fea5498b8e24fe835c45bdb3d8d2ebecf4b35cbc0d1b3ad3eecacf222
-
SSDEEP
24576:JbLgdeQhfdmMSirYbcMNgef0QeQjG/D8kIqc+9kEmzKAxGqcCZ:JnjQqMSPbcBVQej/1IKQB
Malware Config
Signatures
-
Wannacry
WannaCry is a ransomware cryptoworm.
-
Contacts a large (3274) amount of remote hosts 1 TTPs
This may indicate a network scan to discover remotely running services.
-
Executes dropped EXE 3 IoCs
pid Process 1824 mssecsvc.exe 2404 mssecsvc.exe 3172 tasksche.exe -
Creates a large amount of network flows 1 TTPs
This may indicate a network scan to discover remotely running services.
-
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\WINDOWS\mssecsvc.exe rundll32.exe File created C:\WINDOWS\tasksche.exe mssecsvc.exe -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mssecsvc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mssecsvc.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 3228 wrote to memory of 2084 3228 rundll32.exe 84 PID 3228 wrote to memory of 2084 3228 rundll32.exe 84 PID 3228 wrote to memory of 2084 3228 rundll32.exe 84 PID 2084 wrote to memory of 1824 2084 rundll32.exe 85 PID 2084 wrote to memory of 1824 2084 rundll32.exe 85 PID 2084 wrote to memory of 1824 2084 rundll32.exe 85
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\deb01890f1ee68d9dad5e1cbd83b335d05e49d9d3a8afed9aedbca3f58576199.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:3228 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\deb01890f1ee68d9dad5e1cbd83b335d05e49d9d3a8afed9aedbca3f58576199.dll,#12⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2084 -
C:\WINDOWS\mssecsvc.exeC:\WINDOWS\mssecsvc.exe3⤵
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:1824 -
C:\WINDOWS\tasksche.exeC:\WINDOWS\tasksche.exe /i4⤵
- Executes dropped EXE
PID:3172
-
-
-
-
C:\WINDOWS\mssecsvc.exeC:\WINDOWS\mssecsvc.exe -m security1⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2404
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3.6MB
MD52881dcec8784a58b7ca35526929f06f0
SHA1e74c5e828031d5df27a8db840146d2a7dfa90874
SHA2564028d63190bab7ed15140842ce0e0bfac2772bbf528ffa76cd55b97f5004a378
SHA512851220c1dcf98befefdb3f244abeecfb53ecaca4488c1670b578abae3aa5539a9c4cc7fbf3a127460326c21dc1aeaa5386c91513afab3ffccb52d329ba46e374
-
Filesize
3.4MB
MD55b9b946ff68efdec98f3be57f92e427b
SHA18bf852917b57079a2caa87029848c6f2e84c51ec
SHA25680a7bd6d9a7b5945f66478e9a5ff96a91a28c64336f5245e7f7fc2aeaa752b01
SHA5124702c354f68048d32678452052718f401fa9a90e024ea54c337866faf22a92ecacba9c73dc8fb5dc4a8ae8e74be0c3ad44d06783f14bd4bb0c60554ba232f75c