Analysis
-
max time kernel
150s -
max time network
153s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
22-10-2024 14:18
Static task
static1
Behavioral task
behavioral1
Sample
c88aa6e79e17b12670cecde5e185108a64afbbab12d789e5e97d131f96332945N.dll
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
c88aa6e79e17b12670cecde5e185108a64afbbab12d789e5e97d131f96332945N.dll
Resource
win10v2004-20241007-en
General
-
Target
c88aa6e79e17b12670cecde5e185108a64afbbab12d789e5e97d131f96332945N.dll
-
Size
5.0MB
-
MD5
916205e7bd372f0b9208f6887be238d0
-
SHA1
57796cce4f7bf25fe4a7d34c22584b4d5dc8b93a
-
SHA256
c88aa6e79e17b12670cecde5e185108a64afbbab12d789e5e97d131f96332945
-
SHA512
df09c1859c1f73c9e4bb1df64f2b9e9e28fb8badd8d4522f1f04a15931764e0c1a904b198cfaafb90e3ce7861a02e6dbab9936cbeb419b59b18019eddfb436e1
-
SSDEEP
49152:unpEjbcBVQej/1INRx+TSqTdX1HkQo6SAARdhnv:apUoBhz1aRxcSUDk36SAEdhv
Malware Config
Signatures
-
Wannacry
WannaCry is a ransomware cryptoworm.
-
Contacts a large (3071) amount of remote hosts 1 TTPs
This may indicate a network scan to discover remotely running services.
-
Executes dropped EXE 3 IoCs
pid Process 2780 mssecsvr.exe 2704 mssecsvr.exe 2732 tasksche.exe -
Creates a large amount of network flows 1 TTPs
This may indicate a network scan to discover remotely running services.
-
Drops file in System32 directory 5 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\Temporary Internet Files\counters.dat mssecsvr.exe File created C:\Windows\SysWOW64\config\systemprofile\AppData\Roaming\Microsoft\Windows\Cookies\PBR5TTRM.txt mssecsvr.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Roaming\Microsoft\Windows\Cookies\PBR5TTRM.txt mssecsvr.exe File created C:\Windows\SysWOW64\config\systemprofile\AppData\Roaming\Microsoft\Windows\Cookies\6K87K06S.txt mssecsvr.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Roaming\Microsoft\Windows\Cookies\6K87K06S.txt mssecsvr.exe -
Drops file in Windows directory 4 IoCs
description ioc Process File created C:\WINDOWS\mssecsvr.exe rundll32.exe File created C:\WINDOWS\tasksche.exe mssecsvr.exe File created C:\Windows\__tmp_rar_sfx_access_check_259454420 tasksche.exe File created C:\Windows\eee.exe tasksche.exe -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mssecsvr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mssecsvr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tasksche.exe -
Modifies data under HKEY_USERS 24 IoCs
description ioc Process Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\AutoDetect = "1" mssecsvr.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{C335DC16-2448-48EB-8B8B-73E80713BDCE}\4e-a8-14-c3-9c-a8 mssecsvr.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\4e-a8-14-c3-9c-a8\WpadDecisionReason = "1" mssecsvr.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\4e-a8-14-c3-9c-a8\WpadDecisionTime = 80daa1518d24db01 mssecsvr.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings mssecsvr.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ mssecsvr.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ProxyEnable = "0" mssecsvr.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\SavedLegacySettings = 4600000002000000090000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 mssecsvr.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Content\CachePrefix mssecsvr.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Cookies\CachePrefix = "Cookie:" mssecsvr.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\History\CachePrefix = "Visited:" mssecsvr.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{C335DC16-2448-48EB-8B8B-73E80713BDCE}\WpadDecisionReason = "1" mssecsvr.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections mssecsvr.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\DefaultConnectionSettings = 4600000002000000090000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 mssecsvr.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{C335DC16-2448-48EB-8B8B-73E80713BDCE}\WpadNetworkName = "Network 2" mssecsvr.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\4e-a8-14-c3-9c-a8\WpadDecision = "0" mssecsvr.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{C335DC16-2448-48EB-8B8B-73E80713BDCE} mssecsvr.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{C335DC16-2448-48EB-8B8B-73E80713BDCE}\WpadDecisionTime = 80daa1518d24db01 mssecsvr.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{C335DC16-2448-48EB-8B8B-73E80713BDCE}\WpadDecision = "0" mssecsvr.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\UNCAsIntranet = "0" mssecsvr.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad mssecsvr.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\4e-a8-14-c3-9c-a8 mssecsvr.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings mssecsvr.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\DefaultConnectionSettings = 4600000003000000090000000000000000000000000000000400000000000000000000000000000000000000000000000000000001000000020000000a7f015e000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 mssecsvr.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2732 tasksche.exe -
Suspicious use of WriteProcessMemory 18 IoCs
description pid Process procid_target PID 2084 wrote to memory of 2768 2084 rundll32.exe 31 PID 2084 wrote to memory of 2768 2084 rundll32.exe 31 PID 2084 wrote to memory of 2768 2084 rundll32.exe 31 PID 2084 wrote to memory of 2768 2084 rundll32.exe 31 PID 2084 wrote to memory of 2768 2084 rundll32.exe 31 PID 2084 wrote to memory of 2768 2084 rundll32.exe 31 PID 2084 wrote to memory of 2768 2084 rundll32.exe 31 PID 2768 wrote to memory of 2780 2768 rundll32.exe 32 PID 2768 wrote to memory of 2780 2768 rundll32.exe 32 PID 2768 wrote to memory of 2780 2768 rundll32.exe 32 PID 2768 wrote to memory of 2780 2768 rundll32.exe 32 PID 2780 wrote to memory of 2732 2780 mssecsvr.exe 34 PID 2780 wrote to memory of 2732 2780 mssecsvr.exe 34 PID 2780 wrote to memory of 2732 2780 mssecsvr.exe 34 PID 2780 wrote to memory of 2732 2780 mssecsvr.exe 34 PID 2780 wrote to memory of 2732 2780 mssecsvr.exe 34 PID 2780 wrote to memory of 2732 2780 mssecsvr.exe 34 PID 2780 wrote to memory of 2732 2780 mssecsvr.exe 34
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\c88aa6e79e17b12670cecde5e185108a64afbbab12d789e5e97d131f96332945N.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:2084 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\c88aa6e79e17b12670cecde5e185108a64afbbab12d789e5e97d131f96332945N.dll,#12⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2768 -
C:\WINDOWS\mssecsvr.exeC:\WINDOWS\mssecsvr.exe3⤵
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2780 -
C:\WINDOWS\tasksche.exeC:\WINDOWS\tasksche.exe /i4⤵
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: GetForegroundWindowSpam
PID:2732
-
-
-
-
C:\WINDOWS\mssecsvr.exeC:\WINDOWS\mssecsvr.exe -m security1⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies data under HKEY_USERS
PID:2704
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3.6MB
MD55aafca3efd0b1bff9d7b98a517f4fc78
SHA126157238201eb9968329ee2ec7b11a64a510c676
SHA25656571071a4ff2044428400d411e5789c8bc0dfb550d9565afc91ac2a821bc0fb
SHA5120f8474131dc6653fb202ba8f6ad54c3ce2eefc57829cae6f8922cf04586ed909dc5fb3e77b8f6ca5b8d727b725dbf0543f50c57bac0ffc3984de5e7a9c3a5cf3
-
Filesize
2.0MB
MD5f1b717ebec2183e765246746a9b62c76
SHA181f170ef7d854fdc583da8b03bb63fecd64028ac
SHA256d0ff2fd8c8e68dc9b5bd2d1ae58cd44ad189fcd2ba5b3f3bc6d5a24062b58256
SHA512a0725be1c99657f00f92e16e56b68900272c06ab894f35836fe8277bf8249b7dd540e31c6b71af54c6593f9ec03cff28a4229f2ec1ec5b7aefb219bbd51dec09