Analysis
-
max time kernel
120s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
28-10-2024 14:12
Static task
static1
Behavioral task
behavioral1
Sample
8e5bf41f436878764cc05bdb5ab1c7ac29e872fd4d78f76b7300f3dc2687e7e1N.dll
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
8e5bf41f436878764cc05bdb5ab1c7ac29e872fd4d78f76b7300f3dc2687e7e1N.dll
Resource
win10v2004-20241007-en
General
-
Target
8e5bf41f436878764cc05bdb5ab1c7ac29e872fd4d78f76b7300f3dc2687e7e1N.dll
-
Size
5.0MB
-
MD5
a44d500e0c08668eb728971bce455d40
-
SHA1
3fdfe77edade5f801e21653de8d8ae8f8e5d5e11
-
SHA256
8e5bf41f436878764cc05bdb5ab1c7ac29e872fd4d78f76b7300f3dc2687e7e1
-
SHA512
f7aab4355b7eb85c77107779bc65a095729df47de684c25acabe030e2a5c4dc07d297f484954a13bf71a430432eeba180f1b882240c212e184bf1dfd376f36e5
-
SSDEEP
98304:TDqPoBhzbaRxcSUDk36SAEdhvxWa9P593R8yAVp2H:TDqPebCxcxk3ZAEUadzR8yc4H
Malware Config
Signatures
-
Wannacry
WannaCry is a ransomware cryptoworm.
-
Wannacry family
-
Contacts a large (2390) amount of remote hosts 1 TTPs
This may indicate a network scan to discover remotely running services.
-
Executes dropped EXE 3 IoCs
pid Process 2316 mssecsvc.exe 2120 mssecsvc.exe 2816 tasksche.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\Temporary Internet Files\counters.dat mssecsvc.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\WINDOWS\mssecsvc.exe rundll32.exe File created C:\WINDOWS\tasksche.exe mssecsvc.exe -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mssecsvc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mssecsvc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Modifies data under HKEY_USERS 24 IoCs
description ioc Process Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{F9466398-6D93-402C-8269-414A1E0EA80B}\WpadNetworkName = "Network 3" mssecsvc.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\3a-43-9d-b4-86-2f\WpadDecision = "0" mssecsvc.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings mssecsvc.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ProxyEnable = "0" mssecsvc.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\AutoDetect = "1" mssecsvc.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Content\CachePrefix mssecsvc.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Cookies\CachePrefix = "Cookie:" mssecsvc.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad mssecsvc.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\SavedLegacySettings = 4600000002000000090000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 mssecsvc.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{F9466398-6D93-402C-8269-414A1E0EA80B}\3a-43-9d-b4-86-2f mssecsvc.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\3a-43-9d-b4-86-2f\WpadDecisionTime = 307288724329db01 mssecsvc.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings mssecsvc.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections mssecsvc.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ mssecsvc.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\UNCAsIntranet = "0" mssecsvc.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\3a-43-9d-b4-86-2f mssecsvc.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\3a-43-9d-b4-86-2f\WpadDecisionReason = "1" mssecsvc.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{F9466398-6D93-402C-8269-414A1E0EA80B}\WpadDecision = "0" mssecsvc.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\DefaultConnectionSettings = 4600000002000000090000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 mssecsvc.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\History\CachePrefix = "Visited:" mssecsvc.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\DefaultConnectionSettings = 4600000003000000090000000000000000000000000000000400000000000000000000000000000000000000000000000000000001000000020000000a7f00be000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 mssecsvc.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{F9466398-6D93-402C-8269-414A1E0EA80B} mssecsvc.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{F9466398-6D93-402C-8269-414A1E0EA80B}\WpadDecisionReason = "1" mssecsvc.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{F9466398-6D93-402C-8269-414A1E0EA80B}\WpadDecisionTime = 307288724329db01 mssecsvc.exe -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 2464 wrote to memory of 2052 2464 rundll32.exe 31 PID 2464 wrote to memory of 2052 2464 rundll32.exe 31 PID 2464 wrote to memory of 2052 2464 rundll32.exe 31 PID 2464 wrote to memory of 2052 2464 rundll32.exe 31 PID 2464 wrote to memory of 2052 2464 rundll32.exe 31 PID 2464 wrote to memory of 2052 2464 rundll32.exe 31 PID 2464 wrote to memory of 2052 2464 rundll32.exe 31 PID 2052 wrote to memory of 2316 2052 rundll32.exe 32 PID 2052 wrote to memory of 2316 2052 rundll32.exe 32 PID 2052 wrote to memory of 2316 2052 rundll32.exe 32 PID 2052 wrote to memory of 2316 2052 rundll32.exe 32
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\8e5bf41f436878764cc05bdb5ab1c7ac29e872fd4d78f76b7300f3dc2687e7e1N.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:2464 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\8e5bf41f436878764cc05bdb5ab1c7ac29e872fd4d78f76b7300f3dc2687e7e1N.dll,#12⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2052 -
C:\WINDOWS\mssecsvc.exeC:\WINDOWS\mssecsvc.exe3⤵
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:2316 -
C:\WINDOWS\tasksche.exeC:\WINDOWS\tasksche.exe /i4⤵
- Executes dropped EXE
PID:2816
-
-
-
-
C:\WINDOWS\mssecsvc.exeC:\WINDOWS\mssecsvc.exe -m security1⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies data under HKEY_USERS
PID:2120
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3.6MB
MD5e8119fe19f94f83f893fd1baf66a9356
SHA154ed77b1b77e62edfd6ae5491c0f51205046571a
SHA256155513fbbf4792c55e106f849f1929991686492450d7576d433c476a21cce2e7
SHA5127c6b7bedfca9eb35cc88d8778cf3beb05d9453c132d725ec773b4fa020926c623b9a0698f62d7c1e43e18026e7720a2e3356db7a1fc0e7d3669c1d3aa46b161e
-
Filesize
3.4MB
MD508dda7392bc30781c5427bd7168be6d3
SHA12589e917779a10284b1db712bcbdec8ed0da53d6
SHA256919ef8007e54d0aa9b62265ff78172ae830c73c2a5490ef8933e8def00b22bd0
SHA512004e34bacebc96b52cf3d990f3ebab29ae52bca65c77d7f15a0e3a959540442589719ea9947d20badd63d71024f25658dc358d10aed82bf5f34b11e53d1c1616