Analysis
-
max time kernel
150s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
28-10-2024 14:25
Static task
static1
Behavioral task
behavioral1
Sample
8e5bf41f436878764cc05bdb5ab1c7ac29e872fd4d78f76b7300f3dc2687e7e1N.dll
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
8e5bf41f436878764cc05bdb5ab1c7ac29e872fd4d78f76b7300f3dc2687e7e1N.dll
Resource
win10v2004-20241007-en
General
-
Target
8e5bf41f436878764cc05bdb5ab1c7ac29e872fd4d78f76b7300f3dc2687e7e1N.dll
-
Size
5.0MB
-
MD5
a44d500e0c08668eb728971bce455d40
-
SHA1
3fdfe77edade5f801e21653de8d8ae8f8e5d5e11
-
SHA256
8e5bf41f436878764cc05bdb5ab1c7ac29e872fd4d78f76b7300f3dc2687e7e1
-
SHA512
f7aab4355b7eb85c77107779bc65a095729df47de684c25acabe030e2a5c4dc07d297f484954a13bf71a430432eeba180f1b882240c212e184bf1dfd376f36e5
-
SSDEEP
98304:TDqPoBhzbaRxcSUDk36SAEdhvxWa9P593R8yAVp2H:TDqPebCxcxk3ZAEUadzR8yc4H
Malware Config
Signatures
-
Wannacry
WannaCry is a ransomware cryptoworm.
-
Wannacry family
-
Contacts a large (3304) amount of remote hosts 1 TTPs
This may indicate a network scan to discover remotely running services.
-
Executes dropped EXE 3 IoCs
pid Process 3968 mssecsvc.exe 1556 mssecsvc.exe 4776 tasksche.exe -
Creates a large amount of network flows 1 TTPs
This may indicate a network scan to discover remotely running services.
-
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\WINDOWS\mssecsvc.exe rundll32.exe File created C:\WINDOWS\tasksche.exe mssecsvc.exe -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mssecsvc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mssecsvc.exe -
Modifies data under HKEY_USERS 5 IoCs
description ioc Process Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\UNCAsIntranet = "1" mssecsvc.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\AutoDetect = "0" mssecsvc.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ mssecsvc.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ProxyBypass = "1" mssecsvc.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\IntranetName = "1" mssecsvc.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 4520 wrote to memory of 2840 4520 rundll32.exe 84 PID 4520 wrote to memory of 2840 4520 rundll32.exe 84 PID 4520 wrote to memory of 2840 4520 rundll32.exe 84 PID 2840 wrote to memory of 3968 2840 rundll32.exe 85 PID 2840 wrote to memory of 3968 2840 rundll32.exe 85 PID 2840 wrote to memory of 3968 2840 rundll32.exe 85
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\8e5bf41f436878764cc05bdb5ab1c7ac29e872fd4d78f76b7300f3dc2687e7e1N.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:4520 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\8e5bf41f436878764cc05bdb5ab1c7ac29e872fd4d78f76b7300f3dc2687e7e1N.dll,#12⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2840 -
C:\WINDOWS\mssecsvc.exeC:\WINDOWS\mssecsvc.exe3⤵
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:3968 -
C:\WINDOWS\tasksche.exeC:\WINDOWS\tasksche.exe /i4⤵
- Executes dropped EXE
PID:4776
-
-
-
-
C:\WINDOWS\mssecsvc.exeC:\WINDOWS\mssecsvc.exe -m security1⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Modifies data under HKEY_USERS
PID:1556
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3.6MB
MD5e8119fe19f94f83f893fd1baf66a9356
SHA154ed77b1b77e62edfd6ae5491c0f51205046571a
SHA256155513fbbf4792c55e106f849f1929991686492450d7576d433c476a21cce2e7
SHA5127c6b7bedfca9eb35cc88d8778cf3beb05d9453c132d725ec773b4fa020926c623b9a0698f62d7c1e43e18026e7720a2e3356db7a1fc0e7d3669c1d3aa46b161e
-
Filesize
3.4MB
MD508dda7392bc30781c5427bd7168be6d3
SHA12589e917779a10284b1db712bcbdec8ed0da53d6
SHA256919ef8007e54d0aa9b62265ff78172ae830c73c2a5490ef8933e8def00b22bd0
SHA512004e34bacebc96b52cf3d990f3ebab29ae52bca65c77d7f15a0e3a959540442589719ea9947d20badd63d71024f25658dc358d10aed82bf5f34b11e53d1c1616