Analysis
-
max time kernel
120s -
max time network
121s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
08-11-2024 19:18
Static task
static1
Behavioral task
behavioral1
Sample
1332b0403b4e49453eb41d93449190252ded6329b65fa93ef1472990e5a644e9N.dll
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
1332b0403b4e49453eb41d93449190252ded6329b65fa93ef1472990e5a644e9N.dll
Resource
win10v2004-20241007-en
General
-
Target
1332b0403b4e49453eb41d93449190252ded6329b65fa93ef1472990e5a644e9N.dll
-
Size
5.0MB
-
MD5
81ad93e3753f33f27fca4fb024bc4060
-
SHA1
730036d7b9ab4bbfb4c14e0d43f1a22f31e70883
-
SHA256
1332b0403b4e49453eb41d93449190252ded6329b65fa93ef1472990e5a644e9
-
SHA512
67f968a31af18115d605fe217121ce3f204ab2dd85ce7074002f60e0d042679212c40ccbc3e5f8937f7cc96d6b6b034bc2ca3ec479711bf9aef6161413836732
-
SSDEEP
49152:JnjQqMSPbcBV0+TSqTdX1HkQo6SAuEauS:d8qPoBWcSUDk36SALS
Malware Config
Signatures
-
Wannacry
WannaCry is a ransomware cryptoworm.
-
Wannacry family
-
Contacts a large (2487) amount of remote hosts 1 TTPs
This may indicate a network scan to discover remotely running services.
-
Executes dropped EXE 3 IoCs
pid Process 2392 mssecsvc.exe 228 mssecsvc.exe 4836 tasksche.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\WINDOWS\mssecsvc.exe rundll32.exe File created C:\WINDOWS\tasksche.exe mssecsvc.exe -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mssecsvc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mssecsvc.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 3952 wrote to memory of 3292 3952 rundll32.exe 83 PID 3952 wrote to memory of 3292 3952 rundll32.exe 83 PID 3952 wrote to memory of 3292 3952 rundll32.exe 83 PID 3292 wrote to memory of 2392 3292 rundll32.exe 85 PID 3292 wrote to memory of 2392 3292 rundll32.exe 85 PID 3292 wrote to memory of 2392 3292 rundll32.exe 85
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\1332b0403b4e49453eb41d93449190252ded6329b65fa93ef1472990e5a644e9N.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:3952 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\1332b0403b4e49453eb41d93449190252ded6329b65fa93ef1472990e5a644e9N.dll,#12⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3292 -
C:\WINDOWS\mssecsvc.exeC:\WINDOWS\mssecsvc.exe3⤵
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:2392 -
C:\WINDOWS\tasksche.exeC:\WINDOWS\tasksche.exe /i4⤵
- Executes dropped EXE
PID:4836
-
-
-
-
C:\WINDOWS\mssecsvc.exeC:\WINDOWS\mssecsvc.exe -m security1⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:228
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3.6MB
MD5e47560ca94d9cb04291a78a96358a8b2
SHA134175e7c4284f62c80cc2705fc87fcae36de0f29
SHA256414cd376e41da650cdff328c78efe9152344e640fb1ab74655779bc72de6d248
SHA51209910487cfe5e199db13840753fce8cc1e78e6fead43b3f3e79f379f0ef96b39cf0be52b5802e309299582e18bcc9ca858345457bdad32a4117489ba833fc6e3
-
Filesize
3.4MB
MD54234d3d1f3bb927cca4f6ec68fae8788
SHA1a0638d8e6513954a8675174525ff59cb274c2605
SHA2564e22e67f1b911a772ca5e6aea29213f60a2409819f52f5db4d85c39165c990c2
SHA512dc216570a186c5c4bb1b0257c46db2055f7aa49e1ffd09be8d6bf2299f9e12219273348d64b35e2ddc29ab4a81c11aa9157d7acfb13482dad1858a21799c329b