Analysis
-
max time kernel
60s -
max time network
64s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
14-11-2024 18:28
Static task
static1
Behavioral task
behavioral1
Sample
1a5fc733c6037f134c987dc3bed22a2d.dll
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
1a5fc733c6037f134c987dc3bed22a2d.dll
Resource
win10v2004-20241007-en
General
-
Target
1a5fc733c6037f134c987dc3bed22a2d.dll
-
Size
5.0MB
-
MD5
1a5fc733c6037f134c987dc3bed22a2d
-
SHA1
8de8d8c7a24cfc324f5ee994344ac42ca6935fd6
-
SHA256
8024dda348948dfe26f67cbe23f7bc79e1751a1f4554d8423c6d460aa4410da6
-
SHA512
34e2f07dfcb450d2c2fb4775089414844630a98789801bff3e982f14b82783ab68cbc728627016045b437e75aa6f00d69c5dfb48316d89e80e89d05ab2a97a5b
-
SSDEEP
49152:gnQQqMSPbcBVQejIkQo6SArf0XdX63DE4JUJn0EF9a4AhAU+LGI7QOZ4HDX:gzqPoBhUk36SAQx6Wf9AZHz
Malware Config
Signatures
-
Wannacry
WannaCry is a ransomware cryptoworm.
-
Wannacry family
-
Contacts a large (633) amount of remote hosts 1 TTPs
This may indicate a network scan to discover remotely running services.
-
Executes dropped EXE 3 IoCs
Processes:
mssecsvc.exemssecsvc.exetasksche.exepid process 2216 mssecsvc.exe 3028 mssecsvc.exe 2764 tasksche.exe -
Drops file in System32 directory 1 IoCs
Processes:
mssecsvc.exedescription ioc process File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\Temporary Internet Files\counters.dat mssecsvc.exe -
Drops file in Windows directory 2 IoCs
Processes:
rundll32.exemssecsvc.exedescription ioc process File created C:\WINDOWS\mssecsvc.exe rundll32.exe File created C:\WINDOWS\tasksche.exe mssecsvc.exe -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
mssecsvc.exerundll32.exemssecsvc.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mssecsvc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mssecsvc.exe -
Modifies data under HKEY_USERS 21 IoCs
Processes:
mssecsvc.exedescription ioc process Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\4a-b7-f4-6e-a0-dc mssecsvc.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\4a-b7-f4-6e-a0-dc\WpadDecisionReason = "1" mssecsvc.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings mssecsvc.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\DefaultConnectionSettings = 4600000003000000090000000000000000000000000000000400000000000000000000000000000000000000000000000000000001000000020000000a7f007f000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 mssecsvc.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{C1F645C0-ADDC-470E-82A3-D6017383E5F8}\WpadDecision = "0" mssecsvc.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{C1F645C0-ADDC-470E-82A3-D6017383E5F8}\WpadNetworkName = "Network 3" mssecsvc.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\4a-b7-f4-6e-a0-dc\WpadDecisionTime = 803a610dc336db01 mssecsvc.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\4a-b7-f4-6e-a0-dc\WpadDecision = "0" mssecsvc.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings mssecsvc.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ProxyEnable = "0" mssecsvc.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{C1F645C0-ADDC-470E-82A3-D6017383E5F8}\WpadDecisionReason = "1" mssecsvc.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{C1F645C0-ADDC-470E-82A3-D6017383E5F8}\4a-b7-f4-6e-a0-dc mssecsvc.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ mssecsvc.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\UNCAsIntranet = "0" mssecsvc.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\AutoDetect = "1" mssecsvc.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{C1F645C0-ADDC-470E-82A3-D6017383E5F8}\WpadDecisionTime = 803a610dc336db01 mssecsvc.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{C1F645C0-ADDC-470E-82A3-D6017383E5F8} mssecsvc.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections mssecsvc.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\DefaultConnectionSettings = 4600000002000000090000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 mssecsvc.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\SavedLegacySettings = 4600000002000000090000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 mssecsvc.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad mssecsvc.exe -
Suspicious use of WriteProcessMemory 11 IoCs
Processes:
rundll32.exerundll32.exedescription pid process target process PID 2220 wrote to memory of 2296 2220 rundll32.exe rundll32.exe PID 2220 wrote to memory of 2296 2220 rundll32.exe rundll32.exe PID 2220 wrote to memory of 2296 2220 rundll32.exe rundll32.exe PID 2220 wrote to memory of 2296 2220 rundll32.exe rundll32.exe PID 2220 wrote to memory of 2296 2220 rundll32.exe rundll32.exe PID 2220 wrote to memory of 2296 2220 rundll32.exe rundll32.exe PID 2220 wrote to memory of 2296 2220 rundll32.exe rundll32.exe PID 2296 wrote to memory of 2216 2296 rundll32.exe mssecsvc.exe PID 2296 wrote to memory of 2216 2296 rundll32.exe mssecsvc.exe PID 2296 wrote to memory of 2216 2296 rundll32.exe mssecsvc.exe PID 2296 wrote to memory of 2216 2296 rundll32.exe mssecsvc.exe
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\1a5fc733c6037f134c987dc3bed22a2d.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:2220 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\1a5fc733c6037f134c987dc3bed22a2d.dll,#12⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2296 -
C:\WINDOWS\mssecsvc.exeC:\WINDOWS\mssecsvc.exe3⤵
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:2216 -
C:\WINDOWS\tasksche.exeC:\WINDOWS\tasksche.exe /i4⤵
- Executes dropped EXE
PID:2764
-
-
-
-
C:\WINDOWS\mssecsvc.exeC:\WINDOWS\mssecsvc.exe -m security1⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies data under HKEY_USERS
PID:3028
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3.6MB
MD528c28fdfbd809c7e998edcd21153b036
SHA15837970ba3f70902b568d55d8afae3be7cacda3a
SHA256ab9d3b6020dc0dce1ab8d53df408735e8986b157a2f18c77eb6dfae5532796b5
SHA5125552fd1d64a479511218e91ca3ba7ba61bbdf8a15ce567f15d9d360856c5fd4be5153df80168a67750bdb1145cae3200c5a27c549f92bf2a01d2cd9d0998e879
-
Filesize
3.4MB
MD58b60350eab8a35781636a66ebe58b89f
SHA18f71a2bfe1aa8d56bf243979e81219aa4f0d9d7e
SHA2561b9adb13a91b524be9c4cb283c61988c66cfba8418c97c81be5aa077bdc7c026
SHA51258ea8a4a6aa88d3f72663f3877f0af55e6d5758e6b337c899c8f26208f0c45b637e4a14c7ae5bf9ac42152b728e28d1fe99038ce925536f04dd07b29c7ef07bc