Analysis

  • max time kernel
    60s
  • max time network
    64s
  • platform
    windows7_x64
  • resource
    win7-20241010-en
  • resource tags

    arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system
  • submitted
    14-11-2024 18:28

General

  • Target

    1a5fc733c6037f134c987dc3bed22a2d.dll

  • Size

    5.0MB

  • MD5

    1a5fc733c6037f134c987dc3bed22a2d

  • SHA1

    8de8d8c7a24cfc324f5ee994344ac42ca6935fd6

  • SHA256

    8024dda348948dfe26f67cbe23f7bc79e1751a1f4554d8423c6d460aa4410da6

  • SHA512

    34e2f07dfcb450d2c2fb4775089414844630a98789801bff3e982f14b82783ab68cbc728627016045b437e75aa6f00d69c5dfb48316d89e80e89d05ab2a97a5b

  • SSDEEP

    49152:gnQQqMSPbcBVQejIkQo6SArf0XdX63DE4JUJn0EF9a4AhAU+LGI7QOZ4HDX:gzqPoBhUk36SAQx6Wf9AZHz

Malware Config

Signatures

  • Wannacry

    WannaCry is a ransomware cryptoworm.

  • Wannacry family
  • Contacts a large (633) amount of remote hosts 1 TTPs

    This may indicate a network scan to discover remotely running services.

  • Executes dropped EXE 3 IoCs
  • Drops file in System32 directory 1 IoCs
  • Drops file in Windows directory 2 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies data under HKEY_USERS 21 IoCs
  • Suspicious use of WriteProcessMemory 11 IoCs

Processes

  • C:\Windows\system32\rundll32.exe
    rundll32.exe C:\Users\Admin\AppData\Local\Temp\1a5fc733c6037f134c987dc3bed22a2d.dll,#1
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2220
    • C:\Windows\SysWOW64\rundll32.exe
      rundll32.exe C:\Users\Admin\AppData\Local\Temp\1a5fc733c6037f134c987dc3bed22a2d.dll,#1
      2⤵
      • Drops file in Windows directory
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:2296
      • C:\WINDOWS\mssecsvc.exe
        C:\WINDOWS\mssecsvc.exe
        3⤵
        • Executes dropped EXE
        • Drops file in Windows directory
        • System Location Discovery: System Language Discovery
        PID:2216
        • C:\WINDOWS\tasksche.exe
          C:\WINDOWS\tasksche.exe /i
          4⤵
          • Executes dropped EXE
          PID:2764
  • C:\WINDOWS\mssecsvc.exe
    C:\WINDOWS\mssecsvc.exe -m security
    1⤵
    • Executes dropped EXE
    • Drops file in System32 directory
    • System Location Discovery: System Language Discovery
    • Modifies data under HKEY_USERS
    PID:3028

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Windows\mssecsvc.exe

    Filesize

    3.6MB

    MD5

    28c28fdfbd809c7e998edcd21153b036

    SHA1

    5837970ba3f70902b568d55d8afae3be7cacda3a

    SHA256

    ab9d3b6020dc0dce1ab8d53df408735e8986b157a2f18c77eb6dfae5532796b5

    SHA512

    5552fd1d64a479511218e91ca3ba7ba61bbdf8a15ce567f15d9d360856c5fd4be5153df80168a67750bdb1145cae3200c5a27c549f92bf2a01d2cd9d0998e879

  • C:\Windows\tasksche.exe

    Filesize

    3.4MB

    MD5

    8b60350eab8a35781636a66ebe58b89f

    SHA1

    8f71a2bfe1aa8d56bf243979e81219aa4f0d9d7e

    SHA256

    1b9adb13a91b524be9c4cb283c61988c66cfba8418c97c81be5aa077bdc7c026

    SHA512

    58ea8a4a6aa88d3f72663f3877f0af55e6d5758e6b337c899c8f26208f0c45b637e4a14c7ae5bf9ac42152b728e28d1fe99038ce925536f04dd07b29c7ef07bc