Analysis
-
max time kernel
60s -
max time network
61s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
14/11/2024, 18:28
Static task
static1
Behavioral task
behavioral1
Sample
1a5fc733c6037f134c987dc3bed22a2d.dll
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
1a5fc733c6037f134c987dc3bed22a2d.dll
Resource
win10v2004-20241007-en
General
-
Target
1a5fc733c6037f134c987dc3bed22a2d.dll
-
Size
5.0MB
-
MD5
1a5fc733c6037f134c987dc3bed22a2d
-
SHA1
8de8d8c7a24cfc324f5ee994344ac42ca6935fd6
-
SHA256
8024dda348948dfe26f67cbe23f7bc79e1751a1f4554d8423c6d460aa4410da6
-
SHA512
34e2f07dfcb450d2c2fb4775089414844630a98789801bff3e982f14b82783ab68cbc728627016045b437e75aa6f00d69c5dfb48316d89e80e89d05ab2a97a5b
-
SSDEEP
49152:gnQQqMSPbcBVQejIkQo6SArf0XdX63DE4JUJn0EF9a4AhAU+LGI7QOZ4HDX:gzqPoBhUk36SAQx6Wf9AZHz
Malware Config
Signatures
-
Wannacry
WannaCry is a ransomware cryptoworm.
-
Wannacry family
-
Contacts a large (806) amount of remote hosts 1 TTPs
This may indicate a network scan to discover remotely running services.
-
Executes dropped EXE 3 IoCs
pid Process 976 mssecsvc.exe 4664 mssecsvc.exe 2292 tasksche.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\WINDOWS\mssecsvc.exe rundll32.exe File created C:\WINDOWS\tasksche.exe mssecsvc.exe -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mssecsvc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mssecsvc.exe -
Modifies data under HKEY_USERS 5 IoCs
description ioc Process Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\AutoDetect = "0" mssecsvc.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ mssecsvc.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ProxyBypass = "1" mssecsvc.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\IntranetName = "1" mssecsvc.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\UNCAsIntranet = "1" mssecsvc.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 5052 wrote to memory of 5060 5052 rundll32.exe 83 PID 5052 wrote to memory of 5060 5052 rundll32.exe 83 PID 5052 wrote to memory of 5060 5052 rundll32.exe 83 PID 5060 wrote to memory of 976 5060 rundll32.exe 84 PID 5060 wrote to memory of 976 5060 rundll32.exe 84 PID 5060 wrote to memory of 976 5060 rundll32.exe 84
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\1a5fc733c6037f134c987dc3bed22a2d.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:5052 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\1a5fc733c6037f134c987dc3bed22a2d.dll,#12⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:5060 -
C:\WINDOWS\mssecsvc.exeC:\WINDOWS\mssecsvc.exe3⤵
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:976 -
C:\WINDOWS\tasksche.exeC:\WINDOWS\tasksche.exe /i4⤵
- Executes dropped EXE
PID:2292
-
-
-
-
C:\WINDOWS\mssecsvc.exeC:\WINDOWS\mssecsvc.exe -m security1⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Modifies data under HKEY_USERS
PID:4664
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3.6MB
MD528c28fdfbd809c7e998edcd21153b036
SHA15837970ba3f70902b568d55d8afae3be7cacda3a
SHA256ab9d3b6020dc0dce1ab8d53df408735e8986b157a2f18c77eb6dfae5532796b5
SHA5125552fd1d64a479511218e91ca3ba7ba61bbdf8a15ce567f15d9d360856c5fd4be5153df80168a67750bdb1145cae3200c5a27c549f92bf2a01d2cd9d0998e879
-
Filesize
3.4MB
MD58b60350eab8a35781636a66ebe58b89f
SHA18f71a2bfe1aa8d56bf243979e81219aa4f0d9d7e
SHA2561b9adb13a91b524be9c4cb283c61988c66cfba8418c97c81be5aa077bdc7c026
SHA51258ea8a4a6aa88d3f72663f3877f0af55e6d5758e6b337c899c8f26208f0c45b637e4a14c7ae5bf9ac42152b728e28d1fe99038ce925536f04dd07b29c7ef07bc