Analysis
-
max time kernel
150s -
max time network
154s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
12-12-2024 11:26
Static task
static1
Behavioral task
behavioral1
Sample
405a0454fc7b38f62688cd750419f811.dll
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
405a0454fc7b38f62688cd750419f811.dll
Resource
win10v2004-20241007-en
General
-
Target
405a0454fc7b38f62688cd750419f811.dll
-
Size
5.0MB
-
MD5
405a0454fc7b38f62688cd750419f811
-
SHA1
4d2ced96cbeff9f7b78ec6a4368fced465d27010
-
SHA256
3a296a67f2bfbf8c892340898dabe2dc29c240f61f8accff1316c1b8527391a0
-
SHA512
56286e485cd0f159c101a62df70b31a1d644eb1b77e431d6271f6ea51c61a4f035903fa61c7e40fa495bd25550aa530bf5036eabc5110999d7f51359deb48318
-
SSDEEP
49152:SnAQqMSPbcBVQej/1INRx+TSqTdX1HkQo6SAA:+DqPoBhz1aRxcSUDk36SA
Malware Config
Signatures
-
Wannacry
WannaCry is a ransomware cryptoworm.
-
Wannacry family
-
Contacts a large (3257) amount of remote hosts 1 TTPs
This may indicate a network scan to discover remotely running services.
-
Executes dropped EXE 3 IoCs
pid Process 2052 mssecsvc.exe 4620 mssecsvc.exe 1236 tasksche.exe -
Creates a large amount of network flows 1 TTPs
This may indicate a network scan to discover remotely running services.
-
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\WINDOWS\mssecsvc.exe rundll32.exe File created C:\WINDOWS\tasksche.exe mssecsvc.exe -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mssecsvc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mssecsvc.exe -
Modifies data under HKEY_USERS 5 IoCs
description ioc Process Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\AutoDetect = "0" mssecsvc.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ mssecsvc.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ProxyBypass = "1" mssecsvc.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\IntranetName = "1" mssecsvc.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\UNCAsIntranet = "1" mssecsvc.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 2300 wrote to memory of 452 2300 rundll32.exe 83 PID 2300 wrote to memory of 452 2300 rundll32.exe 83 PID 2300 wrote to memory of 452 2300 rundll32.exe 83 PID 452 wrote to memory of 2052 452 rundll32.exe 84 PID 452 wrote to memory of 2052 452 rundll32.exe 84 PID 452 wrote to memory of 2052 452 rundll32.exe 84
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\405a0454fc7b38f62688cd750419f811.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:2300 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\405a0454fc7b38f62688cd750419f811.dll,#12⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:452 -
C:\WINDOWS\mssecsvc.exeC:\WINDOWS\mssecsvc.exe3⤵
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:2052 -
C:\WINDOWS\tasksche.exeC:\WINDOWS\tasksche.exe /i4⤵
- Executes dropped EXE
PID:1236
-
-
-
-
C:\WINDOWS\mssecsvc.exeC:\WINDOWS\mssecsvc.exe -m security1⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Modifies data under HKEY_USERS
PID:4620
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3.6MB
MD5617d83104c9945d8eae9ba2526b2cff2
SHA1b6a79878809bd6c0c5cc37c6f58bb4f6ce7ec361
SHA256e51d9398128ba6921dfdb1d87a7a824a216ff82af30b134ef8c7e8b20eeba520
SHA5123b897a6a8fa524caf33f5cc49a2d702a80bfe2054928fe15fa2594335169b668df231f9e92baf1943fb6b2acb431f6eafad54e06fe137419f0142ad7bfa7640b
-
Filesize
3.4MB
MD512b2d28c424e60f4a62ed54760e33ec1
SHA1648b080a78dd568b04c0510f53878ffefa0d8882
SHA25606483ed032b52b170842fda214d04a623e52cce602f084447c5fcdfe1cf1b411
SHA51226dfecfcf65262f553095dd809bef18dff2d2f51d0ef2f288c350b8adea2590debf7c0fd31266714b664d951b7f0d23b2c5c74097271042c88d382bbb28dbc4a