Analysis
-
max time kernel
120s -
max time network
120s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
16-12-2024 19:28
Static task
static1
Behavioral task
behavioral1
Sample
96dd34bd8af12ac28cb598988f67351ca47502d1b4a16c98066baa2191eb77afN.dll
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
96dd34bd8af12ac28cb598988f67351ca47502d1b4a16c98066baa2191eb77afN.dll
Resource
win10v2004-20241007-en
General
-
Target
96dd34bd8af12ac28cb598988f67351ca47502d1b4a16c98066baa2191eb77afN.dll
-
Size
5.0MB
-
MD5
3dfde3406cf80d5438a3b33f73228530
-
SHA1
4e410acd074c2d35e9e90212e72c2a1610e32851
-
SHA256
96dd34bd8af12ac28cb598988f67351ca47502d1b4a16c98066baa2191eb77af
-
SHA512
cc140074faab7a6c1e5e6a441278852f5c0aded1ca406b9832516d12291ec7acbd87ff797eb36f30070704bcbdaff1a9d9241854095a86ecf0f8cf0dbdc04118
-
SSDEEP
98304:+DqPoBhz1aRxcSUDk36SAEdhb3R8yAVp2H:+DqPe1Cxcxk3ZAEHR8yc4H
Malware Config
Signatures
-
Wannacry
WannaCry is a ransomware cryptoworm.
-
Wannacry family
-
Contacts a large (2499) amount of remote hosts 1 TTPs
This may indicate a network scan to discover remotely running services.
-
Executes dropped EXE 3 IoCs
pid Process 4568 mssecsvc.exe 3112 mssecsvc.exe 1640 tasksche.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\WINDOWS\mssecsvc.exe rundll32.exe File created C:\WINDOWS\tasksche.exe mssecsvc.exe -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mssecsvc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mssecsvc.exe -
Modifies data under HKEY_USERS 5 IoCs
description ioc Process Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\UNCAsIntranet = "1" mssecsvc.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\AutoDetect = "0" mssecsvc.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ mssecsvc.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ProxyBypass = "1" mssecsvc.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\IntranetName = "1" mssecsvc.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 4276 wrote to memory of 1004 4276 rundll32.exe 82 PID 4276 wrote to memory of 1004 4276 rundll32.exe 82 PID 4276 wrote to memory of 1004 4276 rundll32.exe 82 PID 1004 wrote to memory of 4568 1004 rundll32.exe 83 PID 1004 wrote to memory of 4568 1004 rundll32.exe 83 PID 1004 wrote to memory of 4568 1004 rundll32.exe 83
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\96dd34bd8af12ac28cb598988f67351ca47502d1b4a16c98066baa2191eb77afN.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:4276 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\96dd34bd8af12ac28cb598988f67351ca47502d1b4a16c98066baa2191eb77afN.dll,#12⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1004 -
C:\WINDOWS\mssecsvc.exeC:\WINDOWS\mssecsvc.exe3⤵
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:4568 -
C:\WINDOWS\tasksche.exeC:\WINDOWS\tasksche.exe /i4⤵
- Executes dropped EXE
PID:1640
-
-
-
-
C:\WINDOWS\mssecsvc.exeC:\WINDOWS\mssecsvc.exe -m security1⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Modifies data under HKEY_USERS
PID:3112
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3.6MB
MD5c5b49436268a53d155790910af661336
SHA1bb83a3f8ad419c92f3333f9126ba4d0dd0310151
SHA256296c008a3ac825cd3e614a175bfabb4cd1081028c7b12e0c1c1039054cb865c2
SHA5126a510d6363a94dc3403e0aae8a5a7a54d726e3d267480a33233d1546b84754e6d7835d606d520126784b1cc2509e9bfcde577e2604d142313bfb43a77ab03973
-
Filesize
3.4MB
MD5e45fa34e9e5a2f915b20f9551ac6f115
SHA1c6a3ed6ef55d4892bbde29eb0c33272e6862f0c8
SHA2563b807f3cb23c49f9da3352ed0187eb948a6ccf5a9b83c8fab2d1d0ffb9b3e9fd
SHA51201d3b4c23c2a3852968e630871719ec4b9a072d2ba66d259df7b50fb0f6e9f3266967a2fed530f159b3dc55abd89de1650dffe6971365539a7bc8c940209978c