Analysis
-
max time kernel
150s -
max time network
154s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
14-01-2025 22:00
Static task
static1
Behavioral task
behavioral1
Sample
f3178ae77df457f34b2b3a5e9f50bd9e.dll
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
f3178ae77df457f34b2b3a5e9f50bd9e.dll
Resource
win10v2004-20241007-en
General
-
Target
f3178ae77df457f34b2b3a5e9f50bd9e.dll
-
Size
5.0MB
-
MD5
f3178ae77df457f34b2b3a5e9f50bd9e
-
SHA1
af036d1febda4cb07ae8efe3961decaab50bea45
-
SHA256
e033904d3cd18d9934335e78694a9c48f8cca7f1447479fe40f5e6ac8d55af25
-
SHA512
133cbd4de24792b231b459f7b0e63bd55bed662c1ecc3a553a7b23858fa201197c40c6adf6a38bda8673dfebf066100e086b9a27d1f9be309cf742dd3a95effa
-
SSDEEP
24576:SbLgddQhfdmMSirYbcMNgef0QeQjG/D8kIqRYoAdPF58E9L:SnAQqMSPbcBVQej/1I/8E9L
Malware Config
Signatures
-
Wannacry
WannaCry is a ransomware cryptoworm.
-
Wannacry family
-
Contacts a large (3178) amount of remote hosts 1 TTPs
This may indicate a network scan to discover remotely running services.
-
Executes dropped EXE 3 IoCs
pid Process 2852 mssecsvc.exe 2916 mssecsvc.exe 2636 tasksche.exe -
Creates a large amount of network flows 1 TTPs
This may indicate a network scan to discover remotely running services.
-
Drops file in System32 directory 1 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\Temporary Internet Files\counters.dat mssecsvc.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\WINDOWS\mssecsvc.exe rundll32.exe File created C:\WINDOWS\tasksche.exe mssecsvc.exe -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mssecsvc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mssecsvc.exe -
Modifies data under HKEY_USERS 24 IoCs
description ioc Process Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Content\CachePrefix mssecsvc.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{36365AD8-4725-4667-98DC-40FFB490BFFB}\WpadDecisionTime = b098abb1cf66db01 mssecsvc.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{36365AD8-4725-4667-98DC-40FFB490BFFB}\WpadNetworkName = "Network 3" mssecsvc.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{36365AD8-4725-4667-98DC-40FFB490BFFB}\16-83-b1-c9-7f-b5 mssecsvc.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings mssecsvc.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ProxyEnable = "0" mssecsvc.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ mssecsvc.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\UNCAsIntranet = "0" mssecsvc.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Cookies\CachePrefix = "Cookie:" mssecsvc.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{36365AD8-4725-4667-98DC-40FFB490BFFB} mssecsvc.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\16-83-b1-c9-7f-b5 mssecsvc.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\16-83-b1-c9-7f-b5\WpadDecisionTime = b098abb1cf66db01 mssecsvc.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\16-83-b1-c9-7f-b5\WpadDecisionReason = "1" mssecsvc.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections mssecsvc.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\DefaultConnectionSettings = 4600000002000000090000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 mssecsvc.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\SavedLegacySettings = 4600000002000000090000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 mssecsvc.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\History\CachePrefix = "Visited:" mssecsvc.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\DefaultConnectionSettings = 4600000003000000090000000000000000000000000000000400000000000000000000000000000000000000000000000000000001000000020000000a7f0077000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 mssecsvc.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{36365AD8-4725-4667-98DC-40FFB490BFFB}\WpadDecisionReason = "1" mssecsvc.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{36365AD8-4725-4667-98DC-40FFB490BFFB}\WpadDecision = "0" mssecsvc.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\16-83-b1-c9-7f-b5\WpadDecision = "0" mssecsvc.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings mssecsvc.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\AutoDetect = "1" mssecsvc.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad mssecsvc.exe -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 2776 wrote to memory of 2840 2776 rundll32.exe 30 PID 2776 wrote to memory of 2840 2776 rundll32.exe 30 PID 2776 wrote to memory of 2840 2776 rundll32.exe 30 PID 2776 wrote to memory of 2840 2776 rundll32.exe 30 PID 2776 wrote to memory of 2840 2776 rundll32.exe 30 PID 2776 wrote to memory of 2840 2776 rundll32.exe 30 PID 2776 wrote to memory of 2840 2776 rundll32.exe 30 PID 2840 wrote to memory of 2852 2840 rundll32.exe 31 PID 2840 wrote to memory of 2852 2840 rundll32.exe 31 PID 2840 wrote to memory of 2852 2840 rundll32.exe 31 PID 2840 wrote to memory of 2852 2840 rundll32.exe 31
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\f3178ae77df457f34b2b3a5e9f50bd9e.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:2776 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\f3178ae77df457f34b2b3a5e9f50bd9e.dll,#12⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2840 -
C:\WINDOWS\mssecsvc.exeC:\WINDOWS\mssecsvc.exe3⤵
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:2852 -
C:\WINDOWS\tasksche.exeC:\WINDOWS\tasksche.exe /i4⤵
- Executes dropped EXE
PID:2636
-
-
-
-
C:\WINDOWS\mssecsvc.exeC:\WINDOWS\mssecsvc.exe -m security1⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies data under HKEY_USERS
PID:2916
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3.6MB
MD53309b9838fa3b66a046fca2740d4ee25
SHA172f022d07b424dfd4a552c571034e787f9f1279d
SHA256a1dc8bc2e6dbc93980fa02f8b41627a7983a1c55ee0a6b6d6749ce88804eff0c
SHA51283f60f85dad6ae78ffc1683b2b7b4091f390d60e8f9af99e3d476d664e786695b0566ebcda89022de7911016aa03afae3809d9fd089c94b902bae4959b43ac90
-
Filesize
3.4MB
MD568b3f7c2334e7fcb13795d39aa2d5f3e
SHA147e5f3c7028362c18cc27415c19c166bd001144a
SHA256969bf6584d54f32e06a4819c482207d01e16172026fb6a16711ba9728a05d564
SHA512f80409415aaaf9e87a51a7baca0374e4c85779fcaf85205997069e35ec39f0aa1760df42468ccc493d238902e4e5b3683ee03cb6c60697c8094801c9f1d1a797