Analysis
-
max time kernel
150s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
14-01-2025 22:00
Static task
static1
Behavioral task
behavioral1
Sample
f3178ae77df457f34b2b3a5e9f50bd9e.dll
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
f3178ae77df457f34b2b3a5e9f50bd9e.dll
Resource
win10v2004-20241007-en
General
-
Target
f3178ae77df457f34b2b3a5e9f50bd9e.dll
-
Size
5.0MB
-
MD5
f3178ae77df457f34b2b3a5e9f50bd9e
-
SHA1
af036d1febda4cb07ae8efe3961decaab50bea45
-
SHA256
e033904d3cd18d9934335e78694a9c48f8cca7f1447479fe40f5e6ac8d55af25
-
SHA512
133cbd4de24792b231b459f7b0e63bd55bed662c1ecc3a553a7b23858fa201197c40c6adf6a38bda8673dfebf066100e086b9a27d1f9be309cf742dd3a95effa
-
SSDEEP
24576:SbLgddQhfdmMSirYbcMNgef0QeQjG/D8kIqRYoAdPF58E9L:SnAQqMSPbcBVQej/1I/8E9L
Malware Config
Signatures
-
Wannacry
WannaCry is a ransomware cryptoworm.
-
Wannacry family
-
Contacts a large (3351) amount of remote hosts 1 TTPs
This may indicate a network scan to discover remotely running services.
-
Executes dropped EXE 3 IoCs
pid Process 2684 mssecsvc.exe 1604 mssecsvc.exe 3684 tasksche.exe -
Creates a large amount of network flows 1 TTPs
This may indicate a network scan to discover remotely running services.
-
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\WINDOWS\mssecsvc.exe rundll32.exe File created C:\WINDOWS\tasksche.exe mssecsvc.exe -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mssecsvc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mssecsvc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Modifies data under HKEY_USERS 5 IoCs
description ioc Process Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ mssecsvc.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ProxyBypass = "1" mssecsvc.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\IntranetName = "1" mssecsvc.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\UNCAsIntranet = "1" mssecsvc.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\AutoDetect = "0" mssecsvc.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 3672 wrote to memory of 4676 3672 rundll32.exe 85 PID 3672 wrote to memory of 4676 3672 rundll32.exe 85 PID 3672 wrote to memory of 4676 3672 rundll32.exe 85 PID 4676 wrote to memory of 2684 4676 rundll32.exe 86 PID 4676 wrote to memory of 2684 4676 rundll32.exe 86 PID 4676 wrote to memory of 2684 4676 rundll32.exe 86
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\f3178ae77df457f34b2b3a5e9f50bd9e.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:3672 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\f3178ae77df457f34b2b3a5e9f50bd9e.dll,#12⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4676 -
C:\WINDOWS\mssecsvc.exeC:\WINDOWS\mssecsvc.exe3⤵
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:2684 -
C:\WINDOWS\tasksche.exeC:\WINDOWS\tasksche.exe /i4⤵
- Executes dropped EXE
PID:3684
-
-
-
-
C:\WINDOWS\mssecsvc.exeC:\WINDOWS\mssecsvc.exe -m security1⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Modifies data under HKEY_USERS
PID:1604
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3.6MB
MD53309b9838fa3b66a046fca2740d4ee25
SHA172f022d07b424dfd4a552c571034e787f9f1279d
SHA256a1dc8bc2e6dbc93980fa02f8b41627a7983a1c55ee0a6b6d6749ce88804eff0c
SHA51283f60f85dad6ae78ffc1683b2b7b4091f390d60e8f9af99e3d476d664e786695b0566ebcda89022de7911016aa03afae3809d9fd089c94b902bae4959b43ac90
-
Filesize
3.4MB
MD568b3f7c2334e7fcb13795d39aa2d5f3e
SHA147e5f3c7028362c18cc27415c19c166bd001144a
SHA256969bf6584d54f32e06a4819c482207d01e16172026fb6a16711ba9728a05d564
SHA512f80409415aaaf9e87a51a7baca0374e4c85779fcaf85205997069e35ec39f0aa1760df42468ccc493d238902e4e5b3683ee03cb6c60697c8094801c9f1d1a797