Analysis

  • max time kernel
    150s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    14-01-2025 19:54

General

  • Target

    09f93460c82251c85488fd207c2ece42.dll

  • Size

    5.0MB

  • MD5

    09f93460c82251c85488fd207c2ece42

  • SHA1

    8657b28eeeb7d035f7f9c823d31555dbeb242065

  • SHA256

    57ca06d837484b9a571de04487a10f9a929f9012ecd9c7726a80d27a788daecc

  • SHA512

    1bfaf53410ce246747faf469587bc61db67700a4de87bfa56085263a00e0a10870036388ac3b559b013533e8a4aca9c7db5ba7a0316b396d3fd20f0cb914e94e

  • SSDEEP

    49152:RnpEjbcBVWNRx+TSqTdX1HkQo6SAARdhnv:1pUoBaRxcSUDk36SAEdhv

Malware Config

Signatures

  • Wannacry

    WannaCry is a ransomware cryptoworm.

  • Wannacry family
  • Contacts a large (3198) amount of remote hosts 1 TTPs

    This may indicate a network scan to discover remotely running services.

  • Executes dropped EXE 3 IoCs
  • Creates a large amount of network flows 1 TTPs

    This may indicate a network scan to discover remotely running services.

  • Drops file in System32 directory 4 IoCs
  • Drops file in Windows directory 4 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 4 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies data under HKEY_USERS 15 IoCs
  • Suspicious use of WriteProcessMemory 9 IoCs

Processes

  • C:\Windows\system32\rundll32.exe
    rundll32.exe C:\Users\Admin\AppData\Local\Temp\09f93460c82251c85488fd207c2ece42.dll,#1
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2220
    • C:\Windows\SysWOW64\rundll32.exe
      rundll32.exe C:\Users\Admin\AppData\Local\Temp\09f93460c82251c85488fd207c2ece42.dll,#1
      2⤵
      • Drops file in Windows directory
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:5116
      • C:\WINDOWS\mssecsvr.exe
        C:\WINDOWS\mssecsvr.exe
        3⤵
        • Executes dropped EXE
        • Drops file in Windows directory
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:2108
        • C:\WINDOWS\tasksche.exe
          C:\WINDOWS\tasksche.exe /i
          4⤵
          • Executes dropped EXE
          • Drops file in Windows directory
          • System Location Discovery: System Language Discovery
          PID:1220
  • C:\WINDOWS\mssecsvr.exe
    C:\WINDOWS\mssecsvr.exe -m security
    1⤵
    • Executes dropped EXE
    • Drops file in System32 directory
    • System Location Discovery: System Language Discovery
    • Modifies data under HKEY_USERS
    PID:1876

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Windows\mssecsvr.exe

    Filesize

    2.2MB

    MD5

    d9f9cd5416b42d8dd970e678070e7d90

    SHA1

    41f8271db8ea047282c6a505f0092e5408142564

    SHA256

    a78d3d2891f259b9a6ea0009b15dc9163adf39ff69a7e4576826a6561bed99ab

    SHA512

    c3c79fffaa61d2b62e80a668677023b6ef598e992597b29fb5363940257ef7494d4b18c490a8720422f6ad327e223fe3ea38cc3ffd349dded08246332ed504d4

  • C:\Windows\tasksche.exe

    Filesize

    2.0MB

    MD5

    c9ce6d2b0232daae852c37a154f1d965

    SHA1

    a62ee7da769b716cefb212b89a13510e55821f94

    SHA256

    5b7117480dd572f176d1319185e2117a49de3d9a13bb85365c12d83f18c32bb3

    SHA512

    c669cbfb29b7ea16dd51b22300e36c2f659f28e698ef2161b78089101acc629173f4945fb9bc0e50afbd0ca77fe4c7f6d215a1c0205786028e05d280468708b4