Analysis
-
max time kernel
150s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
14-01-2025 19:56
Static task
static1
Behavioral task
behavioral1
Sample
1bda83265aeaeda718ef23fca3e1fe8d.dll
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
1bda83265aeaeda718ef23fca3e1fe8d.dll
Resource
win10v2004-20241007-en
General
-
Target
1bda83265aeaeda718ef23fca3e1fe8d.dll
-
Size
5.0MB
-
MD5
1bda83265aeaeda718ef23fca3e1fe8d
-
SHA1
b16681b565b5b6009fdfbe2ea2f3c0aa0603ed2f
-
SHA256
1db70e71afb728b64f3576a8c8ebd567cfc87203c6be2abd7adc0ebe635c0b80
-
SHA512
706232da2c749447de20ee0edca6732a13c7a1e93e310cc72f1e5b254a687b19ef63620f54a6e1201302d23a47d71bb0b20b9186000c7467ef3d82d4fdfe917c
-
SSDEEP
49152:JnjQqMSPbcBVQej/1INRx+TSqTdX1HkQo6SAA:d8qPoBhz1aRxcSUDk36SA
Malware Config
Signatures
-
Wannacry
WannaCry is a ransomware cryptoworm.
-
Wannacry family
-
Contacts a large (3269) amount of remote hosts 1 TTPs
This may indicate a network scan to discover remotely running services.
-
Executes dropped EXE 3 IoCs
pid Process 3428 mssecsvc.exe 2260 mssecsvc.exe 2344 tasksche.exe -
Creates a large amount of network flows 1 TTPs
This may indicate a network scan to discover remotely running services.
-
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\WINDOWS\mssecsvc.exe rundll32.exe File created C:\WINDOWS\tasksche.exe mssecsvc.exe -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mssecsvc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mssecsvc.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 3224 wrote to memory of 756 3224 rundll32.exe 82 PID 3224 wrote to memory of 756 3224 rundll32.exe 82 PID 3224 wrote to memory of 756 3224 rundll32.exe 82 PID 756 wrote to memory of 3428 756 rundll32.exe 83 PID 756 wrote to memory of 3428 756 rundll32.exe 83 PID 756 wrote to memory of 3428 756 rundll32.exe 83
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\1bda83265aeaeda718ef23fca3e1fe8d.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:3224 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\1bda83265aeaeda718ef23fca3e1fe8d.dll,#12⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:756 -
C:\WINDOWS\mssecsvc.exeC:\WINDOWS\mssecsvc.exe3⤵
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:3428 -
C:\WINDOWS\tasksche.exeC:\WINDOWS\tasksche.exe /i4⤵
- Executes dropped EXE
PID:2344
-
-
-
-
C:\WINDOWS\mssecsvc.exeC:\WINDOWS\mssecsvc.exe -m security1⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2260
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3.6MB
MD5f231dd1364c3e09c7885ee23750d87a2
SHA15ec0790003098d4775a6c462eed89d40c0a0a205
SHA256baa194ce631063952147f72d3bab6dfb0ad45ee619ed53ed3235bb88c433d6db
SHA512c0254e818fb87c342b2505a6392bff84e345cd4c501925dc4823db9710bc9d2d29032fc5b2b7f7a30d5263b7704c29340d6ac113f1c94fb935e85d2fdea0d4b8
-
Filesize
3.4MB
MD53233aced9279ef54267c479bba665b90
SHA10b2cc142386641901511269503cdf6f641fad305
SHA256f60f8a6bcaf1384a0d6a76d3e88007a8604560b263d2b8aeee06fd74c9ee5b3b
SHA51255f25c51ffb89d46f2a7d2ed9b67701e178bd68e74b71d757d5fa14bd9530a427104fc36116633033ead762ecf7960ab96429f5b0a085a701001c6832ba4555e