Analysis

  • max time kernel
    150s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    14-01-2025 20:00

General

  • Target

    7d4c4401e1fe00bc5f751ddfabcf0e8d.dll

  • Size

    5.0MB

  • MD5

    7d4c4401e1fe00bc5f751ddfabcf0e8d

  • SHA1

    f605c351811668526456a1832bad7973605e2af1

  • SHA256

    d388424c0a34f9d700cbafb96839f09a945d12d34b457cd64b4e82738fcf8801

  • SHA512

    f4a7b9497ff6e83238a7e7e5eb0555bbe729718a78cc8a6d01459575fbee6d402f97e78a5d0ad6fec98c15f458a1499ff97082e8aafd8385f0e2f2da6b5e9095

  • SSDEEP

    49152:SnAQqMSPbcBVQej/1INRx+TSqTdX1HkQo6SAARdhHE:+DqPoBhz1aRxcSUDk36SAEdhk

Malware Config

Signatures

  • Wannacry

    WannaCry is a ransomware cryptoworm.

  • Wannacry family
  • Contacts a large (3326) amount of remote hosts 1 TTPs

    This may indicate a network scan to discover remotely running services.

  • Executes dropped EXE 3 IoCs
  • Creates a large amount of network flows 1 TTPs

    This may indicate a network scan to discover remotely running services.

  • Drops file in Windows directory 2 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies data under HKEY_USERS 5 IoCs
  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Windows\system32\rundll32.exe
    rundll32.exe C:\Users\Admin\AppData\Local\Temp\7d4c4401e1fe00bc5f751ddfabcf0e8d.dll,#1
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:4988
    • C:\Windows\SysWOW64\rundll32.exe
      rundll32.exe C:\Users\Admin\AppData\Local\Temp\7d4c4401e1fe00bc5f751ddfabcf0e8d.dll,#1
      2⤵
      • Drops file in Windows directory
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:4860
      • C:\WINDOWS\mssecsvc.exe
        C:\WINDOWS\mssecsvc.exe
        3⤵
        • Executes dropped EXE
        • Drops file in Windows directory
        • System Location Discovery: System Language Discovery
        PID:4272
        • C:\WINDOWS\tasksche.exe
          C:\WINDOWS\tasksche.exe /i
          4⤵
          • Executes dropped EXE
          PID:4104
  • C:\WINDOWS\mssecsvc.exe
    C:\WINDOWS\mssecsvc.exe -m security
    1⤵
    • Executes dropped EXE
    • System Location Discovery: System Language Discovery
    • Modifies data under HKEY_USERS
    PID:3968

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Windows\mssecsvc.exe

    Filesize

    3.6MB

    MD5

    47fe23c22356c88404a7b0b9a508effb

    SHA1

    b210745a7391b7d1b9169e1594239bbecdc76ba2

    SHA256

    1f1fc0cf6f281dc3ec78c86fb3e42986f5a769af28e2c27512bb557680f507ff

    SHA512

    739010e012801e67355f54dc2e80edcbf9a2722d40203d9e2b72a1df8f2e05306056edec8471f9a655f9e768a55c44fa5618a9591cca74bf9599b46cf97f81cf

  • C:\Windows\tasksche.exe

    Filesize

    3.4MB

    MD5

    087be2d4c652dd35156789e4044a5815

    SHA1

    bb9e590891e467a28a511e491e082f88c9bca1ef

    SHA256

    f38ac7e13323086989e78780c6785c664de6392db19779e96ef30bdb769d4ac6

    SHA512

    9d1a431cfe3367c4691b13ce8680f527bb071ff773c5da96a93f09a177d5dfc5e7d5df7100afd45e1a2174b3c99262ba01e80a4d3a98a8beb1025bf67e0a27bb