Analysis
-
max time kernel
150s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
14-01-2025 20:00
Static task
static1
Behavioral task
behavioral1
Sample
7d4c4401e1fe00bc5f751ddfabcf0e8d.dll
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
7d4c4401e1fe00bc5f751ddfabcf0e8d.dll
Resource
win10v2004-20241007-en
General
-
Target
7d4c4401e1fe00bc5f751ddfabcf0e8d.dll
-
Size
5.0MB
-
MD5
7d4c4401e1fe00bc5f751ddfabcf0e8d
-
SHA1
f605c351811668526456a1832bad7973605e2af1
-
SHA256
d388424c0a34f9d700cbafb96839f09a945d12d34b457cd64b4e82738fcf8801
-
SHA512
f4a7b9497ff6e83238a7e7e5eb0555bbe729718a78cc8a6d01459575fbee6d402f97e78a5d0ad6fec98c15f458a1499ff97082e8aafd8385f0e2f2da6b5e9095
-
SSDEEP
49152:SnAQqMSPbcBVQej/1INRx+TSqTdX1HkQo6SAARdhHE:+DqPoBhz1aRxcSUDk36SAEdhk
Malware Config
Signatures
-
Wannacry
WannaCry is a ransomware cryptoworm.
-
Wannacry family
-
Contacts a large (3326) amount of remote hosts 1 TTPs
This may indicate a network scan to discover remotely running services.
-
Executes dropped EXE 3 IoCs
pid Process 4272 mssecsvc.exe 3968 mssecsvc.exe 4104 tasksche.exe -
Creates a large amount of network flows 1 TTPs
This may indicate a network scan to discover remotely running services.
-
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\WINDOWS\mssecsvc.exe rundll32.exe File created C:\WINDOWS\tasksche.exe mssecsvc.exe -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mssecsvc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mssecsvc.exe -
Modifies data under HKEY_USERS 5 IoCs
description ioc Process Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ mssecsvc.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ProxyBypass = "1" mssecsvc.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\IntranetName = "1" mssecsvc.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\UNCAsIntranet = "1" mssecsvc.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\AutoDetect = "0" mssecsvc.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 4988 wrote to memory of 4860 4988 rundll32.exe 82 PID 4988 wrote to memory of 4860 4988 rundll32.exe 82 PID 4988 wrote to memory of 4860 4988 rundll32.exe 82 PID 4860 wrote to memory of 4272 4860 rundll32.exe 83 PID 4860 wrote to memory of 4272 4860 rundll32.exe 83 PID 4860 wrote to memory of 4272 4860 rundll32.exe 83
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\7d4c4401e1fe00bc5f751ddfabcf0e8d.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:4988 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\7d4c4401e1fe00bc5f751ddfabcf0e8d.dll,#12⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4860 -
C:\WINDOWS\mssecsvc.exeC:\WINDOWS\mssecsvc.exe3⤵
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:4272 -
C:\WINDOWS\tasksche.exeC:\WINDOWS\tasksche.exe /i4⤵
- Executes dropped EXE
PID:4104
-
-
-
-
C:\WINDOWS\mssecsvc.exeC:\WINDOWS\mssecsvc.exe -m security1⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Modifies data under HKEY_USERS
PID:3968
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3.6MB
MD547fe23c22356c88404a7b0b9a508effb
SHA1b210745a7391b7d1b9169e1594239bbecdc76ba2
SHA2561f1fc0cf6f281dc3ec78c86fb3e42986f5a769af28e2c27512bb557680f507ff
SHA512739010e012801e67355f54dc2e80edcbf9a2722d40203d9e2b72a1df8f2e05306056edec8471f9a655f9e768a55c44fa5618a9591cca74bf9599b46cf97f81cf
-
Filesize
3.4MB
MD5087be2d4c652dd35156789e4044a5815
SHA1bb9e590891e467a28a511e491e082f88c9bca1ef
SHA256f38ac7e13323086989e78780c6785c664de6392db19779e96ef30bdb769d4ac6
SHA5129d1a431cfe3367c4691b13ce8680f527bb071ff773c5da96a93f09a177d5dfc5e7d5df7100afd45e1a2174b3c99262ba01e80a4d3a98a8beb1025bf67e0a27bb