Analysis

  • max time kernel
    150s
  • max time network
    150s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    15-01-2025 01:51

General

  • Target

    99fbd88dafad2ed4a82cc80f8b8eb8d4.dll

  • Size

    5.0MB

  • MD5

    99fbd88dafad2ed4a82cc80f8b8eb8d4

  • SHA1

    e2023fcc0a9991c84fa24ea4f3285305514c52cb

  • SHA256

    5b7edc95ab8033817fb07fee8e8f114be7f1873abcd69d07899ac60ae9b9763a

  • SHA512

    a012ac91f0475943cdfecf882e96e940cb445e7466d3a4e9d8737412b265b54d941a5a9798754e2942ef1c6b17deac56d351206f7cd8808560ccae30b554be8b

  • SSDEEP

    49152:JnAQqMSPbcBVQej/1INRx+TSqTg6SAARdhH9PAMEcaEau3:dDqPoBhz1aRxcSUg6SAEdt9P593

Malware Config

Signatures

  • Wannacry

    WannaCry is a ransomware cryptoworm.

  • Wannacry family
  • Contacts a large (3261) amount of remote hosts 1 TTPs

    This may indicate a network scan to discover remotely running services.

  • Executes dropped EXE 3 IoCs
  • Creates a large amount of network flows 1 TTPs

    This may indicate a network scan to discover remotely running services.

  • Drops file in System32 directory 1 IoCs
  • Drops file in Windows directory 2 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies data under HKEY_USERS 24 IoCs
  • Suspicious use of WriteProcessMemory 11 IoCs

Processes

  • C:\Windows\system32\rundll32.exe
    rundll32.exe C:\Users\Admin\AppData\Local\Temp\99fbd88dafad2ed4a82cc80f8b8eb8d4.dll,#1
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1996
    • C:\Windows\SysWOW64\rundll32.exe
      rundll32.exe C:\Users\Admin\AppData\Local\Temp\99fbd88dafad2ed4a82cc80f8b8eb8d4.dll,#1
      2⤵
      • Drops file in Windows directory
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:1056
      • C:\WINDOWS\mssecsvc.exe
        C:\WINDOWS\mssecsvc.exe
        3⤵
        • Executes dropped EXE
        • Drops file in Windows directory
        • System Location Discovery: System Language Discovery
        PID:2008
        • C:\WINDOWS\tasksche.exe
          C:\WINDOWS\tasksche.exe /i
          4⤵
          • Executes dropped EXE
          PID:2752
  • C:\WINDOWS\mssecsvc.exe
    C:\WINDOWS\mssecsvc.exe -m security
    1⤵
    • Executes dropped EXE
    • Drops file in System32 directory
    • System Location Discovery: System Language Discovery
    • Modifies data under HKEY_USERS
    PID:2692

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Windows\mssecsvc.exe

    Filesize

    3.6MB

    MD5

    8ed7f2e1aae7a4371aa929a5eb6a6e59

    SHA1

    b7527fb2d0e20fff576e747883b442aba1984dbc

    SHA256

    2b2f4b29a1cee09d68d765422f86812aae50e9b92b39cff3cfe1c57b3d34d279

    SHA512

    2257bc07bfa2e96483fc9823accc1c2eba6a7bb78df4bee58c6db7ef06097deaa6d7a6735b6a897ea9166721434c423854b96ddf61f369f92b88ff9c755530e3

  • C:\Windows\tasksche.exe

    Filesize

    3.4MB

    MD5

    171e35fe5fd37ca850d3d1234d94e194

    SHA1

    06c040762d84de3a9ef76bc9e867598568cac28a

    SHA256

    17528e634c992a0b607fa14c088983183282bfa90d470e1ae95bff4763efd866

    SHA512

    b50d220a39213ebc9f27baf7d25ff6fec06f608bdd5794da8b600351b69b4c9c18cd2c151edde389b55ff3b95164247e63d763aa08b6b91ebc816dbd4858cf26