Analysis

  • max time kernel
    150s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    15-01-2025 01:56

General

  • Target

    50b93e08b91de26b5487abe79afe1d4a.dll

  • Size

    5.0MB

  • MD5

    50b93e08b91de26b5487abe79afe1d4a

  • SHA1

    883462757d74dfbb08b94dd66159d9852e6c2ee9

  • SHA256

    0e665ab2b0a1d700e9cc2c94022e9fb9ed7eb9ec8210c057bf938bc62eb95467

  • SHA512

    a5ba259031ea89c4f52669516052a821e95a64884baf047b02f8aeab0ac97258447d057c4039cea6b15ba4ee1d3f33fb4afd02d39d203ecb8b1c3ef5575ed325

  • SSDEEP

    98304:+DqPoBhz1aRxcSUDk36SAEdhvxWa9P593R8yAVp2H:+DqPe1Cxcxk3ZAEUadzR8yc4H

Malware Config

Signatures

  • Wannacry

    WannaCry is a ransomware cryptoworm.

  • Wannacry family
  • Contacts a large (3144) amount of remote hosts 1 TTPs

    This may indicate a network scan to discover remotely running services.

  • Executes dropped EXE 3 IoCs
  • Creates a large amount of network flows 1 TTPs

    This may indicate a network scan to discover remotely running services.

  • Drops file in Windows directory 2 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies data under HKEY_USERS 5 IoCs
  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Windows\system32\rundll32.exe
    rundll32.exe C:\Users\Admin\AppData\Local\Temp\50b93e08b91de26b5487abe79afe1d4a.dll,#1
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:4924
    • C:\Windows\SysWOW64\rundll32.exe
      rundll32.exe C:\Users\Admin\AppData\Local\Temp\50b93e08b91de26b5487abe79afe1d4a.dll,#1
      2⤵
      • Drops file in Windows directory
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:1340
      • C:\WINDOWS\mssecsvc.exe
        C:\WINDOWS\mssecsvc.exe
        3⤵
        • Executes dropped EXE
        • Drops file in Windows directory
        • System Location Discovery: System Language Discovery
        PID:672
        • C:\WINDOWS\tasksche.exe
          C:\WINDOWS\tasksche.exe /i
          4⤵
          • Executes dropped EXE
          PID:2368
  • C:\WINDOWS\mssecsvc.exe
    C:\WINDOWS\mssecsvc.exe -m security
    1⤵
    • Executes dropped EXE
    • System Location Discovery: System Language Discovery
    • Modifies data under HKEY_USERS
    PID:4016

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Windows\mssecsvc.exe

    Filesize

    3.6MB

    MD5

    41b5ba4bf74e65845fa8c9861ca34508

    SHA1

    427934d7fa2467bab1abfa5959c8cf6d0ae00ea7

    SHA256

    95ab184ecc89b9a593c024963650f54fe0a597c3f75d75ff3bf4f33f648c6d13

    SHA512

    ef55010669b1098df68c511d6863082abcc2ed4af78d933a1fb8dad347893eebc44ade3e41b3fe296a11dd3cf026bdb0d8359dd759569df5d7b37f9294921a48

  • C:\Windows\tasksche.exe

    Filesize

    3.4MB

    MD5

    c906087fbfe90924bc4f903e527e52e8

    SHA1

    0ce9bd4724cae1edc5141e6c8074ad5fcaf9fc6a

    SHA256

    802d815d1cd9e4193cf586124622bde16ecb5d7127a1c0aa9a13d1e3e46f564a

    SHA512

    c479f547bf5e79cfab2985173f200583047e7f47ac565b248ccae802d2e4633cb410a7c502d4923fa6f34d6ca9bd77f898d3ef001a1a42c8939aff861a35457b