Analysis
-
max time kernel
150s -
max time network
150s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
15-01-2025 13:15
Static task
static1
Behavioral task
behavioral1
Sample
6350f8da991da9ee85c63e15cce88fbb.dll
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
6350f8da991da9ee85c63e15cce88fbb.dll
Resource
win10v2004-20241007-en
General
-
Target
6350f8da991da9ee85c63e15cce88fbb.dll
-
Size
5.0MB
-
MD5
6350f8da991da9ee85c63e15cce88fbb
-
SHA1
7380fd83ad6371438e1a8356a0c62cf4ca378e91
-
SHA256
6af42a9026223db1b3a0a5ebb788d8935dabfd9dfe34093957b739cb531619a0
-
SHA512
9e0eb43bac2b4245a6daa369564e58ae804b4a234a3782b5f0e6bb7034a46c2147e2d83a046ce9907c30b8ea579f32987aa9e851e3a2ca7f43461cc09012f8fe
-
SSDEEP
49152:znAQqMSPbcBVqxJM0H9PAMEcaEau3R8yAH1plAH:TDqPoB8xWa9P593R8yAVp2H
Malware Config
Signatures
-
Wannacry
WannaCry is a ransomware cryptoworm.
-
Wannacry family
-
Contacts a large (3147) amount of remote hosts 1 TTPs
This may indicate a network scan to discover remotely running services.
-
Executes dropped EXE 3 IoCs
pid Process 2692 mssecsvc.exe 2792 mssecsvc.exe 2924 tasksche.exe -
Creates a large amount of network flows 1 TTPs
This may indicate a network scan to discover remotely running services.
-
Drops file in System32 directory 1 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\Temporary Internet Files\counters.dat mssecsvc.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\WINDOWS\mssecsvc.exe rundll32.exe File created C:\WINDOWS\tasksche.exe mssecsvc.exe -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mssecsvc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mssecsvc.exe -
Modifies data under HKEY_USERS 24 IoCs
description ioc Process Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\History\CachePrefix = "Visited:" mssecsvc.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\DefaultConnectionSettings = 4600000003000000090000000000000000000000000000000400000000000000000000000000000000000000000000000000000001000000020000000a7f00a3000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 mssecsvc.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\DefaultConnectionSettings = 4600000002000000090000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 mssecsvc.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings mssecsvc.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\SavedLegacySettings = 4600000002000000090000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 mssecsvc.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\AutoDetect = "1" mssecsvc.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Cookies\CachePrefix = "Cookie:" mssecsvc.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ProxyEnable = "0" mssecsvc.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{818A60C0-C6AA-465F-B0C6-49E49E5A8D4E} mssecsvc.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{818A60C0-C6AA-465F-B0C6-49E49E5A8D4E}\WpadNetworkName = "Network 3" mssecsvc.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\4e-4f-05-ab-ca-bf mssecsvc.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{818A60C0-C6AA-465F-B0C6-49E49E5A8D4E}\WpadDecisionTime = 20cd4a9d4f67db01 mssecsvc.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{818A60C0-C6AA-465F-B0C6-49E49E5A8D4E}\WpadDecision = "0" mssecsvc.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{818A60C0-C6AA-465F-B0C6-49E49E5A8D4E}\4e-4f-05-ab-ca-bf mssecsvc.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings mssecsvc.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections mssecsvc.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ mssecsvc.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\UNCAsIntranet = "0" mssecsvc.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{818A60C0-C6AA-465F-B0C6-49E49E5A8D4E}\WpadDecisionReason = "1" mssecsvc.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\4e-4f-05-ab-ca-bf\WpadDecisionReason = "1" mssecsvc.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\4e-4f-05-ab-ca-bf\WpadDecisionTime = 20cd4a9d4f67db01 mssecsvc.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\4e-4f-05-ab-ca-bf\WpadDecision = "0" mssecsvc.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Content\CachePrefix mssecsvc.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad mssecsvc.exe -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 1228 wrote to memory of 2460 1228 rundll32.exe 30 PID 1228 wrote to memory of 2460 1228 rundll32.exe 30 PID 1228 wrote to memory of 2460 1228 rundll32.exe 30 PID 1228 wrote to memory of 2460 1228 rundll32.exe 30 PID 1228 wrote to memory of 2460 1228 rundll32.exe 30 PID 1228 wrote to memory of 2460 1228 rundll32.exe 30 PID 1228 wrote to memory of 2460 1228 rundll32.exe 30 PID 2460 wrote to memory of 2692 2460 rundll32.exe 31 PID 2460 wrote to memory of 2692 2460 rundll32.exe 31 PID 2460 wrote to memory of 2692 2460 rundll32.exe 31 PID 2460 wrote to memory of 2692 2460 rundll32.exe 31
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\6350f8da991da9ee85c63e15cce88fbb.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1228 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\6350f8da991da9ee85c63e15cce88fbb.dll,#12⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2460 -
C:\WINDOWS\mssecsvc.exeC:\WINDOWS\mssecsvc.exe3⤵
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:2692 -
C:\WINDOWS\tasksche.exeC:\WINDOWS\tasksche.exe /i4⤵
- Executes dropped EXE
PID:2924
-
-
-
-
C:\WINDOWS\mssecsvc.exeC:\WINDOWS\mssecsvc.exe -m security1⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies data under HKEY_USERS
PID:2792
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3.6MB
MD51766d9d4769580c0fab9e6ad5bf73436
SHA102eca9f1966819d63d82d62a94c8af3e76041411
SHA256fa97baaa08d04807e478688a133076a109a7578c7b4d9be15e96b4de8522807d
SHA51241e36b6a7e0ba4783cd90039cff5e87743cca2e8deee63b62cc0dcb8bab459f1d7919f59275cc266ef1519942ad2386c16791bd9706ee06eb4658f3f86018f50
-
Filesize
3.4MB
MD5747cd55009bdbb466a01bd7214fce79d
SHA1076d78ad4a0f38278e1d39566b9b66b3d2e493e3
SHA256bcf1ba6140b7ba6f0930780cad1d60ac0751bf9c60e55f13a09f92c1ae9ea5e6
SHA5124ae1755ce0a248f60855f7cbb40e70250ed42fe0795e4b60c45158319127aabd4fe4d5cb7b82e0f85f8b5734183437203dd9e26ced6150b2115904cdfed4154a