Analysis
-
max time kernel
150s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
15-01-2025 13:15
Static task
static1
Behavioral task
behavioral1
Sample
6350f8da991da9ee85c63e15cce88fbb.dll
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
6350f8da991da9ee85c63e15cce88fbb.dll
Resource
win10v2004-20241007-en
General
-
Target
6350f8da991da9ee85c63e15cce88fbb.dll
-
Size
5.0MB
-
MD5
6350f8da991da9ee85c63e15cce88fbb
-
SHA1
7380fd83ad6371438e1a8356a0c62cf4ca378e91
-
SHA256
6af42a9026223db1b3a0a5ebb788d8935dabfd9dfe34093957b739cb531619a0
-
SHA512
9e0eb43bac2b4245a6daa369564e58ae804b4a234a3782b5f0e6bb7034a46c2147e2d83a046ce9907c30b8ea579f32987aa9e851e3a2ca7f43461cc09012f8fe
-
SSDEEP
49152:znAQqMSPbcBVqxJM0H9PAMEcaEau3R8yAH1plAH:TDqPoB8xWa9P593R8yAVp2H
Malware Config
Signatures
-
Wannacry
WannaCry is a ransomware cryptoworm.
-
Wannacry family
-
Contacts a large (3314) amount of remote hosts 1 TTPs
This may indicate a network scan to discover remotely running services.
-
Executes dropped EXE 3 IoCs
pid Process 3996 mssecsvc.exe 4200 mssecsvc.exe 5112 tasksche.exe -
Creates a large amount of network flows 1 TTPs
This may indicate a network scan to discover remotely running services.
-
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\WINDOWS\mssecsvc.exe rundll32.exe File created C:\WINDOWS\tasksche.exe mssecsvc.exe -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mssecsvc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mssecsvc.exe -
Modifies data under HKEY_USERS 5 IoCs
description ioc Process Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ mssecsvc.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ProxyBypass = "1" mssecsvc.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\IntranetName = "1" mssecsvc.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\UNCAsIntranet = "1" mssecsvc.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\AutoDetect = "0" mssecsvc.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 3204 wrote to memory of 4400 3204 rundll32.exe 82 PID 3204 wrote to memory of 4400 3204 rundll32.exe 82 PID 3204 wrote to memory of 4400 3204 rundll32.exe 82 PID 4400 wrote to memory of 3996 4400 rundll32.exe 83 PID 4400 wrote to memory of 3996 4400 rundll32.exe 83 PID 4400 wrote to memory of 3996 4400 rundll32.exe 83
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\6350f8da991da9ee85c63e15cce88fbb.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:3204 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\6350f8da991da9ee85c63e15cce88fbb.dll,#12⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4400 -
C:\WINDOWS\mssecsvc.exeC:\WINDOWS\mssecsvc.exe3⤵
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:3996 -
C:\WINDOWS\tasksche.exeC:\WINDOWS\tasksche.exe /i4⤵
- Executes dropped EXE
PID:5112
-
-
-
-
C:\WINDOWS\mssecsvc.exeC:\WINDOWS\mssecsvc.exe -m security1⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Modifies data under HKEY_USERS
PID:4200
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3.6MB
MD51766d9d4769580c0fab9e6ad5bf73436
SHA102eca9f1966819d63d82d62a94c8af3e76041411
SHA256fa97baaa08d04807e478688a133076a109a7578c7b4d9be15e96b4de8522807d
SHA51241e36b6a7e0ba4783cd90039cff5e87743cca2e8deee63b62cc0dcb8bab459f1d7919f59275cc266ef1519942ad2386c16791bd9706ee06eb4658f3f86018f50
-
Filesize
3.4MB
MD5747cd55009bdbb466a01bd7214fce79d
SHA1076d78ad4a0f38278e1d39566b9b66b3d2e493e3
SHA256bcf1ba6140b7ba6f0930780cad1d60ac0751bf9c60e55f13a09f92c1ae9ea5e6
SHA5124ae1755ce0a248f60855f7cbb40e70250ed42fe0795e4b60c45158319127aabd4fe4d5cb7b82e0f85f8b5734183437203dd9e26ced6150b2115904cdfed4154a