Analysis
-
max time kernel
150s -
max time network
150s -
platform
windows7_x64 -
resource
win7-20240729-en -
resource tags
arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system -
submitted
16-01-2025 03:41
Static task
static1
Behavioral task
behavioral1
Sample
eb31c45c0ddc0856667bc17f80716bf2e561bfdf2132d14bcadb5c623b9271be.dll
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
eb31c45c0ddc0856667bc17f80716bf2e561bfdf2132d14bcadb5c623b9271be.dll
Resource
win10v2004-20241007-en
General
-
Target
eb31c45c0ddc0856667bc17f80716bf2e561bfdf2132d14bcadb5c623b9271be.dll
-
Size
5.0MB
-
MD5
5ffdc8b7825f72a04d5c97b6a4d80e7e
-
SHA1
f1afa3f2455319414ee08d08b95bd9ae9446ac20
-
SHA256
eb31c45c0ddc0856667bc17f80716bf2e561bfdf2132d14bcadb5c623b9271be
-
SHA512
6379e6b624382430b3e50a56781bbbb59cb3dea82850d968b89ff403c32455babcfe03cb627a6fe53aa8cbd98708fdbe151d48f70f2ba731c26c045bb0c08c69
-
SSDEEP
98304:+DqPoBhz1aRxcSUwxWa9P593R8yAVp2H:+DqPe1CxcpadzR8yc4H
Malware Config
Signatures
-
Wannacry
WannaCry is a ransomware cryptoworm.
-
Wannacry family
-
Contacts a large (3115) amount of remote hosts 1 TTPs
This may indicate a network scan to discover remotely running services.
-
Executes dropped EXE 3 IoCs
pid Process 2248 mssecsvc.exe 2856 mssecsvc.exe 2360 tasksche.exe -
Creates a large amount of network flows 1 TTPs
This may indicate a network scan to discover remotely running services.
-
Drops file in System32 directory 1 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\Temporary Internet Files\counters.dat mssecsvc.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\WINDOWS\tasksche.exe mssecsvc.exe File created C:\WINDOWS\mssecsvc.exe rundll32.exe -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mssecsvc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mssecsvc.exe -
Modifies data under HKEY_USERS 24 IoCs
description ioc Process Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings mssecsvc.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\UNCAsIntranet = "0" mssecsvc.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{CB7F8597-7AEA-4992-9284-338F00D4AEB2}\WpadDecision = "0" mssecsvc.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\e6-0f-6b-52-b9-26 mssecsvc.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\e6-0f-6b-52-b9-26\WpadDecisionReason = "1" mssecsvc.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad mssecsvc.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\DefaultConnectionSettings = 4600000003000000090000000000000000000000000000000400000000000000000000000000000000000000000000000000000001000000020000000a7f0125000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 mssecsvc.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\e6-0f-6b-52-b9-26\WpadDecision = "0" mssecsvc.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\DefaultConnectionSettings = 4600000002000000090000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 mssecsvc.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings mssecsvc.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\SavedLegacySettings = 4600000002000000090000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 mssecsvc.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Content\CachePrefix mssecsvc.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Cookies\CachePrefix = "Cookie:" mssecsvc.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections mssecsvc.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{CB7F8597-7AEA-4992-9284-338F00D4AEB2}\WpadNetworkName = "Network 3" mssecsvc.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\e6-0f-6b-52-b9-26\WpadDecisionTime = f05cd278c867db01 mssecsvc.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{CB7F8597-7AEA-4992-9284-338F00D4AEB2}\WpadDecisionReason = "1" mssecsvc.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{CB7F8597-7AEA-4992-9284-338F00D4AEB2}\WpadDecisionTime = f05cd278c867db01 mssecsvc.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{CB7F8597-7AEA-4992-9284-338F00D4AEB2}\e6-0f-6b-52-b9-26 mssecsvc.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ProxyEnable = "0" mssecsvc.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ mssecsvc.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\AutoDetect = "1" mssecsvc.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\History\CachePrefix = "Visited:" mssecsvc.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{CB7F8597-7AEA-4992-9284-338F00D4AEB2} mssecsvc.exe -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 528 wrote to memory of 2368 528 rundll32.exe 30 PID 528 wrote to memory of 2368 528 rundll32.exe 30 PID 528 wrote to memory of 2368 528 rundll32.exe 30 PID 528 wrote to memory of 2368 528 rundll32.exe 30 PID 528 wrote to memory of 2368 528 rundll32.exe 30 PID 528 wrote to memory of 2368 528 rundll32.exe 30 PID 528 wrote to memory of 2368 528 rundll32.exe 30 PID 2368 wrote to memory of 2248 2368 rundll32.exe 31 PID 2368 wrote to memory of 2248 2368 rundll32.exe 31 PID 2368 wrote to memory of 2248 2368 rundll32.exe 31 PID 2368 wrote to memory of 2248 2368 rundll32.exe 31
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\eb31c45c0ddc0856667bc17f80716bf2e561bfdf2132d14bcadb5c623b9271be.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:528 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\eb31c45c0ddc0856667bc17f80716bf2e561bfdf2132d14bcadb5c623b9271be.dll,#12⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2368 -
C:\WINDOWS\mssecsvc.exeC:\WINDOWS\mssecsvc.exe3⤵
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:2248 -
C:\WINDOWS\tasksche.exeC:\WINDOWS\tasksche.exe /i4⤵
- Executes dropped EXE
PID:2360
-
-
-
-
C:\WINDOWS\mssecsvc.exeC:\WINDOWS\mssecsvc.exe -m security1⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies data under HKEY_USERS
PID:2856
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3.6MB
MD51ce39288b0a08b9e9ef9504febb99e0c
SHA1bfd75ca8c358065c6f6178058347014a9cfe3232
SHA256b16dd09bbabdb746683e9b22146ba76682894773cf955a81cae5ceef0a91780e
SHA512615746cc56e0de7e7036b6ea9abd5a47ec1eea2e4c5334cc4ab05cb8f944073a343af186e01feae816a0af9e3ef6e4ac56824eda19f9d8d23cd51e093fe319b0
-
Filesize
3.4MB
MD5b050ed62458d7840747d691f5594009e
SHA16b2132ce30699cca6ece531cdaca483c08e66244
SHA2568916aaa55996942651aa1af354ca9d54c9a94870c837b27ba3d83593c8f41467
SHA51234d56a781ca2600aa8a143b0ba367137d5fd369fd21a7f6f179b7f9f898b9bcbb316fed0da536fb458671663c323f8be92736d30b7d714cb25c51d671bc75726