Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
16/01/2025, 03:41
Static task
static1
Behavioral task
behavioral1
Sample
eb31c45c0ddc0856667bc17f80716bf2e561bfdf2132d14bcadb5c623b9271be.dll
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
eb31c45c0ddc0856667bc17f80716bf2e561bfdf2132d14bcadb5c623b9271be.dll
Resource
win10v2004-20241007-en
General
-
Target
eb31c45c0ddc0856667bc17f80716bf2e561bfdf2132d14bcadb5c623b9271be.dll
-
Size
5.0MB
-
MD5
5ffdc8b7825f72a04d5c97b6a4d80e7e
-
SHA1
f1afa3f2455319414ee08d08b95bd9ae9446ac20
-
SHA256
eb31c45c0ddc0856667bc17f80716bf2e561bfdf2132d14bcadb5c623b9271be
-
SHA512
6379e6b624382430b3e50a56781bbbb59cb3dea82850d968b89ff403c32455babcfe03cb627a6fe53aa8cbd98708fdbe151d48f70f2ba731c26c045bb0c08c69
-
SSDEEP
98304:+DqPoBhz1aRxcSUwxWa9P593R8yAVp2H:+DqPe1CxcpadzR8yc4H
Malware Config
Signatures
-
Wannacry
WannaCry is a ransomware cryptoworm.
-
Wannacry family
-
Contacts a large (3172) amount of remote hosts 1 TTPs
This may indicate a network scan to discover remotely running services.
-
Executes dropped EXE 3 IoCs
pid Process 1636 mssecsvc.exe 4600 mssecsvc.exe 1812 tasksche.exe -
Creates a large amount of network flows 1 TTPs
This may indicate a network scan to discover remotely running services.
-
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\WINDOWS\tasksche.exe mssecsvc.exe File created C:\WINDOWS\mssecsvc.exe rundll32.exe -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mssecsvc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mssecsvc.exe -
Modifies data under HKEY_USERS 5 IoCs
description ioc Process Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\UNCAsIntranet = "1" mssecsvc.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\AutoDetect = "0" mssecsvc.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ mssecsvc.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ProxyBypass = "1" mssecsvc.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\IntranetName = "1" mssecsvc.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 4060 wrote to memory of 4260 4060 rundll32.exe 82 PID 4060 wrote to memory of 4260 4060 rundll32.exe 82 PID 4060 wrote to memory of 4260 4060 rundll32.exe 82 PID 4260 wrote to memory of 1636 4260 rundll32.exe 83 PID 4260 wrote to memory of 1636 4260 rundll32.exe 83 PID 4260 wrote to memory of 1636 4260 rundll32.exe 83
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\eb31c45c0ddc0856667bc17f80716bf2e561bfdf2132d14bcadb5c623b9271be.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:4060 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\eb31c45c0ddc0856667bc17f80716bf2e561bfdf2132d14bcadb5c623b9271be.dll,#12⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4260 -
C:\WINDOWS\mssecsvc.exeC:\WINDOWS\mssecsvc.exe3⤵
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:1636 -
C:\WINDOWS\tasksche.exeC:\WINDOWS\tasksche.exe /i4⤵
- Executes dropped EXE
PID:1812
-
-
-
-
C:\WINDOWS\mssecsvc.exeC:\WINDOWS\mssecsvc.exe -m security1⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Modifies data under HKEY_USERS
PID:4600
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3.6MB
MD51ce39288b0a08b9e9ef9504febb99e0c
SHA1bfd75ca8c358065c6f6178058347014a9cfe3232
SHA256b16dd09bbabdb746683e9b22146ba76682894773cf955a81cae5ceef0a91780e
SHA512615746cc56e0de7e7036b6ea9abd5a47ec1eea2e4c5334cc4ab05cb8f944073a343af186e01feae816a0af9e3ef6e4ac56824eda19f9d8d23cd51e093fe319b0
-
Filesize
3.4MB
MD5b050ed62458d7840747d691f5594009e
SHA16b2132ce30699cca6ece531cdaca483c08e66244
SHA2568916aaa55996942651aa1af354ca9d54c9a94870c837b27ba3d83593c8f41467
SHA51234d56a781ca2600aa8a143b0ba367137d5fd369fd21a7f6f179b7f9f898b9bcbb316fed0da536fb458671663c323f8be92736d30b7d714cb25c51d671bc75726