Analysis
-
max time kernel
150s -
max time network
151s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
16-01-2025 02:48
Static task
static1
Behavioral task
behavioral1
Sample
5f77ec5a76d7aeedf0071714d72c6e012db30ac40b9f26793f5aae58b6267197.dll
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
5f77ec5a76d7aeedf0071714d72c6e012db30ac40b9f26793f5aae58b6267197.dll
Resource
win10v2004-20241007-en
General
-
Target
5f77ec5a76d7aeedf0071714d72c6e012db30ac40b9f26793f5aae58b6267197.dll
-
Size
5.0MB
-
MD5
508a10e644641d0663201a34d1f34a3e
-
SHA1
938032b48266a294ac966a632bf39510112ee052
-
SHA256
5f77ec5a76d7aeedf0071714d72c6e012db30ac40b9f26793f5aae58b6267197
-
SHA512
c7bff89cca236eec09f8c736f8bed56c0b17314397053b610c29e274c97b660b725a847dd622f306c1ac3bf7d91b0baceb078664270ae7da522b9fde9dd6a24b
-
SSDEEP
98304:TDqPoBhz1aRxcSUDk36SAEa593R8yAVp2H:TDqPe1Cxcxk3ZAEazR8yc4H
Malware Config
Signatures
-
Wannacry
WannaCry is a ransomware cryptoworm.
-
Wannacry family
-
Contacts a large (3235) amount of remote hosts 1 TTPs
This may indicate a network scan to discover remotely running services.
-
Executes dropped EXE 3 IoCs
pid Process 2000 mssecsvc.exe 2564 mssecsvc.exe 2092 tasksche.exe -
Creates a large amount of network flows 1 TTPs
This may indicate a network scan to discover remotely running services.
-
Drops file in System32 directory 1 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\Temporary Internet Files\counters.dat mssecsvc.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\WINDOWS\mssecsvc.exe rundll32.exe File created C:\WINDOWS\tasksche.exe mssecsvc.exe -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mssecsvc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mssecsvc.exe -
Modifies data under HKEY_USERS 24 IoCs
description ioc Process Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{2A8EB253-935E-4A00-A6FC-377A73112556}\WpadDecisionTime = d0c25520c167db01 mssecsvc.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{2A8EB253-935E-4A00-A6FC-377A73112556}\4a-84-6f-90-cf-3b mssecsvc.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\4a-84-6f-90-cf-3b\WpadDecisionReason = "1" mssecsvc.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings mssecsvc.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ProxyEnable = "0" mssecsvc.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\SavedLegacySettings = 4600000002000000090000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 mssecsvc.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\AutoDetect = "1" mssecsvc.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\History\CachePrefix = "Visited:" mssecsvc.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\4a-84-6f-90-cf-3b\WpadDecision = "0" mssecsvc.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{2A8EB253-935E-4A00-A6FC-377A73112556}\WpadDecisionReason = "1" mssecsvc.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{2A8EB253-935E-4A00-A6FC-377A73112556}\WpadNetworkName = "Network 3" mssecsvc.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\4a-84-6f-90-cf-3b\WpadDecisionTime = d0c25520c167db01 mssecsvc.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Content\CachePrefix mssecsvc.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Cookies\CachePrefix = "Cookie:" mssecsvc.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad mssecsvc.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\DefaultConnectionSettings = 4600000003000000090000000000000000000000000000000400000000000000000000000000000000000000000000000000000001000000020000000a7f0162000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 mssecsvc.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{2A8EB253-935E-4A00-A6FC-377A73112556} mssecsvc.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\DefaultConnectionSettings = 4600000002000000090000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 mssecsvc.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\4a-84-6f-90-cf-3b mssecsvc.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings mssecsvc.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections mssecsvc.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ mssecsvc.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\UNCAsIntranet = "0" mssecsvc.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{2A8EB253-935E-4A00-A6FC-377A73112556}\WpadDecision = "0" mssecsvc.exe -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 2900 wrote to memory of 788 2900 rundll32.exe 28 PID 2900 wrote to memory of 788 2900 rundll32.exe 28 PID 2900 wrote to memory of 788 2900 rundll32.exe 28 PID 2900 wrote to memory of 788 2900 rundll32.exe 28 PID 2900 wrote to memory of 788 2900 rundll32.exe 28 PID 2900 wrote to memory of 788 2900 rundll32.exe 28 PID 2900 wrote to memory of 788 2900 rundll32.exe 28 PID 788 wrote to memory of 2000 788 rundll32.exe 29 PID 788 wrote to memory of 2000 788 rundll32.exe 29 PID 788 wrote to memory of 2000 788 rundll32.exe 29 PID 788 wrote to memory of 2000 788 rundll32.exe 29
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\5f77ec5a76d7aeedf0071714d72c6e012db30ac40b9f26793f5aae58b6267197.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:2900 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\5f77ec5a76d7aeedf0071714d72c6e012db30ac40b9f26793f5aae58b6267197.dll,#12⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:788 -
C:\WINDOWS\mssecsvc.exeC:\WINDOWS\mssecsvc.exe3⤵
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:2000 -
C:\WINDOWS\tasksche.exeC:\WINDOWS\tasksche.exe /i4⤵
- Executes dropped EXE
PID:2092
-
-
-
-
C:\WINDOWS\mssecsvc.exeC:\WINDOWS\mssecsvc.exe -m security1⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies data under HKEY_USERS
PID:2564
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3.6MB
MD51147ea38fa9c8262147edfca8d05c25b
SHA1c269024fff089b2df3939b934ca8ee75cc40d6b7
SHA2560a9ec2f6c2c9acf8b0d69e4478951ddfadfc2f7208a564ebfae9d28738c51e5f
SHA512f26fc6d40d5976cf7163cca2255f1d56d623cdb58d4a6df40b112b210cd128624d0d5947723c15152c57e109ea5e5332ae2edb037a843c9d4b2882fa844f2086
-
Filesize
3.4MB
MD58db30a1308d4b53a26a76b814813b8b4
SHA161791a7326af11ef6bbe3007dec1d43d172edd8b
SHA256ced6e1ab61223c75546bc6c10abfdf75419a8092a7803789817052d48ddf0714
SHA5121bbd5ccb904aeca6dc9eb42d6f75925175cbbc13ced43f6d4bf999fcefb56d033c5e27bfd13efb493e76ec50aa8b01e6cc07f53102f83411b32c6c29cf269750