Analysis
-
max time kernel
150s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
16-01-2025 02:48
Static task
static1
Behavioral task
behavioral1
Sample
5f77ec5a76d7aeedf0071714d72c6e012db30ac40b9f26793f5aae58b6267197.dll
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
5f77ec5a76d7aeedf0071714d72c6e012db30ac40b9f26793f5aae58b6267197.dll
Resource
win10v2004-20241007-en
General
-
Target
5f77ec5a76d7aeedf0071714d72c6e012db30ac40b9f26793f5aae58b6267197.dll
-
Size
5.0MB
-
MD5
508a10e644641d0663201a34d1f34a3e
-
SHA1
938032b48266a294ac966a632bf39510112ee052
-
SHA256
5f77ec5a76d7aeedf0071714d72c6e012db30ac40b9f26793f5aae58b6267197
-
SHA512
c7bff89cca236eec09f8c736f8bed56c0b17314397053b610c29e274c97b660b725a847dd622f306c1ac3bf7d91b0baceb078664270ae7da522b9fde9dd6a24b
-
SSDEEP
98304:TDqPoBhz1aRxcSUDk36SAEa593R8yAVp2H:TDqPe1Cxcxk3ZAEazR8yc4H
Malware Config
Signatures
-
Wannacry
WannaCry is a ransomware cryptoworm.
-
Wannacry family
-
Contacts a large (3207) amount of remote hosts 1 TTPs
This may indicate a network scan to discover remotely running services.
-
Executes dropped EXE 3 IoCs
pid Process 2264 mssecsvc.exe 3388 mssecsvc.exe 3068 tasksche.exe -
Creates a large amount of network flows 1 TTPs
This may indicate a network scan to discover remotely running services.
-
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\WINDOWS\mssecsvc.exe rundll32.exe File created C:\WINDOWS\tasksche.exe mssecsvc.exe -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mssecsvc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mssecsvc.exe -
Modifies data under HKEY_USERS 5 IoCs
description ioc Process Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ProxyBypass = "1" mssecsvc.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\IntranetName = "1" mssecsvc.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\UNCAsIntranet = "1" mssecsvc.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\AutoDetect = "0" mssecsvc.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ mssecsvc.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 1220 wrote to memory of 1460 1220 rundll32.exe 83 PID 1220 wrote to memory of 1460 1220 rundll32.exe 83 PID 1220 wrote to memory of 1460 1220 rundll32.exe 83 PID 1460 wrote to memory of 2264 1460 rundll32.exe 84 PID 1460 wrote to memory of 2264 1460 rundll32.exe 84 PID 1460 wrote to memory of 2264 1460 rundll32.exe 84
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\5f77ec5a76d7aeedf0071714d72c6e012db30ac40b9f26793f5aae58b6267197.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1220 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\5f77ec5a76d7aeedf0071714d72c6e012db30ac40b9f26793f5aae58b6267197.dll,#12⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1460 -
C:\WINDOWS\mssecsvc.exeC:\WINDOWS\mssecsvc.exe3⤵
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:2264 -
C:\WINDOWS\tasksche.exeC:\WINDOWS\tasksche.exe /i4⤵
- Executes dropped EXE
PID:3068
-
-
-
-
C:\WINDOWS\mssecsvc.exeC:\WINDOWS\mssecsvc.exe -m security1⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Modifies data under HKEY_USERS
PID:3388
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3.6MB
MD51147ea38fa9c8262147edfca8d05c25b
SHA1c269024fff089b2df3939b934ca8ee75cc40d6b7
SHA2560a9ec2f6c2c9acf8b0d69e4478951ddfadfc2f7208a564ebfae9d28738c51e5f
SHA512f26fc6d40d5976cf7163cca2255f1d56d623cdb58d4a6df40b112b210cd128624d0d5947723c15152c57e109ea5e5332ae2edb037a843c9d4b2882fa844f2086
-
Filesize
3.4MB
MD58db30a1308d4b53a26a76b814813b8b4
SHA161791a7326af11ef6bbe3007dec1d43d172edd8b
SHA256ced6e1ab61223c75546bc6c10abfdf75419a8092a7803789817052d48ddf0714
SHA5121bbd5ccb904aeca6dc9eb42d6f75925175cbbc13ced43f6d4bf999fcefb56d033c5e27bfd13efb493e76ec50aa8b01e6cc07f53102f83411b32c6c29cf269750