Analysis
-
max time kernel
150s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
16-01-2025 03:15
Static task
static1
Behavioral task
behavioral1
Sample
a732dfc06e3c406c0efb385c7ca51d4c4be76faabddf4fcb5185115eb74fbc96.dll
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
a732dfc06e3c406c0efb385c7ca51d4c4be76faabddf4fcb5185115eb74fbc96.dll
Resource
win10v2004-20241007-en
General
-
Target
a732dfc06e3c406c0efb385c7ca51d4c4be76faabddf4fcb5185115eb74fbc96.dll
-
Size
5.0MB
-
MD5
50277f214d447d0890c53466fb68af0e
-
SHA1
fa1794c45c893ae6c4e1784b93c56ce8283b634b
-
SHA256
a732dfc06e3c406c0efb385c7ca51d4c4be76faabddf4fcb5185115eb74fbc96
-
SHA512
258ee3e29063557e0babc743677dccb56af030ae531e899fbda84dea3fd61a447a1f8a3d36766fd871de35db1c7a63c8d682f0a0ca6be7e334b389cc72e4bb55
-
SSDEEP
98304:M8qPoBhz1aRxcSUDk36SANKx/ag6iVp2H:M8qPe1Cxcxk3ZA0Yu4H
Malware Config
Signatures
-
Wannacry
WannaCry is a ransomware cryptoworm.
-
Wannacry family
-
Contacts a large (3289) amount of remote hosts 1 TTPs
This may indicate a network scan to discover remotely running services.
-
Executes dropped EXE 3 IoCs
pid Process 4796 mssecsvc.exe 868 mssecsvc.exe 1420 tasksche.exe -
Creates a large amount of network flows 1 TTPs
This may indicate a network scan to discover remotely running services.
-
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\WINDOWS\mssecsvc.exe rundll32.exe File created C:\WINDOWS\tasksche.exe mssecsvc.exe -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mssecsvc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mssecsvc.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 1680 wrote to memory of 3300 1680 rundll32.exe 82 PID 1680 wrote to memory of 3300 1680 rundll32.exe 82 PID 1680 wrote to memory of 3300 1680 rundll32.exe 82 PID 3300 wrote to memory of 4796 3300 rundll32.exe 83 PID 3300 wrote to memory of 4796 3300 rundll32.exe 83 PID 3300 wrote to memory of 4796 3300 rundll32.exe 83
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\a732dfc06e3c406c0efb385c7ca51d4c4be76faabddf4fcb5185115eb74fbc96.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1680 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\a732dfc06e3c406c0efb385c7ca51d4c4be76faabddf4fcb5185115eb74fbc96.dll,#12⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3300 -
C:\WINDOWS\mssecsvc.exeC:\WINDOWS\mssecsvc.exe3⤵
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:4796 -
C:\WINDOWS\tasksche.exeC:\WINDOWS\tasksche.exe /i4⤵
- Executes dropped EXE
PID:1420
-
-
-
-
C:\WINDOWS\mssecsvc.exeC:\WINDOWS\mssecsvc.exe -m security1⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:868
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3.6MB
MD537e83c242780259951e18e4492b93594
SHA126daa14a22083417b6e294f7a20ebd666c6fcdd1
SHA2560a54aad986469f3015c019e4fcd5cf0d27a6f98688e272c67ee8b862b3fd18f3
SHA51298336c534626e0f183c29afb00d65c0796a3cf7e98e1bc30dcbdfa46ab0b864cc788585deab8ec39b1bc9671dc70ede6662cbb212e7caa5107a907162550019b
-
Filesize
3.4MB
MD5c6e92c6ed2e9e493e490001c4d4c8996
SHA118f29ac7b184ae98ee1c0f798723b6f48485c4b8
SHA256d310fd32a780d2978e5f34bd70a309661ccd9a2df9996357a02a871ff35a131a
SHA512b45554d0cc5a6b3f5b90185c23752144a6b3f59e0c34dde6d1f078b25f16362f14f65fa006a9ddea0c61e5774dfbe4af68bd128f7120bae33df59dac12865467