Analysis

  • max time kernel
    150s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    16-01-2025 03:46

General

  • Target

    fca91ac499fbffbcc8b20d876bf84f7833d72825810f628b67098aec7d1c7037.dll

  • Size

    5.0MB

  • MD5

    2315e86a19005c5e60b0109dbb8dc925

  • SHA1

    5a810aef694aa0b1ee9dcf35e9f3759d29677346

  • SHA256

    fca91ac499fbffbcc8b20d876bf84f7833d72825810f628b67098aec7d1c7037

  • SHA512

    b16a97c5de9cc5358b137fb1f7139907c106de42271c98e463f975429000ff0afe7215dbadbb3ecf956f8f15d15effde3b6702a090b33914b5fa4cda78e5be3f

  • SSDEEP

    98304:+DqPoBkaRxcSUDk36SAEdhvxWa9P593R8yAVp2H:+DqPlCxcxk3ZAEUadzR8yc4H

Malware Config

Signatures

  • Wannacry

    WannaCry is a ransomware cryptoworm.

  • Wannacry family
  • Contacts a large (3252) amount of remote hosts 1 TTPs

    This may indicate a network scan to discover remotely running services.

  • Executes dropped EXE 3 IoCs
  • Creates a large amount of network flows 1 TTPs

    This may indicate a network scan to discover remotely running services.

  • Drops file in Windows directory 2 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies data under HKEY_USERS 5 IoCs
  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Windows\system32\rundll32.exe
    rundll32.exe C:\Users\Admin\AppData\Local\Temp\fca91ac499fbffbcc8b20d876bf84f7833d72825810f628b67098aec7d1c7037.dll,#1
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2836
    • C:\Windows\SysWOW64\rundll32.exe
      rundll32.exe C:\Users\Admin\AppData\Local\Temp\fca91ac499fbffbcc8b20d876bf84f7833d72825810f628b67098aec7d1c7037.dll,#1
      2⤵
      • Drops file in Windows directory
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:376
      • C:\WINDOWS\mssecsvc.exe
        C:\WINDOWS\mssecsvc.exe
        3⤵
        • Executes dropped EXE
        • Drops file in Windows directory
        • System Location Discovery: System Language Discovery
        PID:3716
        • C:\WINDOWS\tasksche.exe
          C:\WINDOWS\tasksche.exe /i
          4⤵
          • Executes dropped EXE
          PID:4820
  • C:\WINDOWS\mssecsvc.exe
    C:\WINDOWS\mssecsvc.exe -m security
    1⤵
    • Executes dropped EXE
    • System Location Discovery: System Language Discovery
    • Modifies data under HKEY_USERS
    PID:840

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Windows\mssecsvc.exe

    Filesize

    3.6MB

    MD5

    5ce0c05bc5a5a786c0623c16c2d8b3a5

    SHA1

    c84ba976f9957e0dec7946aada3595991c7530ea

    SHA256

    65ca8be3052d01a3ec269e7236307f455178e84ab7932fa6a57cd164bc5194a1

    SHA512

    e4b948e3b59da4416353d7d1c73ace1371c349ab2715393ca46f454f52c72f1799d13da8fc575798143b4c8e445cebd311101e252e617845496e50dacb376972

  • C:\Windows\tasksche.exe

    Filesize

    3.4MB

    MD5

    29868284ea8eb1d5db9949a9112cbab9

    SHA1

    ce695039175fe31cfb10b10fadec1c0523c72279

    SHA256

    81505522b84444cb5f006fb60330421c51012b7f60d04fd79f837f5297e217a9

    SHA512

    c7726a5a3993ca69da148c3fd837806eb2226a3074142b8ca07d70eae2425a1effb81b95e63d5e4b2b6ca46ce653c20c475d8c0002873f352edc3a0daf81c7d3