Analysis
-
max time kernel
150s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
16-01-2025 15:12
Static task
static1
Behavioral task
behavioral1
Sample
ee5ebc67e4c18332cebc69eba65393d7.dll
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
ee5ebc67e4c18332cebc69eba65393d7.dll
Resource
win10v2004-20241007-en
General
-
Target
ee5ebc67e4c18332cebc69eba65393d7.dll
-
Size
5.0MB
-
MD5
ee5ebc67e4c18332cebc69eba65393d7
-
SHA1
1d80cf253d7410e990735170f46e5bef5ea88ef6
-
SHA256
8901ec63265401b24d143fbea067a2d4b0e4cda2e95be3f6c69e7c7fefea8e44
-
SHA512
6533b1db51cf3b012acf3938085c4e17953235e9ff21d2752a7ca5ee3f94943b3bc3c2cf6387a825ace153f21a353edc7ad2fb6cb377d150c58e8bcfa84fd64a
-
SSDEEP
6144:yE9l9yNqIYVTH5DgSg8ajldktM0XXrsS3s2VR:ywbLgPluao
Malware Config
Signatures
-
Wannacry
WannaCry is a ransomware cryptoworm.
-
Wannacry family
-
Contacts a large (3197) amount of remote hosts 1 TTPs
This may indicate a network scan to discover remotely running services.
-
Executes dropped EXE 3 IoCs
pid Process 1984 mssecsvc.exe 1208 mssecsvc.exe 3088 tasksche.exe -
Creates a large amount of network flows 1 TTPs
This may indicate a network scan to discover remotely running services.
-
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\WINDOWS\mssecsvc.exe rundll32.exe File created C:\WINDOWS\tasksche.exe mssecsvc.exe -
Program crash 2 IoCs
pid pid_target Process procid_target 1948 3088 WerFault.exe 86 2212 3088 WerFault.exe 86 -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mssecsvc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mssecsvc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tasksche.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 4468 wrote to memory of 4220 4468 rundll32.exe 83 PID 4468 wrote to memory of 4220 4468 rundll32.exe 83 PID 4468 wrote to memory of 4220 4468 rundll32.exe 83 PID 4220 wrote to memory of 1984 4220 rundll32.exe 84 PID 4220 wrote to memory of 1984 4220 rundll32.exe 84 PID 4220 wrote to memory of 1984 4220 rundll32.exe 84 PID 1984 wrote to memory of 3088 1984 mssecsvc.exe 86 PID 1984 wrote to memory of 3088 1984 mssecsvc.exe 86 PID 1984 wrote to memory of 3088 1984 mssecsvc.exe 86
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\ee5ebc67e4c18332cebc69eba65393d7.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:4468 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\ee5ebc67e4c18332cebc69eba65393d7.dll,#12⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4220 -
C:\WINDOWS\mssecsvc.exeC:\WINDOWS\mssecsvc.exe3⤵
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1984 -
C:\WINDOWS\tasksche.exeC:\WINDOWS\tasksche.exe /i4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:3088 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3088 -s 2245⤵
- Program crash
PID:1948
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3088 -s 2165⤵
- Program crash
PID:2212
-
-
-
-
-
C:\WINDOWS\mssecsvc.exeC:\WINDOWS\mssecsvc.exe -m security1⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1208
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 3088 -ip 30881⤵PID:3988
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 420 -p 3088 -ip 30881⤵PID:4536
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3.4MB
MD5a26310650582a1acd904aa135494287b
SHA1c8233152f46901a4728b422db7a8e1ca018f9011
SHA25649e51b5389b6f83627e74db08533eb0e6876bbc7391638f581877ababb7438b9
SHA51239f070b34f7b43d685f2b094876613fe2d0ae61b183b665b7db041d6eece4faa699494212f44f6123a916d0318e598c8dea56bad4ea1afda7e56d9e08a2c4154
-
Filesize
3.6MB
MD50c265783db1acf4cac88e341e3abd80f
SHA13a0a0d88de5c988965418c6630858682529f082b
SHA256565b92a82a8a9435af47dc81178d1d1288b37f512e108c11abe5c87e292c3365
SHA512584e54633542125bb2095310179d2a2ee90142b3ed51a251c65eb41359522b1f2759c62edb52c40e1b9afd045e01962b3a99ce993a6705b22b970fdd078bc0fe