Analysis

  • max time kernel
    150s
  • max time network
    150s
  • platform
    windows7_x64
  • resource
    win7-20240215-en
  • resource tags

    arch:x64arch:x86image:win7-20240215-enlocale:en-usos:windows7-x64system
  • submitted
    27-04-2024 06:45

General

  • Target

    02a8195f910cc2dfe3331ccf63db5468_JaffaCakes118.dll

  • Size

    5.0MB

  • MD5

    02a8195f910cc2dfe3331ccf63db5468

  • SHA1

    fb458441192c77a3c0b00d3240ba8c3ae04f2bd3

  • SHA256

    137f11d29d5e48d945858906be536f238b153b63d2b523604606a328de4aad7d

  • SHA512

    8fc1d6830cfefc2e33d7856def82f97a050f2289fb7079f8aa086089963739a3390d5b55bcf0e2c59c056078aa09dc901244e1fc35493e88f6bafce28180cfe4

  • SSDEEP

    24576:SbLgddQhfdmMSirYbcMNgef0QeQjG/D8kIqRYoAdN:SnAQqMSPbcBVQej/1IN

Malware Config

Signatures

  • Wannacry

    WannaCry is a ransomware cryptoworm.

  • Contacts a large (3294) amount of remote hosts 1 TTPs

    This may indicate a network scan to discover remotely running services.

  • Executes dropped EXE 3 IoCs
  • Creates a large amount of network flows 1 TTPs

    This may indicate a network scan to discover remotely running services.

  • Drops file in System32 directory 1 IoCs
  • Drops file in Windows directory 2 IoCs
  • Modifies data under HKEY_USERS 24 IoCs
  • Suspicious use of WriteProcessMemory 11 IoCs

Processes

  • C:\Windows\system32\rundll32.exe
    rundll32.exe C:\Users\Admin\AppData\Local\Temp\02a8195f910cc2dfe3331ccf63db5468_JaffaCakes118.dll,#1
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2084
    • C:\Windows\SysWOW64\rundll32.exe
      rundll32.exe C:\Users\Admin\AppData\Local\Temp\02a8195f910cc2dfe3331ccf63db5468_JaffaCakes118.dll,#1
      2⤵
      • Drops file in Windows directory
      • Suspicious use of WriteProcessMemory
      PID:2216
      • C:\WINDOWS\mssecsvc.exe
        C:\WINDOWS\mssecsvc.exe
        3⤵
        • Executes dropped EXE
        • Drops file in Windows directory
        PID:2160
        • C:\WINDOWS\tasksche.exe
          C:\WINDOWS\tasksche.exe /i
          4⤵
          • Executes dropped EXE
          PID:2744
  • C:\WINDOWS\mssecsvc.exe
    C:\WINDOWS\mssecsvc.exe -m security
    1⤵
    • Executes dropped EXE
    • Drops file in System32 directory
    • Modifies data under HKEY_USERS
    PID:2580

Network

MITRE ATT&CK Matrix ATT&CK v13

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Windows\mssecsvc.exe
    Filesize

    3.6MB

    MD5

    7214186c98a598187160e02a7e0f6f8a

    SHA1

    892e6a36feefd43f9bb25616090960aecf841208

    SHA256

    28956bf87e2c8fc1428c11e80734c3e7f1f1ca26acd8f6f4ad7a7bddca614395

    SHA512

    84b701ed11c5a5adda81068cb08a65af7b5b4d0449c7df1c37590ef89308bcf8518f5d7f7ccbf243c50f207e731eb5ebd55b5f9169027e0dfda21539c56bde20

  • C:\Windows\tasksche.exe
    Filesize

    3.4MB

    MD5

    60d0cfb6e2b2168e44f27da0015c137e

    SHA1

    11a8bc5167616598bdb0d00bdc70af133ce82e23

    SHA256

    f3e4a74deed043624aff3142d14fec27f034fc5e0b780316d01f7f21bf88a204

    SHA512

    c26496dea4a56cc10b6fa984756b8f22e41fe802098fad85f402b2ca09688845e4da104161f7ff2efb6b62006d26f659ae367aed5da523e324358b73801e491e