Analysis

  • max time kernel
    150s
  • max time network
    150s
  • platform
    windows7_x64
  • resource
    win7-20231129-en
  • resource tags

    arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system
  • submitted
    02/05/2024, 03:44

General

  • Target

    0d65e35e3f4c02a1f114caa06febcfb9_JaffaCakes118.dll

  • Size

    5.0MB

  • MD5

    0d65e35e3f4c02a1f114caa06febcfb9

  • SHA1

    18117e82f22d3c97fc375c550182d2ac9ded8301

  • SHA256

    695e60fde52ae7bf5eb14e06a27675da78649a1e6fc79c9bf1e57fe006973d65

  • SHA512

    34f6f6cc672ee4f4a9fc2072cf6376834152778a60fc0409da0f468f77dedc1b1371156246f1afbba184845f43e486e88db9135faffcc50efd5115cee52ae80b

  • SSDEEP

    49152:SnAQqMSPbcBVQej4INRx+TSqTdbxJM0He:+DqPoBh0aRxcSU9xWae

Malware Config

Signatures

  • Wannacry

    WannaCry is a ransomware cryptoworm.

  • Contacts a large (3193) amount of remote hosts 1 TTPs

    This may indicate a network scan to discover remotely running services.

  • Executes dropped EXE 3 IoCs
  • Creates a large amount of network flows 1 TTPs

    This may indicate a network scan to discover remotely running services.

  • Drops file in System32 directory 1 IoCs
  • Drops file in Windows directory 2 IoCs
  • Modifies data under HKEY_USERS 24 IoCs
  • Suspicious use of WriteProcessMemory 11 IoCs

Processes

  • C:\Windows\system32\rundll32.exe
    rundll32.exe C:\Users\Admin\AppData\Local\Temp\0d65e35e3f4c02a1f114caa06febcfb9_JaffaCakes118.dll,#1
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2372
    • C:\Windows\SysWOW64\rundll32.exe
      rundll32.exe C:\Users\Admin\AppData\Local\Temp\0d65e35e3f4c02a1f114caa06febcfb9_JaffaCakes118.dll,#1
      2⤵
      • Drops file in Windows directory
      • Suspicious use of WriteProcessMemory
      PID:2544
      • C:\WINDOWS\mssecsvc.exe
        C:\WINDOWS\mssecsvc.exe
        3⤵
        • Executes dropped EXE
        • Drops file in Windows directory
        PID:2684
        • C:\WINDOWS\tasksche.exe
          C:\WINDOWS\tasksche.exe /i
          4⤵
          • Executes dropped EXE
          PID:2700
  • C:\WINDOWS\mssecsvc.exe
    C:\WINDOWS\mssecsvc.exe -m security
    1⤵
    • Executes dropped EXE
    • Drops file in System32 directory
    • Modifies data under HKEY_USERS
    PID:2180

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Windows\mssecsvc.exe

          Filesize

          3.6MB

          MD5

          5f11269f8fce0998fc504ba2de6acc57

          SHA1

          07c2f0c5d090c0209ba2b6743952bb28ad1cd62e

          SHA256

          5773a2a189ed9ab49cca56f89e041d7aefad67cb0697cae0622402ee7cc67f76

          SHA512

          e8641503f3c31e75d9ff128baf978743af4a4809e45f0d2e8b39014769ac8ba3b5dda3af5ad7df3fa50afe88c9d16b12cee3487df66e4f9a00fd22f67dc97a2e

        • C:\Windows\tasksche.exe

          Filesize

          3.4MB

          MD5

          c2d664c6898550c21f42a1c2ee6d514c

          SHA1

          e76b59ac51d263cb346aa0eba42022f1e2746a41

          SHA256

          518c5d68c5546c91f4dc37f1589b9c25a39e1e1284af18bc881f8375ca23daad

          SHA512

          4f44755eedeffbff034386f0ddc717169429d0d64b9c9ab912ca0271d42bb889ef2cbe8f3504bda1895be31506d04a65ac67f7dbacd6e045fb84a8c58051b1ba