Analysis

  • max time kernel
    150s
  • max time network
    150s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    04-05-2024 23:26

General

  • Target

    14f4159fa3b21c3b19dc164d299f028f_JaffaCakes118.dll

  • Size

    5.0MB

  • MD5

    14f4159fa3b21c3b19dc164d299f028f

  • SHA1

    a45ac9e4480155a904b1fe3694f1ba7f5b299e36

  • SHA256

    a4eeb9a04193c9ffc59a58d6f83e988c0f88066ae7cd9d21e2eea1b46032d0f0

  • SHA512

    6e6eebfa0ca7f496d17eed921bd4f17adc14265f0e756cd364c30bd696236b9b0e9e31b5a647cc69d8ff7b41f82a4c707b532fb354fa35d7dd6f0d3fcc94ba0a

  • SSDEEP

    98304:+DqPoBhz1aRxcSUDk36SAEd1SPl3R8yAVp2H:+DqPe1Cxcxk3ZAESR8yc4H

Malware Config

Signatures

  • Wannacry

    WannaCry is a ransomware cryptoworm.

  • Contacts a large (3284) amount of remote hosts 1 TTPs

    This may indicate a network scan to discover remotely running services.

  • Executes dropped EXE 3 IoCs
  • Creates a large amount of network flows 1 TTPs

    This may indicate a network scan to discover remotely running services.

  • Drops file in System32 directory 1 IoCs
  • Drops file in Windows directory 2 IoCs
  • Modifies data under HKEY_USERS 24 IoCs
  • Suspicious use of WriteProcessMemory 11 IoCs

Processes

  • C:\Windows\system32\rundll32.exe
    rundll32.exe C:\Users\Admin\AppData\Local\Temp\14f4159fa3b21c3b19dc164d299f028f_JaffaCakes118.dll,#1
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2992
    • C:\Windows\SysWOW64\rundll32.exe
      rundll32.exe C:\Users\Admin\AppData\Local\Temp\14f4159fa3b21c3b19dc164d299f028f_JaffaCakes118.dll,#1
      2⤵
      • Drops file in Windows directory
      • Suspicious use of WriteProcessMemory
      PID:868
      • C:\WINDOWS\mssecsvc.exe
        C:\WINDOWS\mssecsvc.exe
        3⤵
        • Executes dropped EXE
        • Drops file in Windows directory
        PID:1692
        • C:\WINDOWS\tasksche.exe
          C:\WINDOWS\tasksche.exe /i
          4⤵
          • Executes dropped EXE
          PID:2508
  • C:\WINDOWS\mssecsvc.exe
    C:\WINDOWS\mssecsvc.exe -m security
    1⤵
    • Executes dropped EXE
    • Drops file in System32 directory
    • Modifies data under HKEY_USERS
    PID:2484

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Windows\mssecsvc.exe
    Filesize

    3.6MB

    MD5

    e4c2e26d1495f98d5633720b75c9835f

    SHA1

    f7a496d36fe1795dfef51521887c6a5866ef74fe

    SHA256

    c01cb34dcdfe3cc283fc91b9ddfc3766d7c3bae3aabcff7fffb6dd6f11a708e6

    SHA512

    dc0bfeb182cc3e270e04ec947205d26b0fa5be3aa436dd1d04d00e3071a0af1bfa94a83b69fca73e03f05bac52e535c3631640dd5a284f2479f8404b3e9521b9

  • C:\Windows\tasksche.exe
    Filesize

    3.4MB

    MD5

    3f52585f62ee1604788397dc13f023aa

    SHA1

    236413a32328b26e2b0ac4ece456470adb09bec5

    SHA256

    c1b9cd4d80b5f36c6e5c5d5caae64fef11d1019dcaab561f59244fc07f79f612

    SHA512

    63341ccb7a856be1611dd65cefe748a74f1cac7692da581946ef2de9f01798f721dc6f9438bc49038ff47073206ea68f5b765ce14039d37ec337dd9b4c59ba43