Analysis

  • max time kernel
    150s
  • max time network
    150s
  • platform
    windows7_x64
  • resource
    win7-20231129-en
  • resource tags

    arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system
  • submitted
    04-05-2024 05:00

General

  • Target

    118eedee15f92a246867fed1e15bfda1_JaffaCakes118.dll

  • Size

    5.0MB

  • MD5

    118eedee15f92a246867fed1e15bfda1

  • SHA1

    5ff90cf70d36d8be902e23bba87e9df6ccb3dad7

  • SHA256

    27b656167ee5504bcd296075509bcbdb09b1aba52aec630ec84d23b0a2dbd90e

  • SHA512

    7259fcad1c439c2b901203d1f35ed2569dfa6f0018b33c6710343cf731c0a7c09a6aa7a20b37fd57b393c536a3d399da37bc068a1a646f17350c68d959040c8b

  • SSDEEP

    98304:TDqPoVl71kRYhEpykcTX+CXlvwr/cA3oYDRaMYwPQYYWr3oSEsWfhP:TDqP7

Malware Config

Signatures

  • Wannacry

    WannaCry is a ransomware cryptoworm.

  • Contacts a large (3060) amount of remote hosts 1 TTPs

    This may indicate a network scan to discover remotely running services.

  • Executes dropped EXE 3 IoCs
  • Creates a large amount of network flows 1 TTPs

    This may indicate a network scan to discover remotely running services.

  • Drops file in System32 directory 1 IoCs
  • Drops file in Windows directory 2 IoCs
  • Modifies data under HKEY_USERS 24 IoCs
  • Suspicious use of WriteProcessMemory 11 IoCs

Processes

  • C:\Windows\system32\rundll32.exe
    rundll32.exe C:\Users\Admin\AppData\Local\Temp\118eedee15f92a246867fed1e15bfda1_JaffaCakes118.dll,#1
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2888
    • C:\Windows\SysWOW64\rundll32.exe
      rundll32.exe C:\Users\Admin\AppData\Local\Temp\118eedee15f92a246867fed1e15bfda1_JaffaCakes118.dll,#1
      2⤵
      • Drops file in Windows directory
      • Suspicious use of WriteProcessMemory
      PID:2952
      • C:\WINDOWS\mssecsvc.exe
        C:\WINDOWS\mssecsvc.exe
        3⤵
        • Executes dropped EXE
        • Drops file in Windows directory
        PID:2968
        • C:\WINDOWS\tasksche.exe
          C:\WINDOWS\tasksche.exe /i
          4⤵
          • Executes dropped EXE
          PID:2580
  • C:\WINDOWS\mssecsvc.exe
    C:\WINDOWS\mssecsvc.exe -m security
    1⤵
    • Executes dropped EXE
    • Drops file in System32 directory
    • Modifies data under HKEY_USERS
    PID:2152

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Windows\mssecsvc.exe
    Filesize

    3.6MB

    MD5

    661fdd674e5b970bd6c16b79157dca7b

    SHA1

    4845c77b316f47a4a4451f49af0557bfcb9414c7

    SHA256

    f7bc720a877190d678b5aed7c5f17c6a08ee44d3c7b81f8bf951dc309ed242d0

    SHA512

    f6e2f9ca3bebf7913d20431fec77f557c1a23950b9001496fa99fd6d1a207cabbca2f0ab78d05c6c8ff5d2b35c49287edc01c797b4e557b0e45cecea32ea2083

  • C:\Windows\tasksche.exe
    Filesize

    3.4MB

    MD5

    f7a6deedaa31614b07e5407e02404a77

    SHA1

    39396676c7c3b17737d3d54104e391c9b3980469

    SHA256

    bc063fe618ebd42fd8750193a963f9296301f34d979dc0fd89624caf7bb5c3d0

    SHA512

    93edd5f22678c76271f24d62aa3d7623294279f74d905a18c470c28ad6fe6262080f852daf8f6d328d9e2008688a346b738022429aae06cacbb9c5de46ab157a