Analysis

  • max time kernel
    151s
  • max time network
    156s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    04-05-2024 15:27

General

  • Target

    13553875c752a890b91beb67609fd8d0_JaffaCakes118.dll

  • Size

    5.0MB

  • MD5

    13553875c752a890b91beb67609fd8d0

  • SHA1

    be9f95c524409691a6e793c40144515460e50101

  • SHA256

    ffa8b67092e720d2dc0b83a88a5c83490b4ee19f962e960647bfc1534bb192ac

  • SHA512

    f28d6c75ad09099c66e46777cf224ac9744125f83d3b946821c3a74417d457d0f7886c1cd72b1ba0420f18ddc19b09d9847df973011fb09fe499ca0c36bd6f90

  • SSDEEP

    98304:+DqPoBhz1aRxcSUDk36SAEdhvxWa9P593RU:+DqPe1Cxcxk3ZAEUadzRU

Malware Config

Signatures

  • Wannacry

    WannaCry is a ransomware cryptoworm.

  • Contacts a large (3210) amount of remote hosts 1 TTPs

    This may indicate a network scan to discover remotely running services.

  • Executes dropped EXE 3 IoCs
  • Creates a large amount of network flows 1 TTPs

    This may indicate a network scan to discover remotely running services.

  • Drops file in System32 directory 1 IoCs
  • Drops file in Windows directory 2 IoCs
  • Modifies data under HKEY_USERS 24 IoCs
  • Suspicious use of WriteProcessMemory 11 IoCs

Processes

  • C:\Windows\system32\rundll32.exe
    rundll32.exe C:\Users\Admin\AppData\Local\Temp\13553875c752a890b91beb67609fd8d0_JaffaCakes118.dll,#1
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2212
    • C:\Windows\SysWOW64\rundll32.exe
      rundll32.exe C:\Users\Admin\AppData\Local\Temp\13553875c752a890b91beb67609fd8d0_JaffaCakes118.dll,#1
      2⤵
      • Drops file in Windows directory
      • Suspicious use of WriteProcessMemory
      PID:2228
      • C:\WINDOWS\mssecsvc.exe
        C:\WINDOWS\mssecsvc.exe
        3⤵
        • Executes dropped EXE
        • Drops file in Windows directory
        PID:2428
        • C:\WINDOWS\tasksche.exe
          C:\WINDOWS\tasksche.exe /i
          4⤵
          • Executes dropped EXE
          PID:2708
  • C:\WINDOWS\mssecsvc.exe
    C:\WINDOWS\mssecsvc.exe -m security
    1⤵
    • Executes dropped EXE
    • Drops file in System32 directory
    • Modifies data under HKEY_USERS
    PID:2500

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Windows\mssecsvc.exe
    Filesize

    3.6MB

    MD5

    2de61ce3c8b9b71e471b31bd67500f0f

    SHA1

    3cb1cbfa618542d542bdefbb86c0b5392753abd8

    SHA256

    d26030304646d024e87868bec6cbe177d2fb2e1e583f564f5e626f04b47ba211

    SHA512

    a58e5652c17c5d20a2f9264f421d6c90f582809439de9e4ac0aafa892299128b3de16397ef06adb67674fdc53f54bad89e5b7011dbc204de32e37edb703018b6

  • C:\Windows\tasksche.exe
    Filesize

    3.4MB

    MD5

    f53f7a524f9e5ddaa7b59218922b99dc

    SHA1

    34b2fb37aebfc505c0ab54cf0bf8805746f7623a

    SHA256

    f57f28c00276f0893286ef863e5cde7f233ba05b059a4a32237e7cfb92f441b2

    SHA512

    26ef0cd3b40270c6539986b9d827243263a3b51a2e3ee1e67515e68da6100380bcd066ddab67e3c3140b6987673811609f43ee96aff9d1eba224627cb80eb7a0