Analysis

  • max time kernel
    150s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240419-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240419-enlocale:en-usos:windows10-2004-x64system
  • submitted
    05-05-2024 07:38

General

  • Target

    16a59054401b9207346e5ddaf2251025_JaffaCakes118.dll

  • Size

    5.0MB

  • MD5

    16a59054401b9207346e5ddaf2251025

  • SHA1

    a51966f841d905378fed62b9fcf24740d17d78e0

  • SHA256

    1e334556232ab5d7ef5f416d8655ee93805243a1131ba98304bccb1aa75de48c

  • SHA512

    c38b80516b76b3dd02ad902ad92271c2de5a73164d61c5390e1f3be5b625cf7c8b4cce4a7b39f4ebb16dfd61e6185e17ff1d6a7ce48eba859b6e883f993f757e

  • SSDEEP

    24576:zbLgddQhfdmMSirYbcMNge6hWRgImGt/8CatZ5PsDADorxoIl+2:znAQqMSPbcBZQyvGSIkI

Malware Config

Signatures

  • Wannacry

    WannaCry is a ransomware cryptoworm.

  • Contacts a large (3372) amount of remote hosts 1 TTPs

    This may indicate a network scan to discover remotely running services.

  • Executes dropped EXE 3 IoCs
  • Creates a large amount of network flows 1 TTPs

    This may indicate a network scan to discover remotely running services.

  • Drops file in Windows directory 2 IoCs
  • Modifies data under HKEY_USERS 5 IoCs
  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Windows\system32\rundll32.exe
    rundll32.exe C:\Users\Admin\AppData\Local\Temp\16a59054401b9207346e5ddaf2251025_JaffaCakes118.dll,#1
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1440
    • C:\Windows\SysWOW64\rundll32.exe
      rundll32.exe C:\Users\Admin\AppData\Local\Temp\16a59054401b9207346e5ddaf2251025_JaffaCakes118.dll,#1
      2⤵
      • Drops file in Windows directory
      • Suspicious use of WriteProcessMemory
      PID:1604
      • C:\WINDOWS\mssecsvc.exe
        C:\WINDOWS\mssecsvc.exe
        3⤵
        • Executes dropped EXE
        • Drops file in Windows directory
        PID:4424
        • C:\WINDOWS\tasksche.exe
          C:\WINDOWS\tasksche.exe /i
          4⤵
          • Executes dropped EXE
          PID:1284
  • C:\WINDOWS\mssecsvc.exe
    C:\WINDOWS\mssecsvc.exe -m security
    1⤵
    • Executes dropped EXE
    • Modifies data under HKEY_USERS
    PID:3732

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Windows\mssecsvc.exe
    Filesize

    3.6MB

    MD5

    41bce42dd9ad95794965ca2e7588116e

    SHA1

    319a77834e7ee73a787ce6ec24a12faf8a584a4a

    SHA256

    747cf92ea523b0fbaa5c50cbf37900c75a7924377589aaffe742d614b70a7b19

    SHA512

    f4f2001300025325062be4f10547ad05d6f219a8ac4cdd1feea2ab40d644fbad5f07b39e8d9cde5ff430e3b17cf66f235cac6d0735304797062fb6849c947158

  • C:\Windows\tasksche.exe
    Filesize

    3.4MB

    MD5

    f2ed6cd57c5f67d47a0f40ec817b2619

    SHA1

    9d6741b61946e4defb05ab6b3affa6113144f40b

    SHA256

    c2dbb1a25455be8de0f7a99d8212b325697ff643f8f0409c1db660dece0d2a80

    SHA512

    0ac0f0b9d27e61e97e7d5a7dd70a8c26d49e767f40fb751e35717dce9436df56f8df001d0b19263a24cbfea71b872bd6352fd792a4bf85d8db714f404b569219