Analysis

  • max time kernel
    150s
  • max time network
    150s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    05-05-2024 10:03

General

  • Target

    172742bfe2982aa15c60569e5b217e75_JaffaCakes118.dll

  • Size

    5.0MB

  • MD5

    172742bfe2982aa15c60569e5b217e75

  • SHA1

    d2a6feb2d79cedb9bf26ed1b72317fd716a3fa43

  • SHA256

    3d0383c4f3c46f9ff9b0db3a526426d8fabbbd7ec2c473e6d4a6d859c3e612f2

  • SHA512

    d4bf8c37e3db498459359e67fb84e72883e06d8a925e6a0fef7a7b44f3cc12b172fda9253f38061b1cb5c9b108929811b0426d0a6297a6cec48cdfdd1ea6d7c5

  • SSDEEP

    98304:d8qPoBhz1aRxcSUDk36SAEdhvxWa9P593R8yAw2:d8qPe1Cxcxk3ZAEUadzR8y

Malware Config

Signatures

  • Wannacry

    WannaCry is a ransomware cryptoworm.

  • Contacts a large (3329) amount of remote hosts 1 TTPs

    This may indicate a network scan to discover remotely running services.

  • Executes dropped EXE 3 IoCs
  • Creates a large amount of network flows 1 TTPs

    This may indicate a network scan to discover remotely running services.

  • Drops file in System32 directory 1 IoCs
  • Drops file in Windows directory 2 IoCs
  • Modifies data under HKEY_USERS 1 IoCs
  • Suspicious use of WriteProcessMemory 11 IoCs

Processes

  • C:\Windows\system32\rundll32.exe
    rundll32.exe C:\Users\Admin\AppData\Local\Temp\172742bfe2982aa15c60569e5b217e75_JaffaCakes118.dll,#1
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2852
    • C:\Windows\SysWOW64\rundll32.exe
      rundll32.exe C:\Users\Admin\AppData\Local\Temp\172742bfe2982aa15c60569e5b217e75_JaffaCakes118.dll,#1
      2⤵
      • Drops file in Windows directory
      • Suspicious use of WriteProcessMemory
      PID:2872
      • C:\WINDOWS\mssecsvc.exe
        C:\WINDOWS\mssecsvc.exe
        3⤵
        • Executes dropped EXE
        • Drops file in Windows directory
        PID:2984
        • C:\WINDOWS\tasksche.exe
          C:\WINDOWS\tasksche.exe /i
          4⤵
          • Executes dropped EXE
          PID:2500
  • C:\WINDOWS\mssecsvc.exe
    C:\WINDOWS\mssecsvc.exe -m security
    1⤵
    • Executes dropped EXE
    • Drops file in System32 directory
    • Modifies data under HKEY_USERS
    PID:2564

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Windows\mssecsvc.exe
    Filesize

    3.6MB

    MD5

    5da581b5248ef51f23e378474f430028

    SHA1

    15b2470540efa1d8e18e6a324b46c6c969703b79

    SHA256

    993e95a63073362991f1532c7cada7a0f35d647dd795dc44a0dd54bcc6c5cb06

    SHA512

    5f58a5451d75829b2ea890ce0ba2fd3869ced4c42fdfa592e0b9a7e627c622a45e200dcee4d2e24e27de3f9c3e0a19ddbf7d8d9d6cd0f7254d3a670c84a44f46

  • C:\Windows\tasksche.exe
    Filesize

    3.4MB

    MD5

    90938407c8be94d5c44223a758a76a76

    SHA1

    35a1d87f9b7806bb48076e9d06ebda7d8f3af3c2

    SHA256

    c14b363c8649574b0d23cea2c64c29cfabfb3bfe60f16728eb18ea622bde8706

    SHA512

    18604214eecabb998d4f40915dca5d38f86abe63a73c40b20fef4d6f6420dae1c056da00330773ad99baafc88a306da88770bb263f4958e3e13e06e6bacc18d4