Analysis

  • max time kernel
    150s
  • max time network
    155s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    07-05-2024 16:39

General

  • Target

    2113c535e046ed03f5c5239b2e3212dd_JaffaCakes118.dll

  • Size

    5.0MB

  • MD5

    2113c535e046ed03f5c5239b2e3212dd

  • SHA1

    8e01eb6d2de7a37b5c35e4f2d5d31e989ac73176

  • SHA256

    d1195652fd33c83b3823e14f37c54bebc3a7724ca04f39520ca3dc39a0080f5c

  • SHA512

    fc4f4338a3edaa2ed308735b15d131aec149b0586d9c0fe48d988f34ba2f7fac21c9df5c50a138dbdebc8ff797b24d4ce529beb9b7595dc4b77c312d66d09caf

  • SSDEEP

    98304:T8qPoBhz1aRxcSUDk36SAEdhvxWa9P593R8yAVp2s:T8qPe1Cxcxk3ZAEUadzR8yc4s

Malware Config

Signatures

  • Wannacry

    WannaCry is a ransomware cryptoworm.

  • Contacts a large (3198) amount of remote hosts 1 TTPs

    This may indicate a network scan to discover remotely running services.

  • Executes dropped EXE 3 IoCs
  • Creates a large amount of network flows 1 TTPs

    This may indicate a network scan to discover remotely running services.

  • Drops file in System32 directory 1 IoCs
  • Drops file in Windows directory 2 IoCs
  • Modifies data under HKEY_USERS 1 IoCs
  • Suspicious use of WriteProcessMemory 11 IoCs

Processes

  • C:\Windows\system32\rundll32.exe
    rundll32.exe C:\Users\Admin\AppData\Local\Temp\2113c535e046ed03f5c5239b2e3212dd_JaffaCakes118.dll,#1
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2696
    • C:\Windows\SysWOW64\rundll32.exe
      rundll32.exe C:\Users\Admin\AppData\Local\Temp\2113c535e046ed03f5c5239b2e3212dd_JaffaCakes118.dll,#1
      2⤵
      • Drops file in Windows directory
      • Suspicious use of WriteProcessMemory
      PID:1312
      • C:\WINDOWS\mssecsvc.exe
        C:\WINDOWS\mssecsvc.exe
        3⤵
        • Executes dropped EXE
        • Drops file in Windows directory
        PID:1892
        • C:\WINDOWS\tasksche.exe
          C:\WINDOWS\tasksche.exe /i
          4⤵
          • Executes dropped EXE
          PID:2464
  • C:\WINDOWS\mssecsvc.exe
    C:\WINDOWS\mssecsvc.exe -m security
    1⤵
    • Executes dropped EXE
    • Drops file in System32 directory
    • Modifies data under HKEY_USERS
    PID:2252

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\WINDOWS\mssecsvc.exe
    Filesize

    3.6MB

    MD5

    fa43565cb2d9f067d82f38e4e0f3b261

    SHA1

    6b6353a45a88725f61ad679b8530eb93177ff7b9

    SHA256

    79bb6ae9f7c2f733d475970a12fb268a75a1b700ceb0c791f831732b72a83b88

    SHA512

    32696cc93af620753eaed0c082fb5fa09fb641d34715b01b6ec2e1ef9576941e14be7886fc2f095075ca233b58f8777c68b9d045bbab5cf85c7b2fe72abe1233

  • C:\Windows\tasksche.exe
    Filesize

    3.4MB

    MD5

    b28af569881d85a183a91438bc35abb1

    SHA1

    857e19e8f2f9dd6c3a43f2defcf214fe116affca

    SHA256

    837aa77b122962862d55e37c10f1544db08aaaf095d877e6265d7025334343b5

    SHA512

    59614eba8868c06c159537bf594af154b56bb0f2f0c4ec09a104b5073526507e58836f3f16b454fa95327983359baf7e2f02ede4c597ab412be18dc574d26ec5