Analysis

  • max time kernel
    147s
  • max time network
    155s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    08-05-2024 23:17

General

  • Target

    272c3e75b5b82f20d63cca13f0ab815a_JaffaCakes118.dll

  • Size

    5.0MB

  • MD5

    272c3e75b5b82f20d63cca13f0ab815a

  • SHA1

    c98828bdd1fe78a44562fdb983b79763cd1017e1

  • SHA256

    7800a081014b43a591969d71dd49157ba3babace87a39d143120e82c677927d6

  • SHA512

    6018b2819116d8c13dfa41a92095c19e5826936ed5a43868db2e4ac2e09d0aa67a26615d8a36142632d54401645936cf03c7243d7ee3ff3db0abe501d33fb5ca

  • SSDEEP

    49152:SnAQqMSPbcBVQej/1INRx+TSqTdX1HkQ:+DqPoBhz1aRxcSUDk

Malware Config

Signatures

  • Wannacry

    WannaCry is a ransomware cryptoworm.

  • Contacts a large (3302) amount of remote hosts 1 TTPs

    This may indicate a network scan to discover remotely running services.

  • Executes dropped EXE 3 IoCs
  • Creates a large amount of network flows 1 TTPs

    This may indicate a network scan to discover remotely running services.

  • Drops file in System32 directory 1 IoCs
  • Drops file in Windows directory 2 IoCs
  • Modifies data under HKEY_USERS 24 IoCs
  • Suspicious use of WriteProcessMemory 11 IoCs

Processes

  • C:\Windows\system32\rundll32.exe
    rundll32.exe C:\Users\Admin\AppData\Local\Temp\272c3e75b5b82f20d63cca13f0ab815a_JaffaCakes118.dll,#1
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2248
    • C:\Windows\SysWOW64\rundll32.exe
      rundll32.exe C:\Users\Admin\AppData\Local\Temp\272c3e75b5b82f20d63cca13f0ab815a_JaffaCakes118.dll,#1
      2⤵
      • Drops file in Windows directory
      • Suspicious use of WriteProcessMemory
      PID:2168
      • C:\WINDOWS\mssecsvc.exe
        C:\WINDOWS\mssecsvc.exe
        3⤵
        • Executes dropped EXE
        • Drops file in Windows directory
        PID:1880
        • C:\WINDOWS\tasksche.exe
          C:\WINDOWS\tasksche.exe /i
          4⤵
          • Executes dropped EXE
          PID:2616
  • C:\WINDOWS\mssecsvc.exe
    C:\WINDOWS\mssecsvc.exe -m security
    1⤵
    • Executes dropped EXE
    • Drops file in System32 directory
    • Modifies data under HKEY_USERS
    PID:2512

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Windows\mssecsvc.exe
    Filesize

    3.6MB

    MD5

    7ea7b09c6dea9bbbdaabd503bd6ad8a3

    SHA1

    2d13042c833b6195f83e72bf35777ac296a33511

    SHA256

    7aa94713a0fcd8cb24b324d4e1f16388c0745855097802574417239e4b3b429b

    SHA512

    07b16147c11079e34f06da1b0b79118cc49f68ff9d7f7dbb4272a33213e2e3a107a557b642abb566b1c2b11809383f7f7d90b26da58b94ca3f60a0e881871bbd

  • C:\Windows\tasksche.exe
    Filesize

    3.4MB

    MD5

    2bf26b644c7b4e283f66ac695d89a3d5

    SHA1

    28e6b6ae553529d751e432a84a890588c5b86689

    SHA256

    dc8a91ed1eb77f2dce2f71533b43cd0322e5b64e83152823b147756187f6b1f2

    SHA512

    8ac3056a82eb422ace8323e6b5f005bf65641f60357fc05dd55cbad73d4e18aa35a43fb6215a68ac27c0e0f877e4f88f0133c6c61ac86d50e00fcaf8e89bc9ab