Analysis

  • max time kernel
    150s
  • max time network
    150s
  • platform
    windows7_x64
  • resource
    win7-20240419-en
  • resource tags

    arch:x64arch:x86image:win7-20240419-enlocale:en-usos:windows7-x64system
  • submitted
    08-05-2024 02:27

General

  • Target

    22cdf9a8c9df5d58027585b4ce367c1e_JaffaCakes118.dll

  • Size

    5.0MB

  • MD5

    22cdf9a8c9df5d58027585b4ce367c1e

  • SHA1

    2e9a90e7772a783f8de93f9c660f9bbb0cec3910

  • SHA256

    cb009c60ff14fec89d0890ecd23462ac403cecd22c9e0c7bbc019e38dad57480

  • SHA512

    a7bfd8888b50c197e20d4753632d07306ce06a3ee7ebaae6b54b04c79e4367964ec72eabc8e30e0cb4640a59f43b37e93ecceee3845a52b4541cb590b0ddc287

  • SSDEEP

    12288:yebLgPlu+QhMbaIMu7L5NVErCA4z2g6rTcbckPU82900Ve7zw+K+D:zbLgddQhfdmMSirYbcMNgef0

Malware Config

Signatures

  • Wannacry

    WannaCry is a ransomware cryptoworm.

  • Contacts a large (3199) amount of remote hosts 1 TTPs

    This may indicate a network scan to discover remotely running services.

  • Executes dropped EXE 3 IoCs
  • Creates a large amount of network flows 1 TTPs

    This may indicate a network scan to discover remotely running services.

  • Drops file in System32 directory 1 IoCs
  • Drops file in Windows directory 2 IoCs
  • Modifies data under HKEY_USERS 24 IoCs
  • Suspicious use of WriteProcessMemory 11 IoCs

Processes

  • C:\Windows\system32\rundll32.exe
    rundll32.exe C:\Users\Admin\AppData\Local\Temp\22cdf9a8c9df5d58027585b4ce367c1e_JaffaCakes118.dll,#1
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2484
    • C:\Windows\SysWOW64\rundll32.exe
      rundll32.exe C:\Users\Admin\AppData\Local\Temp\22cdf9a8c9df5d58027585b4ce367c1e_JaffaCakes118.dll,#1
      2⤵
      • Drops file in Windows directory
      • Suspicious use of WriteProcessMemory
      PID:2984
      • C:\WINDOWS\mssecsvc.exe
        C:\WINDOWS\mssecsvc.exe
        3⤵
        • Executes dropped EXE
        • Drops file in Windows directory
        PID:3036
        • C:\WINDOWS\tasksche.exe
          C:\WINDOWS\tasksche.exe /i
          4⤵
          • Executes dropped EXE
          PID:2636
  • C:\WINDOWS\mssecsvc.exe
    C:\WINDOWS\mssecsvc.exe -m security
    1⤵
    • Executes dropped EXE
    • Drops file in System32 directory
    • Modifies data under HKEY_USERS
    PID:1812

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Windows\mssecsvc.exe
    Filesize

    3.6MB

    MD5

    d014c01e8206f437927b849b4e831e31

    SHA1

    621e3901bd31a648c297cae92b4cfbb5d47d9cca

    SHA256

    fcc3e3b3b14160ce4c69421b6dff28d5459862b7c33445649c4f9524cb758753

    SHA512

    d8043262890141105efb6c52ea777dc6d2bdf2f06ff5b09b2867cd1a90a1b135e22447d4c75ac12523dd1ebeeba5d1e7d54aa57134d2691d102c4f52393abe06

  • C:\Windows\tasksche.exe
    Filesize

    3.4MB

    MD5

    49a51efa8938a364daf37a53e4dd7558

    SHA1

    8de2f6829a854a80529c86960d1d8a072dcdeb4c

    SHA256

    859d933b536d4c72dbfd55ee4c538e7e519030ba4c509579a5176ab5046277f9

    SHA512

    20094e87de965113bf60661b3f2c2b25a4c46da8546dcc4ff9fb1b91197858cf581befdb4677cc7a58b0e7e0c8f27fd4b27c43fbb14687740baf170b1de9be6d