Analysis

  • max time kernel
    150s
  • max time network
    150s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    08-05-2024 20:23

General

  • Target

    269322b335e4e231129fbbc8928843ce_JaffaCakes118.dll

  • Size

    5.0MB

  • MD5

    269322b335e4e231129fbbc8928843ce

  • SHA1

    ef8b5a9e759de887d517b737fec7cc8cc170fbb9

  • SHA256

    0044e04af55e740a58b3684dd927b95a14f7b7bc3abc22ba11dafefa348de058

  • SHA512

    b6501f27966d645db90ee4ae2c2d9844c2c4186a4dcc7238ad955c49a6cc2aef7ae65f6f051ea8d67459f8a03f270e80423baa2c1ef6a5d517f37aaa38c6ab62

  • SSDEEP

    98304:+DqPoBhz1aRxcSUDk36SAEdhvxWa9P59:+DqPe1Cxcxk3ZAEUad

Malware Config

Signatures

  • Wannacry

    WannaCry is a ransomware cryptoworm.

  • Contacts a large (3111) amount of remote hosts 1 TTPs

    This may indicate a network scan to discover remotely running services.

  • Executes dropped EXE 3 IoCs
  • Creates a large amount of network flows 1 TTPs

    This may indicate a network scan to discover remotely running services.

  • Drops file in System32 directory 1 IoCs
  • Drops file in Windows directory 2 IoCs
  • Modifies data under HKEY_USERS 24 IoCs
  • Suspicious use of WriteProcessMemory 11 IoCs

Processes

  • C:\Windows\system32\rundll32.exe
    rundll32.exe C:\Users\Admin\AppData\Local\Temp\269322b335e4e231129fbbc8928843ce_JaffaCakes118.dll,#1
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2060
    • C:\Windows\SysWOW64\rundll32.exe
      rundll32.exe C:\Users\Admin\AppData\Local\Temp\269322b335e4e231129fbbc8928843ce_JaffaCakes118.dll,#1
      2⤵
      • Drops file in Windows directory
      • Suspicious use of WriteProcessMemory
      PID:2760
      • C:\WINDOWS\mssecsvc.exe
        C:\WINDOWS\mssecsvc.exe
        3⤵
        • Executes dropped EXE
        • Drops file in Windows directory
        PID:1260
        • C:\WINDOWS\tasksche.exe
          C:\WINDOWS\tasksche.exe /i
          4⤵
          • Executes dropped EXE
          PID:2556
  • C:\WINDOWS\mssecsvc.exe
    C:\WINDOWS\mssecsvc.exe -m security
    1⤵
    • Executes dropped EXE
    • Drops file in System32 directory
    • Modifies data under HKEY_USERS
    PID:3048

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Windows\mssecsvc.exe
    Filesize

    3.6MB

    MD5

    a4a0d0acde8a7bd947043ed7a15be4ac

    SHA1

    bfa29be48c3d837989fff26225f93d18a62f0bb9

    SHA256

    bda20a1896bb26b43d1e2dc04207e033c1fa8e5bbe05b1e5d779450634afaa1a

    SHA512

    b3f5342fc6564cb65dc9e097d6438834ee0586973717c8e7659a693c22708dc88d98b6186423c823d11a1f24bc972d90e634a7985be49c4d1aa98ebddcad5576

  • C:\Windows\tasksche.exe
    Filesize

    3.4MB

    MD5

    5dbd99dcb1e13fef32132534e4f1770f

    SHA1

    0d7d1c89e2da9602c9279b6e8454292fec0ab61f

    SHA256

    1d80cb4c8ad9b72dbdeaee37b76f385cbef663c69338cb965dfffee6190d2f00

    SHA512

    83e077241955817e403d7d018632c90fc73b2865030ba9b449707e3718d484653e051767805f02809087d9f8f639a87fece54c61f04fe8e6ded9563496b489c4