Analysis

  • max time kernel
    144s
  • max time network
    152s
  • platform
    windows7_x64
  • resource
    win7-20231129-en
  • resource tags

    arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system
  • submitted
    09-05-2024 01:36

General

  • Target

    27ace7fc9afc3b8dbaa5dae64f372ba8_JaffaCakes118.dll

  • Size

    5.0MB

  • MD5

    27ace7fc9afc3b8dbaa5dae64f372ba8

  • SHA1

    9ec99cd92eb2fe5513d9b8eb4f76fb22586f68dd

  • SHA256

    cba172a00f392dcc0774dba22d714884e2cd898e83066f46e8c89f4bf96a4a00

  • SHA512

    0bc8081c15fd2f034aa94addc0392a442b997e6eae41cad5c874f87be71027f0049df53dc286329b7a5b533896a5a1ab614abbf2d83f69503c4335a66fe9c1d9

  • SSDEEP

    98304:+DqPoBhz1aRxcSUDk36SAEdhvxWa9P5xdWNp2H:+DqPe1Cxcxk3ZAEUadPdQ4H

Malware Config

Signatures

  • Wannacry

    WannaCry is a ransomware cryptoworm.

  • Contacts a large (3116) amount of remote hosts 1 TTPs

    This may indicate a network scan to discover remotely running services.

  • Executes dropped EXE 3 IoCs
  • Creates a large amount of network flows 1 TTPs

    This may indicate a network scan to discover remotely running services.

  • Drops file in System32 directory 1 IoCs
  • Drops file in Windows directory 2 IoCs
  • Modifies data under HKEY_USERS 24 IoCs
  • Suspicious use of WriteProcessMemory 11 IoCs

Processes

  • C:\Windows\system32\rundll32.exe
    rundll32.exe C:\Users\Admin\AppData\Local\Temp\27ace7fc9afc3b8dbaa5dae64f372ba8_JaffaCakes118.dll,#1
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2240
    • C:\Windows\SysWOW64\rundll32.exe
      rundll32.exe C:\Users\Admin\AppData\Local\Temp\27ace7fc9afc3b8dbaa5dae64f372ba8_JaffaCakes118.dll,#1
      2⤵
      • Drops file in Windows directory
      • Suspicious use of WriteProcessMemory
      PID:2044
      • C:\WINDOWS\mssecsvc.exe
        C:\WINDOWS\mssecsvc.exe
        3⤵
        • Executes dropped EXE
        • Drops file in Windows directory
        PID:2036
        • C:\WINDOWS\tasksche.exe
          C:\WINDOWS\tasksche.exe /i
          4⤵
          • Executes dropped EXE
          PID:2596
  • C:\WINDOWS\mssecsvc.exe
    C:\WINDOWS\mssecsvc.exe -m security
    1⤵
    • Executes dropped EXE
    • Drops file in System32 directory
    • Modifies data under HKEY_USERS
    PID:2612

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Windows\mssecsvc.exe
    Filesize

    3.6MB

    MD5

    0d93f1767928a396702d48d07f0f5dfc

    SHA1

    75447c3b6898034879892527dd6ec78c69a2360b

    SHA256

    cb8b368c8bd75ef51b5a72c74042de8f23d15658256e503042d214630f5bc02e

    SHA512

    872a33b16ea79788a4cfaddde16024160d653e71284097e473b76042fbee721bd6ac1077b19d72d682696d3f62102a42e573c0b21639b4b61a0b8d457590918d

  • C:\Windows\tasksche.exe
    Filesize

    3.4MB

    MD5

    c06c9fa6f83b8aee9f29e9e7e44f66f3

    SHA1

    d1a506d93ad085609cd330db72028ccaac7fd045

    SHA256

    e5df4290422fe76ce7d01e5d54fd7a19f47fa0d2c415018187ebc33f7503ac81

    SHA512

    cdc0c3f6aec5ce088d3cde333bc4cc4b3cf088a7ff12566f490d05409ef72ea532405fb2ace5cc370143335436e1b37584f265c8dc69c3af68ef070f8a523b1f