Analysis

  • max time kernel
    150s
  • max time network
    154s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    09-05-2024 09:05

General

  • Target

    293dad9bb59b93e223dcfc260aa824d9_JaffaCakes118.dll

  • Size

    5.0MB

  • MD5

    293dad9bb59b93e223dcfc260aa824d9

  • SHA1

    f85b522b9108b1a6c9cf7e754d4f74994170c973

  • SHA256

    8a09b786eadcc876bb3251b38f96248fec296615337329459a76c7bd3337ba0f

  • SHA512

    24bec12450524db99b4d971cab42e9445f7994d43381ae77d994ba5635be99928ff136c76335ec01252a881e4fb7d71426d7b64c05008ecbb82f4e61e113292c

  • SSDEEP

    24576:SbLgddQhfdmMSirYbcMNgef0QeQeuZtk6Qo+:SnAQqMSPbcBVQesi

Malware Config

Signatures

  • Wannacry

    WannaCry is a ransomware cryptoworm.

  • Contacts a large (3173) amount of remote hosts 1 TTPs

    This may indicate a network scan to discover remotely running services.

  • Executes dropped EXE 3 IoCs
  • Creates a large amount of network flows 1 TTPs

    This may indicate a network scan to discover remotely running services.

  • Drops file in System32 directory 1 IoCs
  • Drops file in Windows directory 2 IoCs
  • Modifies data under HKEY_USERS 24 IoCs
  • Suspicious use of WriteProcessMemory 11 IoCs

Processes

  • C:\Windows\system32\rundll32.exe
    rundll32.exe C:\Users\Admin\AppData\Local\Temp\293dad9bb59b93e223dcfc260aa824d9_JaffaCakes118.dll,#1
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2180
    • C:\Windows\SysWOW64\rundll32.exe
      rundll32.exe C:\Users\Admin\AppData\Local\Temp\293dad9bb59b93e223dcfc260aa824d9_JaffaCakes118.dll,#1
      2⤵
      • Drops file in Windows directory
      • Suspicious use of WriteProcessMemory
      PID:2928
      • C:\WINDOWS\mssecsvc.exe
        C:\WINDOWS\mssecsvc.exe
        3⤵
        • Executes dropped EXE
        • Drops file in Windows directory
        PID:528
        • C:\WINDOWS\tasksche.exe
          C:\WINDOWS\tasksche.exe /i
          4⤵
          • Executes dropped EXE
          PID:2804
  • C:\WINDOWS\mssecsvc.exe
    C:\WINDOWS\mssecsvc.exe -m security
    1⤵
    • Executes dropped EXE
    • Drops file in System32 directory
    • Modifies data under HKEY_USERS
    PID:1028

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Windows\mssecsvc.exe
    Filesize

    3.6MB

    MD5

    68de9ead67aedc561050fcc0f8e6c138

    SHA1

    f0f8f29cad1a915c43e308091d7b03a6d9b354a6

    SHA256

    fce9d0f745ed503ca1f4366daab401a37bf272ece6d1e936994ac57738e68869

    SHA512

    5a8241c462574be544eda2e8ae1540866a07b9fae8885061091c082025652debeab7b8e03b91f9cf21e252bcb7394c62c09cdfe0024bd3745426184db8f0bb24

  • C:\Windows\tasksche.exe
    Filesize

    3.4MB

    MD5

    498f716dd84ff34aeeab0247df4fe5e4

    SHA1

    dd446a7dd504cbc861d6131bb4ef1f07540051ae

    SHA256

    57bbdac9b814d93aecbb92ebcbc654f1230687d8df473db5d08266b3e5cc0c52

    SHA512

    eb2b9bcdd776a68487e888a1948884ad067125bacaa471dfcec83e2332e9b8eb8d44fa73d7110671bdbee26ac2983a8b74543c82ca1510b7d14f0fcdfce79146