Analysis

  • max time kernel
    150s
  • max time network
    151s
  • platform
    windows7_x64
  • resource
    win7-20231129-en
  • resource tags

    arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system
  • submitted
    10-05-2024 23:23

General

  • Target

    318ef9cfc9a05e31a05bf1ec3c2b2109_JaffaCakes118.dll

  • Size

    5.0MB

  • MD5

    318ef9cfc9a05e31a05bf1ec3c2b2109

  • SHA1

    c1eb85e5f6692f062242b5959f44d8b26e616833

  • SHA256

    865b10d9b9e7469d6f48b2a488da995a311c6875ee23d946e0c90cab7bbce773

  • SHA512

    e0d6a5083e09854d6255c60d71201d5822e080725c14464328254fd43562257407aa6ae8405f0eb00cc3c332d2b21f966490d7ecbccb72a7aa2876a6a6cc5ad7

  • SSDEEP

    24576:zbLgddQhfdmMSirYbcMNgef0U6SASk+Kdq/:znAQqMSPbcBVU6SAA

Malware Config

Signatures

  • Wannacry

    WannaCry is a ransomware cryptoworm.

  • Contacts a large (3281) amount of remote hosts 1 TTPs

    This may indicate a network scan to discover remotely running services.

  • Executes dropped EXE 3 IoCs
  • Creates a large amount of network flows 1 TTPs

    This may indicate a network scan to discover remotely running services.

  • Drops file in System32 directory 1 IoCs
  • Drops file in Windows directory 2 IoCs
  • Modifies data under HKEY_USERS 24 IoCs
  • Suspicious use of WriteProcessMemory 11 IoCs

Processes

  • C:\Windows\system32\rundll32.exe
    rundll32.exe C:\Users\Admin\AppData\Local\Temp\318ef9cfc9a05e31a05bf1ec3c2b2109_JaffaCakes118.dll,#1
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2888
    • C:\Windows\SysWOW64\rundll32.exe
      rundll32.exe C:\Users\Admin\AppData\Local\Temp\318ef9cfc9a05e31a05bf1ec3c2b2109_JaffaCakes118.dll,#1
      2⤵
      • Drops file in Windows directory
      • Suspicious use of WriteProcessMemory
      PID:2952
      • C:\WINDOWS\mssecsvc.exe
        C:\WINDOWS\mssecsvc.exe
        3⤵
        • Executes dropped EXE
        • Drops file in Windows directory
        PID:2968
        • C:\WINDOWS\tasksche.exe
          C:\WINDOWS\tasksche.exe /i
          4⤵
          • Executes dropped EXE
          PID:2716
  • C:\WINDOWS\mssecsvc.exe
    C:\WINDOWS\mssecsvc.exe -m security
    1⤵
    • Executes dropped EXE
    • Drops file in System32 directory
    • Modifies data under HKEY_USERS
    PID:2148

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Windows\mssecsvc.exe
    Filesize

    3.6MB

    MD5

    389c073a096bc2d1b08729365cf82802

    SHA1

    46235da95b5877eeb65bc230297ab3dd400d238a

    SHA256

    be01cb362759e1d821227542dbb9358e962e62198881b83d86e29eb21d116f54

    SHA512

    2c906dda9dff934474118582301dc586c13abe9666754b0d16333e8925f3bc6e7f22401e94c7e3e9584924b37b14024604285d26517201ced97e063cf8c9ec7b

  • C:\Windows\tasksche.exe
    Filesize

    3.4MB

    MD5

    1a46563038a0cb83090bae987da31a82

    SHA1

    414ff3501b8f7f31e41b2543a7c2d0256fe783d7

    SHA256

    7547a90d72937e374589301b3da01af5d9a962e0548d9615df7f13b1c2b1baca

    SHA512

    6dbb12754321127c640340f2fd586f6a4f36fec88f32973e3f69818752ac8ee727404acaf5a689edd5b8b007358a40c90e00e34472c73b25e84502d07ed8fb77