Analysis
-
max time kernel
150s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
11-05-2024 03:51
Static task
static1
Behavioral task
behavioral1
Sample
329337cbd4fbb25d3b9eb8098a05fbea_JaffaCakes118.dll
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
329337cbd4fbb25d3b9eb8098a05fbea_JaffaCakes118.dll
Resource
win10v2004-20240508-en
General
-
Target
329337cbd4fbb25d3b9eb8098a05fbea_JaffaCakes118.dll
-
Size
5.0MB
-
MD5
329337cbd4fbb25d3b9eb8098a05fbea
-
SHA1
8eb1968de87d07137bb18d874ef8122c76955ec3
-
SHA256
cf0baf64cab66f58b487621492d757ba5353f870c7c6c3d82e39f51886f2eb4e
-
SHA512
9b598870b45d89c4b04efffdecfc78d1e64314ec1f17be27530a2e96404ced651f35ac02425eb824918572a6382a93a806f3b136a44b7d84d95f9fa7d114a87e
-
SSDEEP
49152:JnjQqMSPbcBVQej/1INRx+TSqTdX1HkQo6SAAIaEau3R8yAH1plAH:d8qPoBhz1aRxcSUDk36SAf3R8yAVp2H
Malware Config
Signatures
-
Wannacry
WannaCry is a ransomware cryptoworm.
-
Contacts a large (3236) amount of remote hosts 1 TTPs
This may indicate a network scan to discover remotely running services.
-
Executes dropped EXE 3 IoCs
pid Process 744 mssecsvc.exe 656 mssecsvc.exe 4788 tasksche.exe -
Creates a large amount of network flows 1 TTPs
This may indicate a network scan to discover remotely running services.
-
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\WINDOWS\mssecsvc.exe rundll32.exe File created C:\WINDOWS\tasksche.exe mssecsvc.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 1668 wrote to memory of 116 1668 rundll32.exe 82 PID 1668 wrote to memory of 116 1668 rundll32.exe 82 PID 1668 wrote to memory of 116 1668 rundll32.exe 82 PID 116 wrote to memory of 744 116 rundll32.exe 83 PID 116 wrote to memory of 744 116 rundll32.exe 83 PID 116 wrote to memory of 744 116 rundll32.exe 83
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\329337cbd4fbb25d3b9eb8098a05fbea_JaffaCakes118.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1668 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\329337cbd4fbb25d3b9eb8098a05fbea_JaffaCakes118.dll,#12⤵
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:116 -
C:\WINDOWS\mssecsvc.exeC:\WINDOWS\mssecsvc.exe3⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:744 -
C:\WINDOWS\tasksche.exeC:\WINDOWS\tasksche.exe /i4⤵
- Executes dropped EXE
PID:4788
-
-
-
-
C:\WINDOWS\mssecsvc.exeC:\WINDOWS\mssecsvc.exe -m security1⤵
- Executes dropped EXE
PID:656
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3.6MB
MD50c95bfc10ee2fb1e0081c3b87e6e120f
SHA11d93e7f6ee2f68762f2f1b67c3fb8483f9d4c4b3
SHA25664048dd2f90cd8f9299fca56246451af245aa6846ebcb536b15756f2663372dd
SHA5124f591616b3b461b549266ac05ef3de82acd25b7987c7c3e8752104f7ba561cbf59fed78dd6b57a051cff599d11c58424a65ffff508fc00a7f2bcb90137a38281
-
Filesize
3.4MB
MD558171b7e60978072dc76c7e0ae3b0f4a
SHA17f6552654cd4229d91b3b55e5b597eca353dcb55
SHA256d8716011a97876db8ce4c3f79d7d894c358f02c5bfee52dc40e54ff1f22192ae
SHA512cabad429558cdc584a0f691370fc4cd0a7c9eee5f73e679394726e2d16834228638a62a07463dd059fde277707c5bc513a2b86673591395ccf7948aa79549554