Analysis

  • max time kernel
    150s
  • max time network
    150s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    12-05-2024 04:03

General

  • Target

    382805f9620d3f33a18d371150087a9e_JaffaCakes118.dll

  • Size

    5.0MB

  • MD5

    382805f9620d3f33a18d371150087a9e

  • SHA1

    49496d39044d9028fdb9a203c48646bb5477091a

  • SHA256

    7068344e1b0ae0acc5aacbfa277050294c7cb4172bec49b60a93dda551422eed

  • SHA512

    af0c492dfbfd4f59f15a614deec18ff02d6f59e988ddb34e3ae8666ca9f3371ab7c7a82443b2929172e0e8d910252beace2ac6d1d116e9c92e231f3b6ddb79a5

  • SSDEEP

    98304:+DqPoBhz1aRxcSUDk36SAEdhvxWa9P593RLyAVp2H:+DqPe1Cxcxk3ZAEUadzRLyc4H

Malware Config

Signatures

  • Wannacry

    WannaCry is a ransomware cryptoworm.

  • Contacts a large (3219) amount of remote hosts 1 TTPs

    This may indicate a network scan to discover remotely running services.

  • Executes dropped EXE 3 IoCs
  • Creates a large amount of network flows 1 TTPs

    This may indicate a network scan to discover remotely running services.

  • Drops file in System32 directory 1 IoCs
  • Drops file in Windows directory 2 IoCs
  • Modifies data under HKEY_USERS 24 IoCs
  • Suspicious use of WriteProcessMemory 11 IoCs

Processes

  • C:\Windows\system32\rundll32.exe
    rundll32.exe C:\Users\Admin\AppData\Local\Temp\382805f9620d3f33a18d371150087a9e_JaffaCakes118.dll,#1
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1652
    • C:\Windows\SysWOW64\rundll32.exe
      rundll32.exe C:\Users\Admin\AppData\Local\Temp\382805f9620d3f33a18d371150087a9e_JaffaCakes118.dll,#1
      2⤵
      • Drops file in Windows directory
      • Suspicious use of WriteProcessMemory
      PID:1696
      • C:\WINDOWS\mssecsvc.exe
        C:\WINDOWS\mssecsvc.exe
        3⤵
        • Executes dropped EXE
        • Drops file in Windows directory
        PID:2136
        • C:\WINDOWS\tasksche.exe
          C:\WINDOWS\tasksche.exe /i
          4⤵
          • Executes dropped EXE
          PID:2860
  • C:\WINDOWS\mssecsvc.exe
    C:\WINDOWS\mssecsvc.exe -m security
    1⤵
    • Executes dropped EXE
    • Drops file in System32 directory
    • Modifies data under HKEY_USERS
    PID:1596

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Windows\mssecsvc.exe
    Filesize

    3.6MB

    MD5

    c835db2d7fe1b37c862321a41c6f6afe

    SHA1

    792d71d2e63fdc3b194845c2b669ff3208616f23

    SHA256

    51589762cac08a47aa359f2d427663c8044b30425ed90edffaddeff2bb67e9fc

    SHA512

    194fe1fe82bfcdb1498cb622b21da450e2442ab5fb573c3ea7c81934481cd19bc74838c9e9e161075dc8573f7288bd2b331e3a38d776fbb9edee544a0d8e7639

  • C:\Windows\tasksche.exe
    Filesize

    3.4MB

    MD5

    2156875d718aded2f22d8c756348a823

    SHA1

    3645f5af7ced9865b6c98eecb20121e13e2ecdb6

    SHA256

    7060365d5de29a22723648b17c6c83014fabebd768b8203cec6e5864cbfe66ce

    SHA512

    aaab463755b0e81f9aa6c32c5b25ee062bab020536c90d59e5abd9a178482547346c3967e4b651572f20cfc687828daf27d0d97569385bf86a03f8bd3995bfab