Analysis

  • max time kernel
    150s
  • max time network
    155s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    17-05-2024 04:30

General

  • Target

    4e6c5f2e8ed845b2a3b03db18c169284_JaffaCakes118.dll

  • Size

    5.0MB

  • MD5

    4e6c5f2e8ed845b2a3b03db18c169284

  • SHA1

    902602d945d54c528acf71134a57490126118b7c

  • SHA256

    9d793dff706f4db5ee042d8e953078093298578849151593641db17e479b739d

  • SHA512

    7479fc1c3e61bee61661733832d5135d05b5a7b34c61b4d4441cc1df1b29b9be177f06334e03e1a6ee581770b46d8c6d7d90109b7026f437a4c60cd8b03ce798

  • SSDEEP

    98304:+DqPoBhz1aRxcSUDk36SAEdhvxWa9P593R8yAVp2:+DqPe1Cxcxk3ZAEUadzR8yc4

Malware Config

Signatures

  • Wannacry

    WannaCry is a ransomware cryptoworm.

  • Contacts a large (3226) amount of remote hosts 1 TTPs

    This may indicate a network scan to discover remotely running services.

  • Executes dropped EXE 3 IoCs
  • Creates a large amount of network flows 1 TTPs

    This may indicate a network scan to discover remotely running services.

  • Drops file in System32 directory 1 IoCs
  • Drops file in Windows directory 2 IoCs
  • Modifies data under HKEY_USERS 24 IoCs
  • Suspicious use of WriteProcessMemory 11 IoCs

Processes

  • C:\Windows\system32\rundll32.exe
    rundll32.exe C:\Users\Admin\AppData\Local\Temp\4e6c5f2e8ed845b2a3b03db18c169284_JaffaCakes118.dll,#1
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2648
    • C:\Windows\SysWOW64\rundll32.exe
      rundll32.exe C:\Users\Admin\AppData\Local\Temp\4e6c5f2e8ed845b2a3b03db18c169284_JaffaCakes118.dll,#1
      2⤵
      • Drops file in Windows directory
      • Suspicious use of WriteProcessMemory
      PID:2832
      • C:\WINDOWS\mssecsvc.exe
        C:\WINDOWS\mssecsvc.exe
        3⤵
        • Executes dropped EXE
        • Drops file in Windows directory
        PID:2864
        • C:\WINDOWS\tasksche.exe
          C:\WINDOWS\tasksche.exe /i
          4⤵
          • Executes dropped EXE
          PID:2704
  • C:\WINDOWS\mssecsvc.exe
    C:\WINDOWS\mssecsvc.exe -m security
    1⤵
    • Executes dropped EXE
    • Drops file in System32 directory
    • Modifies data under HKEY_USERS
    PID:1884

Network

MITRE ATT&CK Matrix ATT&CK v13

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Windows\mssecsvc.exe
    Filesize

    3.6MB

    MD5

    9a99b7154faa6c48660d3dca1ea8ff61

    SHA1

    b0032dcab2b92a549bcba3843888210d32c44bd8

    SHA256

    545b7a1966206b6cc47cbbe3f74008898dec644a79d36c6ff9c7941d83fc9ef3

    SHA512

    23c63bb6d2f5039eab075c140609b11574e6075e8b621a85a9561741948a7401b06b38cac58217e6b976f5eff738c3cf652668f4f5c9f022f2e73c1ebbf3768d

  • C:\Windows\tasksche.exe
    Filesize

    3.4MB

    MD5

    af29815495f198e50e12f45a40e61243

    SHA1

    466b564b77a858092b9a2d840480f64f01e93139

    SHA256

    c1c4a6518885dec0efa3d9e6bd5a51191e504e7081708c7de3f7d4c1f8c4523f

    SHA512

    12bd05d06d9c8d2f407eaac58b34d93d2f76c142b053f25375766af2d5dce78cf76cb55c0a1f6acd6b44ff7f644a1e919bef8ca6ddb74ea5edd42185be4cc648