Analysis

  • max time kernel
    150s
  • max time network
    151s
  • platform
    windows7_x64
  • resource
    win7-20240508-en
  • resource tags

    arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system
  • submitted
    19-05-2024 23:23

General

  • Target

    5c050085a1d97d84dd083ffe5c16b997_JaffaCakes118.dll

  • Size

    5.0MB

  • MD5

    5c050085a1d97d84dd083ffe5c16b997

  • SHA1

    46bac5bebecdd5844458e53360d89f5b22ad181f

  • SHA256

    83c4acbb1e62f954e10aafea37f7836a584105232ffc50b6b0ba6f0763ec2a17

  • SHA512

    b94be49e7ad09ff9fd56dfb5540439340d4b0fc8150ca01d87726d1bf0f2f632d560db5d2945bcd36cd59c27d1123280545d419a27150aeafb3cb9abba3fbde8

  • SSDEEP

    12288:yebLgPlu+QhMbaIMu7L5NVErCA4z2g6rTcFIwFg:zbLgddQhfdmMSirYFIwF

Malware Config

Signatures

  • Wannacry

    WannaCry is a ransomware cryptoworm.

  • Contacts a large (3308) amount of remote hosts 1 TTPs

    This may indicate a network scan to discover remotely running services.

  • Executes dropped EXE 3 IoCs
  • Creates a large amount of network flows 1 TTPs

    This may indicate a network scan to discover remotely running services.

  • Drops file in System32 directory 1 IoCs
  • Drops file in Windows directory 2 IoCs
  • Modifies data under HKEY_USERS 24 IoCs
  • Suspicious use of WriteProcessMemory 11 IoCs

Processes

  • C:\Windows\system32\rundll32.exe
    rundll32.exe C:\Users\Admin\AppData\Local\Temp\5c050085a1d97d84dd083ffe5c16b997_JaffaCakes118.dll,#1
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2284
    • C:\Windows\SysWOW64\rundll32.exe
      rundll32.exe C:\Users\Admin\AppData\Local\Temp\5c050085a1d97d84dd083ffe5c16b997_JaffaCakes118.dll,#1
      2⤵
      • Drops file in Windows directory
      • Suspicious use of WriteProcessMemory
      PID:2084
      • C:\WINDOWS\mssecsvc.exe
        C:\WINDOWS\mssecsvc.exe
        3⤵
        • Executes dropped EXE
        • Drops file in Windows directory
        PID:1952
        • C:\WINDOWS\tasksche.exe
          C:\WINDOWS\tasksche.exe /i
          4⤵
          • Executes dropped EXE
          PID:2744
  • C:\WINDOWS\mssecsvc.exe
    C:\WINDOWS\mssecsvc.exe -m security
    1⤵
    • Executes dropped EXE
    • Drops file in System32 directory
    • Modifies data under HKEY_USERS
    PID:2656

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Windows\mssecsvc.exe
    Filesize

    3.6MB

    MD5

    e7c925d0f586c99459f9c5f893adbfd7

    SHA1

    7012330e0a36680ee9519a4aee6bee07e1ca58bd

    SHA256

    92844da713b6f306acb5878e9aff5dce01c06b0da71d09657744831fb4cd8c4c

    SHA512

    e46143f500dee1c4e10ae8bdda2cfeec01985b553debf20234c96fd33ad07907e7321e92e46ffb088f16e336bf67d54612b5a56be047a2ecf0fa3dc602569721

  • C:\Windows\tasksche.exe
    Filesize

    3.4MB

    MD5

    3650c304c460b4f34c814c927085dcc6

    SHA1

    00c6dc1a4bed5c23ffafb3d920594a6715de142d

    SHA256

    7736edf6e9a464c5bd0f216f6421ee2d383199a3945a0a0d2fdb070b7a6de90a

    SHA512

    c4959107bdce40d5750e421e0e7f42383282e77476e570b246433bc8c370eb943bc5a58ab1dc4986cb1ff792ffa1df84df472ae6322628712a4bc9d12fbcb54b