Analysis

  • max time kernel
    150s
  • max time network
    150s
  • platform
    windows7_x64
  • resource
    win7-20240215-en
  • resource tags

    arch:x64arch:x86image:win7-20240215-enlocale:en-usos:windows7-x64system
  • submitted
    20-05-2024 23:20

General

  • Target

    61465c15986aed38bf65441bf98c3648_JaffaCakes118.dll

  • Size

    5.0MB

  • MD5

    61465c15986aed38bf65441bf98c3648

  • SHA1

    063ad2bc8a7016d83f3754cb4f298d1392c64b88

  • SHA256

    4f2295253243f67e9d4cae7499c51a7eeec879aa4b787f6e3ef47b45602b15d4

  • SHA512

    827ba0bbc83c1fa3bac0092a95758ec8131fee2455bc96a2dd30e41f5a52482caecbea5f064f02c802ce77b2a6d810a27dbce77c5b4c822c7663f74cf0d4ce62

  • SSDEEP

    49152:SnAQqMSPbcBVQej/1INRx+TSqTdX1HkQo6SAAVAMEcaEau3R8yA:+DqPoBhz1aRxcSUDk36SAC593R8yA

Malware Config

Signatures

  • Wannacry

    WannaCry is a ransomware cryptoworm.

  • Contacts a large (3247) amount of remote hosts 1 TTPs

    This may indicate a network scan to discover remotely running services.

  • Executes dropped EXE 3 IoCs
  • Creates a large amount of network flows 1 TTPs

    This may indicate a network scan to discover remotely running services.

  • Drops file in System32 directory 1 IoCs
  • Drops file in Windows directory 2 IoCs
  • Modifies data under HKEY_USERS 24 IoCs
  • Suspicious use of WriteProcessMemory 11 IoCs

Processes

  • C:\Windows\system32\rundll32.exe
    rundll32.exe C:\Users\Admin\AppData\Local\Temp\61465c15986aed38bf65441bf98c3648_JaffaCakes118.dll,#1
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2984
    • C:\Windows\SysWOW64\rundll32.exe
      rundll32.exe C:\Users\Admin\AppData\Local\Temp\61465c15986aed38bf65441bf98c3648_JaffaCakes118.dll,#1
      2⤵
      • Drops file in Windows directory
      • Suspicious use of WriteProcessMemory
      PID:2916
      • C:\WINDOWS\mssecsvc.exe
        C:\WINDOWS\mssecsvc.exe
        3⤵
        • Executes dropped EXE
        • Drops file in Windows directory
        PID:2588
        • C:\WINDOWS\tasksche.exe
          C:\WINDOWS\tasksche.exe /i
          4⤵
          • Executes dropped EXE
          PID:2764
  • C:\WINDOWS\mssecsvc.exe
    C:\WINDOWS\mssecsvc.exe -m security
    1⤵
    • Executes dropped EXE
    • Drops file in System32 directory
    • Modifies data under HKEY_USERS
    PID:2908

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Windows\mssecsvc.exe
    Filesize

    3.6MB

    MD5

    444e929c2a2e2a97edcdef0366166ce7

    SHA1

    dda57fa54b57647b28f75ae1f79909d46f89dc5a

    SHA256

    c8c741994708d0f885abc522d641c6bb32bb7b165456ed6b93878c1ec478aa32

    SHA512

    d3395995c59700005559cb220c1cd140d5d615c90fc540082340331f3a096a7592c6ea3e106371b6fc9815b37cf5f0ee674df4efafac5507340b826fd542fdd3

  • C:\Windows\tasksche.exe
    Filesize

    3.4MB

    MD5

    f18d289a378f3471a464ce5bf46ab1d6

    SHA1

    c038949783e280f19417dc0fbf0d21d85c7190b2

    SHA256

    d6340bc710447a62e57183f27f4f1f13c73803f7a6664509b8559e0358cad038

    SHA512

    18107d6d62107857311f7c3646c1f28bc447c13cbd2f208cb56155af99bfad380a1c43380b42a652f236a9445adde8a6b35441a03fb97eaca173812e03f9f3cd