Analysis

  • max time kernel
    150s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240508-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system
  • submitted
    20-05-2024 04:01

General

  • Target

    5d14531026b8490cbc359238ba824dfa_JaffaCakes118.dll

  • Size

    5.0MB

  • MD5

    5d14531026b8490cbc359238ba824dfa

  • SHA1

    24fdf3e92f949f26cdcc4072874c6270e49ee1e8

  • SHA256

    7a3ed2b72925bb270b6fc6e7e35953dc12e51ec52942460b5b5a1230dd017934

  • SHA512

    017b5a8d8b6c369886589bff17705c283b6c37bbd08a7d818ef4ccff7380e8f953b3b9ce1a6251f295501258b64173c6d113ce180a8d833d4b7d988dd48cc5fe

  • SSDEEP

    49152:SnAQqMSPbcBVQej/1INRx+TSqTdX1HkQ43R8yAH1plAH:+DqPoBhz1aRxcSUDkz3R8yAVp2H

Malware Config

Signatures

  • Wannacry

    WannaCry is a ransomware cryptoworm.

  • Contacts a large (3085) amount of remote hosts 1 TTPs

    This may indicate a network scan to discover remotely running services.

  • Executes dropped EXE 3 IoCs
  • Creates a large amount of network flows 1 TTPs

    This may indicate a network scan to discover remotely running services.

  • Drops file in Windows directory 2 IoCs
  • Modifies data under HKEY_USERS 5 IoCs
  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Windows\system32\rundll32.exe
    rundll32.exe C:\Users\Admin\AppData\Local\Temp\5d14531026b8490cbc359238ba824dfa_JaffaCakes118.dll,#1
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:4644
    • C:\Windows\SysWOW64\rundll32.exe
      rundll32.exe C:\Users\Admin\AppData\Local\Temp\5d14531026b8490cbc359238ba824dfa_JaffaCakes118.dll,#1
      2⤵
      • Drops file in Windows directory
      • Suspicious use of WriteProcessMemory
      PID:4076
      • C:\WINDOWS\mssecsvc.exe
        C:\WINDOWS\mssecsvc.exe
        3⤵
        • Executes dropped EXE
        • Drops file in Windows directory
        PID:2328
        • C:\WINDOWS\tasksche.exe
          C:\WINDOWS\tasksche.exe /i
          4⤵
          • Executes dropped EXE
          PID:4416
  • C:\WINDOWS\mssecsvc.exe
    C:\WINDOWS\mssecsvc.exe -m security
    1⤵
    • Executes dropped EXE
    • Modifies data under HKEY_USERS
    PID:1012

Network

MITRE ATT&CK Matrix ATT&CK v13

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Windows\mssecsvc.exe
    Filesize

    3.6MB

    MD5

    f15f9a2b69b17fad2d08438c1962dc3f

    SHA1

    530d70ec9ee74f4d5020c48bed7c5af271a7cea2

    SHA256

    7b2a82db208fb9721779b5d73b0910400367a97877ea03dc59fe04c6eb76ecde

    SHA512

    1c2f4d1511bf80d660fb5902e2f5f42fd82b5ccf1214f1ba83b7ec1aec15e1afcfc3ab9e3935f82c3c146cf24cdefa63c308a4f59cbd24bf58b5d42679be38c8

  • C:\Windows\tasksche.exe
    Filesize

    3.4MB

    MD5

    23b2a05fb0e2bc41386fe290248ab538

    SHA1

    0c73894417c4fed3ba1288f24b52fca954d256bf

    SHA256

    b9d207f4c8502a8dfd1cc4b3114639d24eecb955baba2bf4340af2a506b86310

    SHA512

    c2be1057ccf59567e1b4fc6d4b207ea396f93c8e9d8d5ced29a1097f18892c6551972f34f984eabad1506c51f9eac08203b7717b1fd77d613e6122e04b0a51e4