Analysis

  • max time kernel
    150s
  • max time network
    155s
  • platform
    windows7_x64
  • resource
    win7-20240508-en
  • resource tags

    arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system
  • submitted
    21-05-2024 01:19

General

  • Target

    6195fe77464fd40efbe06b948db5d5d1_JaffaCakes118.dll

  • Size

    5.0MB

  • MD5

    6195fe77464fd40efbe06b948db5d5d1

  • SHA1

    926db72ac0901a9eca93fc3f49378677089fe74b

  • SHA256

    b06433c11864a55a564e06d1e2e1e98ff2bbd7053a5a2ec473d6c98bc2fe891f

  • SHA512

    31368c495415cdd27ce6fb34c4421fe7a68438235f6de3575d1e39b61395174542b4bec8d509b1dcff85edce30b3c2d036b2ef28cb7dc84d0ee05880794343fc

  • SSDEEP

    49152:znAQqMSPbcBVQej/1INRYX0R8yAH1plAH:TDqPoBhz1aRYX0R8yAVp2H

Malware Config

Signatures

  • Wannacry

    WannaCry is a ransomware cryptoworm.

  • Contacts a large (2977) amount of remote hosts 1 TTPs

    This may indicate a network scan to discover remotely running services.

  • Executes dropped EXE 3 IoCs
  • Creates a large amount of network flows 1 TTPs

    This may indicate a network scan to discover remotely running services.

  • Drops file in System32 directory 1 IoCs
  • Drops file in Windows directory 2 IoCs
  • Modifies data under HKEY_USERS 24 IoCs
  • Suspicious use of WriteProcessMemory 11 IoCs

Processes

  • C:\Windows\system32\rundll32.exe
    rundll32.exe C:\Users\Admin\AppData\Local\Temp\6195fe77464fd40efbe06b948db5d5d1_JaffaCakes118.dll,#1
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2932
    • C:\Windows\SysWOW64\rundll32.exe
      rundll32.exe C:\Users\Admin\AppData\Local\Temp\6195fe77464fd40efbe06b948db5d5d1_JaffaCakes118.dll,#1
      2⤵
      • Drops file in Windows directory
      • Suspicious use of WriteProcessMemory
      PID:1688
      • C:\WINDOWS\mssecsvc.exe
        C:\WINDOWS\mssecsvc.exe
        3⤵
        • Executes dropped EXE
        • Drops file in Windows directory
        PID:2256
        • C:\WINDOWS\tasksche.exe
          C:\WINDOWS\tasksche.exe /i
          4⤵
          • Executes dropped EXE
          PID:2548
  • C:\WINDOWS\mssecsvc.exe
    C:\WINDOWS\mssecsvc.exe -m security
    1⤵
    • Executes dropped EXE
    • Drops file in System32 directory
    • Modifies data under HKEY_USERS
    PID:2620

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Windows\mssecsvc.exe

    Filesize

    3.6MB

    MD5

    6a3ced7c1f61bf06223092711350903a

    SHA1

    c0ef7cfcac0868432802ae7494dde7ed26c7a871

    SHA256

    39be70280cb662f514a595efe7c714d9657ff698edeae4cb443cb320a4846437

    SHA512

    4ba06965e208f736989e38736a3da5aaf56aa0b5faad987b05ff67f59082ff4e67d6b8de711dc0734bb52999af9b7d19b9448ae70edab59e69b524713018470c

  • C:\Windows\tasksche.exe

    Filesize

    3.4MB

    MD5

    b046fe66849a402a018fe23bd304b370

    SHA1

    031901528dbee22886dc84030b80f08e31a0703e

    SHA256

    9e0446a754ed01ec7c2f962d9eb15c526f76d6bd6b2fc0f34c2c83f9fd2903f5

    SHA512

    535d491faac514ad418ee8efd741f0ac04e2e1c4241b3d4ed904c9f4841ff0a7956a6ae7d4e6e66a5de90a612dc67fd6db7f7155695698f6a8d1117bbe480d29