Analysis

  • max time kernel
    150s
  • max time network
    151s
  • platform
    windows7_x64
  • resource
    win7-20240419-en
  • resource tags

    arch:x64arch:x86image:win7-20240419-enlocale:en-usos:windows7-x64system
  • submitted
    21-05-2024 08:17

General

  • Target

    62a0aaca659062139dec2f9742995d8f_JaffaCakes118.dll

  • Size

    5.0MB

  • MD5

    62a0aaca659062139dec2f9742995d8f

  • SHA1

    b8851c3d99ccc12dac0e106dec265db324c3f141

  • SHA256

    291e79ceced63d7f5261e133ae6f8956db51acaba0406c47979684595170c55a

  • SHA512

    81a13c083cb83a82de51cbc71f2b3f66e2a0b8797732cc36f4a6fff7f51188a7c365e4e80569981df8813a61999838639d7bf38149969d13194145b8034aebca

  • SSDEEP

    98304:TDqPoBhz1aRxcSUDk36SAEdhvxWa9P593R8yAVp2:TDqPe1Cxcxk3ZAEUadzR8yc4

Malware Config

Signatures

  • Wannacry

    WannaCry is a ransomware cryptoworm.

  • Contacts a large (3170) amount of remote hosts 1 TTPs

    This may indicate a network scan to discover remotely running services.

  • Executes dropped EXE 3 IoCs
  • Creates a large amount of network flows 1 TTPs

    This may indicate a network scan to discover remotely running services.

  • Drops file in System32 directory 1 IoCs
  • Drops file in Windows directory 2 IoCs
  • Modifies data under HKEY_USERS 24 IoCs
  • Suspicious use of WriteProcessMemory 11 IoCs

Processes

  • C:\Windows\system32\rundll32.exe
    rundll32.exe C:\Users\Admin\AppData\Local\Temp\62a0aaca659062139dec2f9742995d8f_JaffaCakes118.dll,#1
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2028
    • C:\Windows\SysWOW64\rundll32.exe
      rundll32.exe C:\Users\Admin\AppData\Local\Temp\62a0aaca659062139dec2f9742995d8f_JaffaCakes118.dll,#1
      2⤵
      • Drops file in Windows directory
      • Suspicious use of WriteProcessMemory
      PID:2316
      • C:\WINDOWS\mssecsvc.exe
        C:\WINDOWS\mssecsvc.exe
        3⤵
        • Executes dropped EXE
        • Drops file in Windows directory
        PID:2464
        • C:\WINDOWS\tasksche.exe
          C:\WINDOWS\tasksche.exe /i
          4⤵
          • Executes dropped EXE
          PID:2880
  • C:\WINDOWS\mssecsvc.exe
    C:\WINDOWS\mssecsvc.exe -m security
    1⤵
    • Executes dropped EXE
    • Drops file in System32 directory
    • Modifies data under HKEY_USERS
    PID:3068

Network

MITRE ATT&CK Matrix ATT&CK v13

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Windows\mssecsvc.exe
    Filesize

    3.6MB

    MD5

    b2d1a374e0e0f925104fc873dad60860

    SHA1

    3568e1cb70800b6f90fb20baf7ab2001e74965f8

    SHA256

    d972e80a36c7b5de43d9fc67328408e31fef54bfdf65a347a97cbf9f58721117

    SHA512

    cf2219cf964fd2053e7da65f4e547773a2977bb8de5d3362945c096124febb29b7d1003455ce90315f834c2a0940e17e2ddbe07dbc9cdb8a2b865e029ba0584b

  • C:\Windows\tasksche.exe
    Filesize

    3.4MB

    MD5

    a5947eeab8ebb06b7d52aa18af302bd8

    SHA1

    86d87502721c7524a429069fe1737887487b8ddb

    SHA256

    a701ac320e17aea9bf5f74f063613eda241336a3ed534909c557395045ebca4d

    SHA512

    c8c38e0727c3aba179ec4234224cd16af334ad9ee822882249bc797b3cfe1c3892f84f68e6754f2dd36d61f8e4c4055c5c927b326f4a88c855b2ab61d297f0f4