Analysis

  • max time kernel
    150s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240508-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system
  • submitted
    23/05/2024, 18:56

General

  • Target

    6bf20cfa4ba80e648542102fb81914f4_JaffaCakes118.dll

  • Size

    5.0MB

  • MD5

    6bf20cfa4ba80e648542102fb81914f4

  • SHA1

    9bc1ce68754127c6981ae6d4f0b496ef12d98ca8

  • SHA256

    f6445c6a8137ec33bea9f9d0be33d5a57358d93bf0a5f803f2d09772cccb9460

  • SHA512

    9a9440b7d44ce79cc26f022e1d641e18ff9e52fe97229465531aafeb4f6127daaa8c42d796b4d7ebe5524ab4ce5f3f7aa468381a132d8c0de7e337155a3a38b7

  • SSDEEP

    98304:TDqPoBhbxcSUDk36SAEdhlxWa9P593zp2R:TDqPCxcxk3ZAEaadzz4R

Malware Config

Signatures

  • Wannacry

    WannaCry is a ransomware cryptoworm.

  • Contacts a large (3301) amount of remote hosts 1 TTPs

    This may indicate a network scan to discover remotely running services.

  • Executes dropped EXE 3 IoCs
  • Creates a large amount of network flows 1 TTPs

    This may indicate a network scan to discover remotely running services.

  • Drops file in Windows directory 2 IoCs
  • Modifies data under HKEY_USERS 5 IoCs
  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Windows\system32\rundll32.exe
    rundll32.exe C:\Users\Admin\AppData\Local\Temp\6bf20cfa4ba80e648542102fb81914f4_JaffaCakes118.dll,#1
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1788
    • C:\Windows\SysWOW64\rundll32.exe
      rundll32.exe C:\Users\Admin\AppData\Local\Temp\6bf20cfa4ba80e648542102fb81914f4_JaffaCakes118.dll,#1
      2⤵
      • Drops file in Windows directory
      • Suspicious use of WriteProcessMemory
      PID:2116
      • C:\WINDOWS\mssecsvc.exe
        C:\WINDOWS\mssecsvc.exe
        3⤵
        • Executes dropped EXE
        • Drops file in Windows directory
        PID:4444
        • C:\WINDOWS\tasksche.exe
          C:\WINDOWS\tasksche.exe /i
          4⤵
          • Executes dropped EXE
          PID:1776
  • C:\WINDOWS\mssecsvc.exe
    C:\WINDOWS\mssecsvc.exe -m security
    1⤵
    • Executes dropped EXE
    • Modifies data under HKEY_USERS
    PID:4996

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Windows\mssecsvc.exe

          Filesize

          3.6MB

          MD5

          44f09253b9216e4e04beddaa89f73d8f

          SHA1

          e46471de8a0e97151333799bffbf84c6e58eb185

          SHA256

          85648e5aa9a3d437918ae146a46bb076d1d8aee30dc61db191a44d4fc61a91b8

          SHA512

          8b8d8e55ed93e737bd023eae6a42cc32c0d1099e049719cba09f4eccdb50648293f1173f676631873c61ce99d28a5206583173c7dec4942aade8678cc78c636d

        • C:\Windows\tasksche.exe

          Filesize

          3.4MB

          MD5

          ad84fae2599defac30e2271bf9509e7a

          SHA1

          b91f077d4d5c9e03da30a795047dcc252013767b

          SHA256

          7ca5828c9e097bbb34b736778e9e91a54bd2b91486ceb17848a5aaff5bab3eed

          SHA512

          dfe8aaaeaf143fa11082dde1d930a483a4ae151a35be197f367ac8e0e827b1ca6e392aa3d1112b2735c46374ccb9cacd7dc720b102b0b6c8ebc07a8cde0374db