Analysis

  • max time kernel
    150s
  • max time network
    150s
  • platform
    windows7_x64
  • resource
    win7-20231129-en
  • resource tags

    arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system
  • submitted
    25-05-2024 23:26

General

  • Target

    7399cd7ebd2ed59f60e672b59fe24b1e_JaffaCakes118.dll

  • Size

    5.0MB

  • MD5

    7399cd7ebd2ed59f60e672b59fe24b1e

  • SHA1

    2d0c72260f7ddd8834b297b3924ec0c840fd0893

  • SHA256

    01e0a9e78f32164f518ac8195f1f59012e2e9c7050181506ca594546b4be3fa1

  • SHA512

    7056b42887555fd92322f2f4b9e48dcbe60205247d28c639bc1c6491c6b181b982d1e4e17f1971a587ed2850fd3293785eab5e2f02d37e6a3f118cf3b9315e47

  • SSDEEP

    98304:TDqPoBhz1aRxcSUDk36SAEdhvxWa9P59:TDqPe1Cxcxk3ZAEUad

Malware Config

Signatures

  • Wannacry

    WannaCry is a ransomware cryptoworm.

  • Contacts a large (3325) amount of remote hosts 1 TTPs

    This may indicate a network scan to discover remotely running services.

  • Executes dropped EXE 3 IoCs
  • Creates a large amount of network flows 1 TTPs

    This may indicate a network scan to discover remotely running services.

  • Drops file in System32 directory 1 IoCs
  • Drops file in Windows directory 2 IoCs
  • Modifies data under HKEY_USERS 24 IoCs
  • Suspicious use of WriteProcessMemory 11 IoCs

Processes

  • C:\Windows\system32\rundll32.exe
    rundll32.exe C:\Users\Admin\AppData\Local\Temp\7399cd7ebd2ed59f60e672b59fe24b1e_JaffaCakes118.dll,#1
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2168
    • C:\Windows\SysWOW64\rundll32.exe
      rundll32.exe C:\Users\Admin\AppData\Local\Temp\7399cd7ebd2ed59f60e672b59fe24b1e_JaffaCakes118.dll,#1
      2⤵
      • Drops file in Windows directory
      • Suspicious use of WriteProcessMemory
      PID:2044
      • C:\WINDOWS\mssecsvc.exe
        C:\WINDOWS\mssecsvc.exe
        3⤵
        • Executes dropped EXE
        • Drops file in Windows directory
        PID:1812
        • C:\WINDOWS\tasksche.exe
          C:\WINDOWS\tasksche.exe /i
          4⤵
          • Executes dropped EXE
          PID:2672
  • C:\WINDOWS\mssecsvc.exe
    C:\WINDOWS\mssecsvc.exe -m security
    1⤵
    • Executes dropped EXE
    • Drops file in System32 directory
    • Modifies data under HKEY_USERS
    PID:2260

Network

MITRE ATT&CK Matrix ATT&CK v13

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Windows\mssecsvc.exe
    Filesize

    3.6MB

    MD5

    1b15e08a5a18357ba188888f53aeed01

    SHA1

    862514337374a54d26e86f1df39a0800c5cd84f6

    SHA256

    74313cfbc7ed6dd96a4e71257668cabc537081cea5291d71200b26b146e2c247

    SHA512

    ca413d0ed266ac3e5fc27020dd2a200549a101fe5f8cd937353bdf61775335865dd972a8932b2d5fc1f8dd3446d39b6551f17d33d96060a261908cad0505bafe

  • C:\Windows\tasksche.exe
    Filesize

    3.4MB

    MD5

    491cbf257f5a5480598928b92700b29e

    SHA1

    1d6d79f23d2a3675cbb4b2202e819a7930494212

    SHA256

    bb8f6f081677fc409d2d8b4701f2567e61e5892f27fdd04bc0106cf44561d1c9

    SHA512

    fc516169f29c9aa21cc6e594afe29517c7de979feafa862b21609bf0b8ba549067605d915054e07616cc5e408f7d6193a16aca0fe047bf0f7f825b8fd1099642