Analysis

  • max time kernel
    150s
  • max time network
    150s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    25-05-2024 09:45

General

  • Target

    719453dfddd5f4c2f8ccd5d333803eee_JaffaCakes118.dll

  • Size

    5.0MB

  • MD5

    719453dfddd5f4c2f8ccd5d333803eee

  • SHA1

    6fb503ab459f63cdf970258daa5bf1fcdc06be75

  • SHA256

    1ce387f825838a4cad3a088e62c18f8b2f650f1f0f6d74d49f84608734ed28bb

  • SHA512

    859e0aab06db673503b843a6ef0b217afb21bf72ecee2a3515e686a5c194934d72cf76fd48af342ea95df2fec3d98f235e3d579429c72a67e7d97dab1a11b51d

  • SSDEEP

    98304:+DqPoBhz1aRxcSUDk36SAEdhvxWa9P59SF8o/VGZQ0H3Hyd:+DqPe1Cxcxk3ZAEUadHw8Bw

Malware Config

Signatures

  • Wannacry

    WannaCry is a ransomware cryptoworm.

  • Contacts a large (3291) amount of remote hosts 1 TTPs

    This may indicate a network scan to discover remotely running services.

  • Executes dropped EXE 3 IoCs
  • Creates a large amount of network flows 1 TTPs

    This may indicate a network scan to discover remotely running services.

  • Drops file in System32 directory 1 IoCs
  • Drops file in Windows directory 2 IoCs
  • Modifies data under HKEY_USERS 24 IoCs
  • Suspicious use of WriteProcessMemory 11 IoCs

Processes

  • C:\Windows\system32\rundll32.exe
    rundll32.exe C:\Users\Admin\AppData\Local\Temp\719453dfddd5f4c2f8ccd5d333803eee_JaffaCakes118.dll,#1
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1968
    • C:\Windows\SysWOW64\rundll32.exe
      rundll32.exe C:\Users\Admin\AppData\Local\Temp\719453dfddd5f4c2f8ccd5d333803eee_JaffaCakes118.dll,#1
      2⤵
      • Drops file in Windows directory
      • Suspicious use of WriteProcessMemory
      PID:1988
      • C:\WINDOWS\mssecsvc.exe
        C:\WINDOWS\mssecsvc.exe
        3⤵
        • Executes dropped EXE
        • Drops file in Windows directory
        PID:3060
        • C:\WINDOWS\tasksche.exe
          C:\WINDOWS\tasksche.exe /i
          4⤵
          • Executes dropped EXE
          PID:1224
  • C:\WINDOWS\mssecsvc.exe
    C:\WINDOWS\mssecsvc.exe -m security
    1⤵
    • Executes dropped EXE
    • Drops file in System32 directory
    • Modifies data under HKEY_USERS
    PID:2584

Network

MITRE ATT&CK Matrix ATT&CK v13

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Windows\mssecsvc.exe
    Filesize

    3.6MB

    MD5

    61c4227fa2b98afada79c2d177957fe3

    SHA1

    85ecd573c5b48fc4bd166c0a3208fcc518c47fb5

    SHA256

    8ed906a84016479de24242bbbe081f1232e1e1650d5bdb720164f80890745d3a

    SHA512

    d9e844f69c045cf958cd2d147ecd2257439139912ee9a3994167bdf140baf24f5af641d1e975fdf20e1811b09620d24184acab9f97c2c5130e570ccf12f14b03

  • C:\Windows\tasksche.exe
    Filesize

    3.4MB

    MD5

    563b7bbfd16c42664e61560f96894f93

    SHA1

    f5e01461ebd8489051b4a72620d99a5c81efe39c

    SHA256

    eb177815b05bb94cd0374d245cd4beae3d722eaa8fbc64f6395b4c9ff881302c

    SHA512

    b581b6be084d77f631a48297b142fd004d67ff5a1fa55d4124ce17b9e8602d39df4543b10237ef2f6c23d108d41ab837cf3ecb5f1b413438e337397f42a83e19