Analysis

  • max time kernel
    150s
  • max time network
    151s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    26-05-2024 06:37

General

  • Target

    749de420abee04a2beea5e16348c45ed_JaffaCakes118.dll

  • Size

    5.0MB

  • MD5

    749de420abee04a2beea5e16348c45ed

  • SHA1

    1fe91061b416f53ff6797b469dcf2c52a2ad7a90

  • SHA256

    e41b2df5bd99af25544a405025d35e2debebfef8e0d51665d442a05b741f30fe

  • SHA512

    3a5b8b426b0f5c54a1f1149c433287f5ab3b07159b2f3fcbbcf479d52e1045fea687bba64f06c69b638b3cd69006d9a96f4e0d8001a68385cc134bb50a8afb5f

  • SSDEEP

    98304:TDqPoBhz1aRxcSUDk36SAEdhvxWa9P593R8yAVp2:TDqPe1Cxcxk3ZAEUadzR8yc4

Malware Config

Signatures

  • Wannacry

    WannaCry is a ransomware cryptoworm.

  • Contacts a large (3275) amount of remote hosts 1 TTPs

    This may indicate a network scan to discover remotely running services.

  • Executes dropped EXE 3 IoCs
  • Creates a large amount of network flows 1 TTPs

    This may indicate a network scan to discover remotely running services.

  • Drops file in System32 directory 1 IoCs
  • Drops file in Windows directory 2 IoCs
  • Modifies data under HKEY_USERS 24 IoCs
  • Suspicious use of WriteProcessMemory 11 IoCs

Processes

  • C:\Windows\system32\rundll32.exe
    rundll32.exe C:\Users\Admin\AppData\Local\Temp\749de420abee04a2beea5e16348c45ed_JaffaCakes118.dll,#1
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2476
    • C:\Windows\SysWOW64\rundll32.exe
      rundll32.exe C:\Users\Admin\AppData\Local\Temp\749de420abee04a2beea5e16348c45ed_JaffaCakes118.dll,#1
      2⤵
      • Drops file in Windows directory
      • Suspicious use of WriteProcessMemory
      PID:1952
      • C:\WINDOWS\mssecsvc.exe
        C:\WINDOWS\mssecsvc.exe
        3⤵
        • Executes dropped EXE
        • Drops file in Windows directory
        PID:2708
        • C:\WINDOWS\tasksche.exe
          C:\WINDOWS\tasksche.exe /i
          4⤵
          • Executes dropped EXE
          PID:2692
  • C:\WINDOWS\mssecsvc.exe
    C:\WINDOWS\mssecsvc.exe -m security
    1⤵
    • Executes dropped EXE
    • Drops file in System32 directory
    • Modifies data under HKEY_USERS
    PID:2592

Network

MITRE ATT&CK Matrix ATT&CK v13

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Windows\mssecsvc.exe
    Filesize

    3.6MB

    MD5

    00c604f818ab5b6ac2c1034cf2678f05

    SHA1

    f4b5e3d3663ed310556efd670e3efa976df1ae58

    SHA256

    03af1f85d5bb0680a882380ed23e52b4e1969e7e8004b58bfaacb7ec2abf3f1c

    SHA512

    c5309777db12391275257785ab043d740ad39f38bc9c203a50fa8ffe2f22a4619a0dcd5b15dc464ae0ff0f84140c692b3b02d5484d8f71a519a50703e825f1e1

  • C:\Windows\tasksche.exe
    Filesize

    3.4MB

    MD5

    459db8c10b02382e4aed54c572d257e9

    SHA1

    7829b494cbb1669b81b220bde4207d92b70786ee

    SHA256

    a2d25b3af03d62d7f4cd85a601cfc2d6c2490aa32f8367fa3d2fe55a6670589e

    SHA512

    ca14469520ace51f092d894fb1cb88c5a93787741e9cddb6821e80d75d454ab213e126eabebe3769e4f80d9d3d9f87d1961a3a4ea50f9ca8f028a0b28c19072a