Analysis

  • max time kernel
    150s
  • max time network
    151s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    26-05-2024 14:20

General

  • Target

    75c41f9cb3b0920cbdf6a6d58bff2639_JaffaCakes118.dll

  • Size

    5.0MB

  • MD5

    75c41f9cb3b0920cbdf6a6d58bff2639

  • SHA1

    9a8d716574ed1d45b15635d3b6edf376e1977f0f

  • SHA256

    a9fa6e9a07840936038728e94c7cd5b9c345f81d0a81622852d7f719e38f2415

  • SHA512

    52f77dd5ceecc4b202cc3ead37a6f898a496172611433ead8a33127b83586daf8b0889bce89d28ecf5dfeed90eadb7cb9f025b963f4ad90bcc427b4ac2b94ec1

  • SSDEEP

    98304:TDqPoBhz1aRxcSUDk36SAkhu3R8yAVp2p:TDqPe1Cxcxk3ZAzR8yc4p

Malware Config

Signatures

  • Wannacry

    WannaCry is a ransomware cryptoworm.

  • Contacts a large (3321) amount of remote hosts 1 TTPs

    This may indicate a network scan to discover remotely running services.

  • Executes dropped EXE 3 IoCs
  • Creates a large amount of network flows 1 TTPs

    This may indicate a network scan to discover remotely running services.

  • Drops file in System32 directory 1 IoCs
  • Drops file in Windows directory 2 IoCs
  • Modifies data under HKEY_USERS 24 IoCs
  • Suspicious use of WriteProcessMemory 11 IoCs

Processes

  • C:\Windows\system32\rundll32.exe
    rundll32.exe C:\Users\Admin\AppData\Local\Temp\75c41f9cb3b0920cbdf6a6d58bff2639_JaffaCakes118.dll,#1
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2156
    • C:\Windows\SysWOW64\rundll32.exe
      rundll32.exe C:\Users\Admin\AppData\Local\Temp\75c41f9cb3b0920cbdf6a6d58bff2639_JaffaCakes118.dll,#1
      2⤵
      • Drops file in Windows directory
      • Suspicious use of WriteProcessMemory
      PID:2160
      • C:\WINDOWS\mssecsvc.exe
        C:\WINDOWS\mssecsvc.exe
        3⤵
        • Executes dropped EXE
        • Drops file in Windows directory
        PID:1980
        • C:\WINDOWS\tasksche.exe
          C:\WINDOWS\tasksche.exe /i
          4⤵
          • Executes dropped EXE
          PID:2668
  • C:\WINDOWS\mssecsvc.exe
    C:\WINDOWS\mssecsvc.exe -m security
    1⤵
    • Executes dropped EXE
    • Drops file in System32 directory
    • Modifies data under HKEY_USERS
    PID:3012

Network

MITRE ATT&CK Matrix ATT&CK v13

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Windows\mssecsvc.exe
    Filesize

    3.6MB

    MD5

    8459dcb2510f8cd5bee8b34428ab9308

    SHA1

    e20b490f6ca30fc95fe0f41dc6bdd6bfb5a8cb21

    SHA256

    aa26e0c95a0713720d0e441b04b74e80efa2b5580c373887bbed345c3bb4642c

    SHA512

    d5f40771695efa38d3ca119f3f9dfb0ba32d5e47109251b8ef236a2c1d15f4e1d7956860252544869859fef3dec3ff287e76f3baa5902546230f308f81b6ccdf

  • C:\Windows\tasksche.exe
    Filesize

    3.4MB

    MD5

    beb56ae73b5e9573b108236be6a155ab

    SHA1

    321d98a7ba9b5d99c38bc4d238967d3d5e8420d3

    SHA256

    60063a3b2936f8f1db3ab224b003a331e920b314ac79ecee0bdc8e8d9f2c40db

    SHA512

    c685a6bef11254b55589b3bc1d4965947915aa857aa2714f6cf9a903c6e83aaf98e2a992b18b824684ae1fb7e0c3c74c9ed21490a5f4c3990e7441af9a368a7e