Resubmissions

26-05-2024 19:45

240526-yglhwshf2y 10

26-05-2024 18:09

240526-wrsc3sfg58 10

Analysis

  • max time kernel
    150s
  • max time network
    150s
  • platform
    windows7_x64
  • resource
    win7-20240508-en
  • resource tags

    arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system
  • submitted
    26-05-2024 19:45

General

  • Target

    765c4c601581249e11bfb2f87e06f502_JaffaCakes118.dll

  • Size

    5.0MB

  • MD5

    765c4c601581249e11bfb2f87e06f502

  • SHA1

    09cf9e55abf0a83cb7524a693ea77d8f9af81e15

  • SHA256

    b31f2f762aea78f69dff795dc5a2a0a7bc102f9628308f8deaea2bf3297c076d

  • SHA512

    afe5e70ad02c91054d8e0158b1fd35e266d11be6f59cad7cd3c414f2c2dd1b1cc586d2f2c3d0d7a508c9fbf1a36c17a04c95f35322de728ca4785f210e5a5649

  • SSDEEP

    98304:+DqPoBcRxcSUDk36SAEdhvxWa9P593R8yAVp2H:+DqPHxcxk3ZAEUadzR8yc4H

Malware Config

Signatures

  • Wannacry

    WannaCry is a ransomware cryptoworm.

  • Contacts a large (3286) amount of remote hosts 1 TTPs

    This may indicate a network scan to discover remotely running services.

  • Executes dropped EXE 3 IoCs
  • Creates a large amount of network flows 1 TTPs

    This may indicate a network scan to discover remotely running services.

  • Drops file in System32 directory 1 IoCs
  • Drops file in Windows directory 2 IoCs
  • Modifies data under HKEY_USERS 24 IoCs
  • Suspicious behavior: EnumeratesProcesses 5 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of FindShellTrayWindow 31 IoCs
  • Suspicious use of SendNotifyMessage 31 IoCs
  • Suspicious use of WriteProcessMemory 11 IoCs

Processes

  • C:\Windows\system32\rundll32.exe
    rundll32.exe C:\Users\Admin\AppData\Local\Temp\765c4c601581249e11bfb2f87e06f502_JaffaCakes118.dll,#1
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2364
    • C:\Windows\SysWOW64\rundll32.exe
      rundll32.exe C:\Users\Admin\AppData\Local\Temp\765c4c601581249e11bfb2f87e06f502_JaffaCakes118.dll,#1
      2⤵
      • Drops file in Windows directory
      • Suspicious use of WriteProcessMemory
      PID:2372
      • C:\WINDOWS\mssecsvc.exe
        C:\WINDOWS\mssecsvc.exe
        3⤵
        • Executes dropped EXE
        • Drops file in Windows directory
        PID:1580
        • C:\WINDOWS\tasksche.exe
          C:\WINDOWS\tasksche.exe /i
          4⤵
          • Executes dropped EXE
          PID:2572
  • C:\WINDOWS\mssecsvc.exe
    C:\WINDOWS\mssecsvc.exe -m security
    1⤵
    • Executes dropped EXE
    • Drops file in System32 directory
    • Modifies data under HKEY_USERS
    PID:2416
  • C:\Windows\system32\taskmgr.exe
    "C:\Windows\system32\taskmgr.exe" /4
    1⤵
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    PID:1404

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Windows\mssecsvc.exe

    Filesize

    3.6MB

    MD5

    9e940166e975ff4b62df26b6ba39890e

    SHA1

    eb892e8385f19d19ab07e3201549e0e923549a17

    SHA256

    a3102fb1b8abf6b49154676ad28d989e5e008697d1cf8138c4a43a82e40178ae

    SHA512

    cb6b0844170ce641fcdc07a1223a7ff61305dc260effb0ce1d4b9fd63d1edf69feae1ec6ccbe0c766bf20ca4254699945b8da4950b4340501d848a5cd5dc7620

  • C:\Windows\tasksche.exe

    Filesize

    3.4MB

    MD5

    168cdc4051b22f65601a4f05cd227e5b

    SHA1

    05a291241bc05c8d765b58d587f87e33d390a5ce

    SHA256

    cb3430d5cd69ac7f258495de7e2c854b6f706ae093f0eaa068185d2d229da9b7

    SHA512

    ffcc244e940498cce4f008749cc2420b032ba2264a929a0c080df942075aae44c4d059f57ad02291cf43060fc61ed7e24bdb8028c9595b610f80a28747b0cf63

  • memory/1404-12-0x0000000140000000-0x00000001405E8000-memory.dmp

    Filesize

    5.9MB