Analysis
-
max time kernel
150s -
max time network
154s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
27-05-2024 02:38
Static task
static1
Behavioral task
behavioral1
Sample
77a34248cc10e2188124973fcb3952a9_JaffaCakes118.dll
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
77a34248cc10e2188124973fcb3952a9_JaffaCakes118.dll
Resource
win10v2004-20240426-en
General
-
Target
77a34248cc10e2188124973fcb3952a9_JaffaCakes118.dll
-
Size
5.0MB
-
MD5
77a34248cc10e2188124973fcb3952a9
-
SHA1
3aa9b023954894a0eed23fec6ba33796290cc5b1
-
SHA256
83d820c4d5ec752c466bf49490e3c42de9db44dffd76b7eb869fed7653b6eac1
-
SHA512
eab4ee90f11ba4f89479f012afb706646de671b1dcd531b98fabf7f7453fa12cb1cee18111bbe4f018a4681290915d44492751927fa32b09ec8b8b47de53fecb
-
SSDEEP
98304:T8qPoBhz1aRxcSUDk36SAEdhvxWa9P59Uc/F:T8qPe1Cxcxk3ZAEUadvF
Malware Config
Signatures
-
Wannacry
WannaCry is a ransomware cryptoworm.
-
Contacts a large (3168) amount of remote hosts 1 TTPs
This may indicate a network scan to discover remotely running services.
-
Executes dropped EXE 3 IoCs
Processes:
mssecsvc.exemssecsvc.exetasksche.exepid process 2808 mssecsvc.exe 2884 mssecsvc.exe 2728 tasksche.exe -
Creates a large amount of network flows 1 TTPs
This may indicate a network scan to discover remotely running services.
-
Drops file in System32 directory 1 IoCs
Processes:
mssecsvc.exedescription ioc process File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\Temporary Internet Files\counters.dat mssecsvc.exe -
Drops file in Windows directory 2 IoCs
Processes:
rundll32.exemssecsvc.exedescription ioc process File created C:\WINDOWS\mssecsvc.exe rundll32.exe File created C:\WINDOWS\tasksche.exe mssecsvc.exe -
Modifies data under HKEY_USERS 1 IoCs
Processes:
mssecsvc.exedescription ioc process Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings mssecsvc.exe -
Suspicious use of WriteProcessMemory 11 IoCs
Processes:
rundll32.exerundll32.exedescription pid process target process PID 640 wrote to memory of 2136 640 rundll32.exe rundll32.exe PID 640 wrote to memory of 2136 640 rundll32.exe rundll32.exe PID 640 wrote to memory of 2136 640 rundll32.exe rundll32.exe PID 640 wrote to memory of 2136 640 rundll32.exe rundll32.exe PID 640 wrote to memory of 2136 640 rundll32.exe rundll32.exe PID 640 wrote to memory of 2136 640 rundll32.exe rundll32.exe PID 640 wrote to memory of 2136 640 rundll32.exe rundll32.exe PID 2136 wrote to memory of 2808 2136 rundll32.exe mssecsvc.exe PID 2136 wrote to memory of 2808 2136 rundll32.exe mssecsvc.exe PID 2136 wrote to memory of 2808 2136 rundll32.exe mssecsvc.exe PID 2136 wrote to memory of 2808 2136 rundll32.exe mssecsvc.exe
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\77a34248cc10e2188124973fcb3952a9_JaffaCakes118.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:640 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\77a34248cc10e2188124973fcb3952a9_JaffaCakes118.dll,#12⤵
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:2136 -
C:\WINDOWS\mssecsvc.exeC:\WINDOWS\mssecsvc.exe3⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:2808 -
C:\WINDOWS\tasksche.exeC:\WINDOWS\tasksche.exe /i4⤵
- Executes dropped EXE
PID:2728
-
-
-
-
C:\WINDOWS\mssecsvc.exeC:\WINDOWS\mssecsvc.exe -m security1⤵
- Executes dropped EXE
- Drops file in System32 directory
- Modifies data under HKEY_USERS
PID:2884
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3.6MB
MD5e42e740a3c6d8c143d38ea8a16e94b63
SHA1a3b21b288d565fb0cd7c41534980d1cef4a4312e
SHA256c7dce150cde43791fecaf7cc049259f2fc6742bce9e36933de35ff668cf5fcb3
SHA512707069430e93fcb14afae16e995d5dc88c8b9037844c4c49a673efabb501c3274868236b4398ad1201b131d77aa44b4aad11ebeb132d1b6cddd816c4c769a244
-
Filesize
3.4MB
MD544662faa774ba92d7fa2dc75621fd9e4
SHA1556f78ecfba051f09eb0cac1254f6168f1e238c2
SHA2567d60466ffff500a7528cd2b8182a9b28698c7ba72e1e8652f50d41bc135ca52f
SHA512c45a618824ea11b5b1db272d4bc05281826599b802916c0ac857a027d7217c6c5438a10e4c3203f63fb7c0bfca58ed2e018fb0f3d23aa4fca1a8ca99dd3195a3