Analysis
-
max time kernel
150s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
27-05-2024 13:27
Static task
static1
Behavioral task
behavioral1
Sample
79404d982570227ae4c134c1cd3caacd_JaffaCakes118.dll
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
79404d982570227ae4c134c1cd3caacd_JaffaCakes118.dll
Resource
win10v2004-20240426-en
General
-
Target
79404d982570227ae4c134c1cd3caacd_JaffaCakes118.dll
-
Size
5.0MB
-
MD5
79404d982570227ae4c134c1cd3caacd
-
SHA1
730232a1a3a55dedabe2b765b0ca2f1d0d09f9ba
-
SHA256
8f99b70a31b2c0318ea0d4e84395b7fa7bf097478acf6315ea2387742f1dd0bb
-
SHA512
7eb66057fa692171f42c3cbdbc98b6769c8919eec37aa11726bc64976d524166a3a98e08c615dcd60029d3eabcbda4c240968eda403be306ef82668ea13f8876
-
SSDEEP
98304:d8qPoBhz18xcSUDk36SAEdhvxWa9P593R8yAaZx:d8qPe18xcxk3ZAEUadzR8y97
Malware Config
Signatures
-
Wannacry
WannaCry is a ransomware cryptoworm.
-
Contacts a large (3356) amount of remote hosts 1 TTPs
This may indicate a network scan to discover remotely running services.
-
Executes dropped EXE 3 IoCs
Processes:
mssecsvc.exemssecsvc.exetasksche.exepid process 3872 mssecsvc.exe 3196 mssecsvc.exe 3180 tasksche.exe -
Creates a large amount of network flows 1 TTPs
This may indicate a network scan to discover remotely running services.
-
Drops file in Windows directory 2 IoCs
Processes:
rundll32.exemssecsvc.exedescription ioc process File created C:\WINDOWS\mssecsvc.exe rundll32.exe File created C:\WINDOWS\tasksche.exe mssecsvc.exe -
Suspicious use of WriteProcessMemory 6 IoCs
Processes:
rundll32.exerundll32.exedescription pid process target process PID 4216 wrote to memory of 3520 4216 rundll32.exe rundll32.exe PID 4216 wrote to memory of 3520 4216 rundll32.exe rundll32.exe PID 4216 wrote to memory of 3520 4216 rundll32.exe rundll32.exe PID 3520 wrote to memory of 3872 3520 rundll32.exe mssecsvc.exe PID 3520 wrote to memory of 3872 3520 rundll32.exe mssecsvc.exe PID 3520 wrote to memory of 3872 3520 rundll32.exe mssecsvc.exe
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\79404d982570227ae4c134c1cd3caacd_JaffaCakes118.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:4216 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\79404d982570227ae4c134c1cd3caacd_JaffaCakes118.dll,#12⤵
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:3520 -
C:\WINDOWS\mssecsvc.exeC:\WINDOWS\mssecsvc.exe3⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:3872 -
C:\WINDOWS\tasksche.exeC:\WINDOWS\tasksche.exe /i4⤵
- Executes dropped EXE
PID:3180
-
C:\WINDOWS\mssecsvc.exeC:\WINDOWS\mssecsvc.exe -m security1⤵
- Executes dropped EXE
PID:3196
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3.6MB
MD5bbf7cdd740f487df688c39ccaf673145
SHA1162f866fc63b91ad5425f18837f385bd2d7c7b55
SHA2561de88ba59568ffa3250b01a8cbedf76640eaada2a765d5a08619081791ad82eb
SHA5123c1a8bb2e8c162059dcd1244ba631d8ee1a461063658ca8a5b569c0aee94a4d07fd3799a2d31daa4d7e3fcf1aed67afd901a5df0379c15a0359b080cde7c8c8e
-
Filesize
3.4MB
MD583f36d195afc5e47c08cc2f8aac7cab0
SHA13b4fe3a68d11a361fce97333ba29ed720c224eef
SHA256c2f96ef782ee4cacf15ed09066c20151179922c28cd18c44d9f630dc27d735ab
SHA5129bee484089c2c9090bf7ba4b94ceadac15823c40e97420e2968eac7b1089d2fe9d393baafb1cc23710fd3155c39ccbaf3e78f28352af29be1ed6d2959e5332ca