Analysis

  • max time kernel
    150s
  • max time network
    152s
  • platform
    windows7_x64
  • resource
    win7-20240419-en
  • resource tags

    arch:x64arch:x86image:win7-20240419-enlocale:en-usos:windows7-x64system
  • submitted
    27-05-2024 17:50

General

  • Target

    79fae695ec420cb24556f8e48fce4f24_JaffaCakes118.dll

  • Size

    5.0MB

  • MD5

    79fae695ec420cb24556f8e48fce4f24

  • SHA1

    c6f5b0dd87dd36707e9af4fc199f220eddb32f78

  • SHA256

    90cb629b6529ce276ad35a7cda1fe72de1cc13ae85606f67042d1c67a0277a29

  • SHA512

    ce72e91036693b3d25a6e72161013a5af5b2eef7c43d71e842d382e7c2af5756116217bfed2cbd231a90463b82e501585711f4e6d5b94c578bdb5cb48fb51986

  • SSDEEP

    12288:yvbLgPlu+QhMbaIMu7L5NVErCA4z2g6rTcbckPU82900Ve7zw+K+D:SbLgddQhfdmMSirYbcMNgef0

Malware Config

Signatures

  • Wannacry

    WannaCry is a ransomware cryptoworm.

  • Contacts a large (3080) amount of remote hosts 1 TTPs

    This may indicate a network scan to discover remotely running services.

  • Executes dropped EXE 3 IoCs
  • Creates a large amount of network flows 1 TTPs

    This may indicate a network scan to discover remotely running services.

  • Drops file in System32 directory 1 IoCs
  • Drops file in Windows directory 2 IoCs
  • Modifies data under HKEY_USERS 24 IoCs
  • Suspicious use of WriteProcessMemory 11 IoCs

Processes

  • C:\Windows\system32\rundll32.exe
    rundll32.exe C:\Users\Admin\AppData\Local\Temp\79fae695ec420cb24556f8e48fce4f24_JaffaCakes118.dll,#1
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2268
    • C:\Windows\SysWOW64\rundll32.exe
      rundll32.exe C:\Users\Admin\AppData\Local\Temp\79fae695ec420cb24556f8e48fce4f24_JaffaCakes118.dll,#1
      2⤵
      • Drops file in Windows directory
      • Suspicious use of WriteProcessMemory
      PID:2156
      • C:\WINDOWS\mssecsvc.exe
        C:\WINDOWS\mssecsvc.exe
        3⤵
        • Executes dropped EXE
        • Drops file in Windows directory
        PID:2812
        • C:\WINDOWS\tasksche.exe
          C:\WINDOWS\tasksche.exe /i
          4⤵
          • Executes dropped EXE
          PID:2684
  • C:\WINDOWS\mssecsvc.exe
    C:\WINDOWS\mssecsvc.exe -m security
    1⤵
    • Executes dropped EXE
    • Drops file in System32 directory
    • Modifies data under HKEY_USERS
    PID:2368

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Windows\mssecsvc.exe

    Filesize

    3.6MB

    MD5

    e1dec216bf5527b81ea3d269978bd6e1

    SHA1

    a642f915ab2b3fed7d4ba2d365b8d52704f84a33

    SHA256

    dca6f0ad5f27fe3936069bda200792487ba7d8e3b0b861061faa650296561631

    SHA512

    822034db0f008552361536ccfc1336f168b55be1a0d66125749a03c5af07823e2e28cbfa1e0dfa242ca4ffda6ccb73d7a3806cee59d93c043f06618deef285ba

  • C:\Windows\tasksche.exe

    Filesize

    3.4MB

    MD5

    86ff63cbee71ac8c1524cab76dcc81c3

    SHA1

    b77986e1474e41edde3cec849e6d8389f0b5ade5

    SHA256

    e529858c4c3ade975badfadc5707ad8b77b9e363cb5daa73c0ba4d7244dcb7bb

    SHA512

    58ec7df8d33152572a3106acfeebcb271f5d1493a01a196222552b2e557845282b7da688691360d60fc40994f651e6ef80e519b2f162d0f61a3dd49cba151f16