Analysis

  • max time kernel
    150s
  • max time network
    150s
  • platform
    windows7_x64
  • resource
    win7-20231129-en
  • resource tags

    arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system
  • submitted
    28-05-2024 11:45

General

  • Target

    7cd62314699e88eb5f1fad16e4054ad4_JaffaCakes118.dll

  • Size

    5.0MB

  • MD5

    7cd62314699e88eb5f1fad16e4054ad4

  • SHA1

    179d952b83b96ff6647347cd840769cef070a3cf

  • SHA256

    aeb3230d728a899a2db6d4323641664ff724a0c6dd28c2a4083f73295deb5510

  • SHA512

    13a360bb21177860526b489dd375ba80acf4f0ce48f31249bc89cce48c36339127ff1113fec576824833fe5b046e838e5aa36c47d51a98614972941e2248b88b

  • SSDEEP

    24576:SbLgddQhfdmMSirYbcMNgef0QeQjG/D8kIqRYoAdNLKkYyqGR:SnAQqMSPbcBVQej/1IN3

Malware Config

Signatures

  • Wannacry

    WannaCry is a ransomware cryptoworm.

  • Contacts a large (3217) amount of remote hosts 1 TTPs

    This may indicate a network scan to discover remotely running services.

  • Executes dropped EXE 3 IoCs
  • Creates a large amount of network flows 1 TTPs

    This may indicate a network scan to discover remotely running services.

  • Drops file in System32 directory 1 IoCs
  • Drops file in Windows directory 2 IoCs
  • Modifies data under HKEY_USERS 24 IoCs
  • Suspicious use of WriteProcessMemory 11 IoCs

Processes

  • C:\Windows\system32\rundll32.exe
    rundll32.exe C:\Users\Admin\AppData\Local\Temp\7cd62314699e88eb5f1fad16e4054ad4_JaffaCakes118.dll,#1
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1684
    • C:\Windows\SysWOW64\rundll32.exe
      rundll32.exe C:\Users\Admin\AppData\Local\Temp\7cd62314699e88eb5f1fad16e4054ad4_JaffaCakes118.dll,#1
      2⤵
      • Drops file in Windows directory
      • Suspicious use of WriteProcessMemory
      PID:2368
      • C:\WINDOWS\mssecsvc.exe
        C:\WINDOWS\mssecsvc.exe
        3⤵
        • Executes dropped EXE
        • Drops file in Windows directory
        PID:1632
        • C:\WINDOWS\tasksche.exe
          C:\WINDOWS\tasksche.exe /i
          4⤵
          • Executes dropped EXE
          PID:2568
  • C:\WINDOWS\mssecsvc.exe
    C:\WINDOWS\mssecsvc.exe -m security
    1⤵
    • Executes dropped EXE
    • Drops file in System32 directory
    • Modifies data under HKEY_USERS
    PID:2112

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Windows\mssecsvc.exe

    Filesize

    3.6MB

    MD5

    aeb574c1995ae12c05fc8ad96dc6e22d

    SHA1

    936d2f9d6bf1c075db7f636405b03e5bb2342c5d

    SHA256

    e5f4b9498420f8e267212dae22131f03fb47bed487ac94b70a3fd5b5c651aeb3

    SHA512

    5977f88e906368c9442af9d5085ee68d56cb6730db5e93e6879616d40cb6cacc86ac2fd5b4df7ef6d4bb210da3c96d976722dac58154b188e99a6dd827e787f4

  • C:\Windows\tasksche.exe

    Filesize

    3.4MB

    MD5

    24070bdaf7d008f7f53d917ca9c0b42c

    SHA1

    a9676a02a2a38e785e96f1dac4a9d6ad74a01d05

    SHA256

    b421d86ffa86c29ad9851c47eb4aeac1baba8fe9254fd9896fa8ad49049df046

    SHA512

    625e18843a4c77b88ac0f8ae9ab4747af93eb455e377f2200c68415bdb38a18efd4195f1b540bd3472b75a0a9e63f19c026983c0da6152d241eb5bb3146382b4