Analysis

  • max time kernel
    150s
  • max time network
    150s
  • platform
    windows7_x64
  • resource
    win7-20240215-en
  • resource tags

    arch:x64arch:x86image:win7-20240215-enlocale:en-usos:windows7-x64system
  • submitted
    29-05-2024 02:58

General

  • Target

    7f49197d5c24d409c7788733d9a6691d_JaffaCakes118.dll

  • Size

    5.0MB

  • MD5

    7f49197d5c24d409c7788733d9a6691d

  • SHA1

    385542727cb1c053e4bf0bcc7df3eac6d7676de3

  • SHA256

    672a2ff15bf6db8941c0318d572289a03224f6d3670ec8d9d89761c97f5672f0

  • SHA512

    41ea340fa7e3dc9a4f0bf52a5f3a43bb5129725362848c838296d774abb6074fb6b367c2e2bbdc9e3f2390f2accb943a594546203e1ce0c5a59c2365422b5f25

  • SSDEEP

    98304:+DqPoBhz1aRxcSUDk36SAEdhvxWa9P59Uc/:+DqPe1Cxcxk3ZAEUadv

Malware Config

Signatures

  • Wannacry

    WannaCry is a ransomware cryptoworm.

  • Contacts a large (3251) amount of remote hosts 1 TTPs

    This may indicate a network scan to discover remotely running services.

  • Executes dropped EXE 3 IoCs
  • Creates a large amount of network flows 1 TTPs

    This may indicate a network scan to discover remotely running services.

  • Drops file in System32 directory 1 IoCs
  • Drops file in Windows directory 2 IoCs
  • Modifies data under HKEY_USERS 24 IoCs
  • Suspicious use of WriteProcessMemory 11 IoCs

Processes

  • C:\Windows\system32\rundll32.exe
    rundll32.exe C:\Users\Admin\AppData\Local\Temp\7f49197d5c24d409c7788733d9a6691d_JaffaCakes118.dll,#1
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2204
    • C:\Windows\SysWOW64\rundll32.exe
      rundll32.exe C:\Users\Admin\AppData\Local\Temp\7f49197d5c24d409c7788733d9a6691d_JaffaCakes118.dll,#1
      2⤵
      • Drops file in Windows directory
      • Suspicious use of WriteProcessMemory
      PID:2184
      • C:\WINDOWS\mssecsvc.exe
        C:\WINDOWS\mssecsvc.exe
        3⤵
        • Executes dropped EXE
        • Drops file in Windows directory
        PID:2220
        • C:\WINDOWS\tasksche.exe
          C:\WINDOWS\tasksche.exe /i
          4⤵
          • Executes dropped EXE
          PID:2756
  • C:\WINDOWS\mssecsvc.exe
    C:\WINDOWS\mssecsvc.exe -m security
    1⤵
    • Executes dropped EXE
    • Drops file in System32 directory
    • Modifies data under HKEY_USERS
    PID:2596

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Windows\mssecsvc.exe
    Filesize

    3.6MB

    MD5

    4c191ceedf068722262c9017c403ab7f

    SHA1

    b3abf0e6b5028d78b8690553b89ce1187ce04e38

    SHA256

    334852c16dc9068402ef1b5769eb2d162c964fb2fda08a41f6059b045a73167a

    SHA512

    434b0ae00c392a364f49d3f9e49d729355385798e9c7c1bd68259097348c3fbeab2951eed066fa5444e8bedd371c879ae89a1b93c490e9392ca8514509d1a939

  • C:\Windows\tasksche.exe
    Filesize

    3.4MB

    MD5

    03ab7e15db3770aca81bf40984996596

    SHA1

    518e2b1cd65da706537151ed63601b6a03179762

    SHA256

    a18fd9a0cd29de9728d47d9462fa45f42fee5059e51524c6041c29df349ea42a

    SHA512

    77a2016550381d60bad0dcd36a04bbcb794cf48074c8c871708ed8fd074a17d5ecb2ffc552a8c255055de492a0b1fb9999686e8aa8fe8758a3e6dd5c7ba46381