Analysis

  • max time kernel
    150s
  • max time network
    150s
  • platform
    windows7_x64
  • resource
    win7-20240508-en
  • resource tags

    arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system
  • submitted
    30-05-2024 15:20

General

  • Target

    849fafc139d1c8b2c5a8e22f0cb05dc1_JaffaCakes118.dll

  • Size

    5.0MB

  • MD5

    849fafc139d1c8b2c5a8e22f0cb05dc1

  • SHA1

    edc4da225d1890f951da0e458909d62240591020

  • SHA256

    0329156707492a0b250aeb47da6d3301b64ce5b9c3c4756db7c729715d8c2f87

  • SHA512

    6e392a7b7d6ccd2a95159d3370eeaf0209c410644e220e8bc6907f6eeea55fb3204aa0a5515413c95f6d3f25aaa2f7a08be405dcab03db703cc91d6134c1c64c

  • SSDEEP

    49152:SnAQqMSPbcBVQej/1INRx+TSqTdOxJM0H9PAMEcaEau3R:+DqPoBhz1aRxcSUwxWa9P593R

Malware Config

Signatures

  • Wannacry

    WannaCry is a ransomware cryptoworm.

  • Contacts a large (3289) amount of remote hosts 1 TTPs

    This may indicate a network scan to discover remotely running services.

  • Executes dropped EXE 3 IoCs
  • Creates a large amount of network flows 1 TTPs

    This may indicate a network scan to discover remotely running services.

  • Drops file in System32 directory 1 IoCs
  • Drops file in Windows directory 2 IoCs
  • Modifies data under HKEY_USERS 24 IoCs
  • Suspicious use of WriteProcessMemory 11 IoCs

Processes

  • C:\Windows\system32\rundll32.exe
    rundll32.exe C:\Users\Admin\AppData\Local\Temp\849fafc139d1c8b2c5a8e22f0cb05dc1_JaffaCakes118.dll,#1
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1616
    • C:\Windows\SysWOW64\rundll32.exe
      rundll32.exe C:\Users\Admin\AppData\Local\Temp\849fafc139d1c8b2c5a8e22f0cb05dc1_JaffaCakes118.dll,#1
      2⤵
      • Drops file in Windows directory
      • Suspicious use of WriteProcessMemory
      PID:2144
      • C:\WINDOWS\mssecsvc.exe
        C:\WINDOWS\mssecsvc.exe
        3⤵
        • Executes dropped EXE
        • Drops file in Windows directory
        PID:2960
        • C:\WINDOWS\tasksche.exe
          C:\WINDOWS\tasksche.exe /i
          4⤵
          • Executes dropped EXE
          PID:2568
  • C:\WINDOWS\mssecsvc.exe
    C:\WINDOWS\mssecsvc.exe -m security
    1⤵
    • Executes dropped EXE
    • Drops file in System32 directory
    • Modifies data under HKEY_USERS
    PID:2640

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Windows\mssecsvc.exe
    Filesize

    3.6MB

    MD5

    e0fd19ae1134a5e9e19d4607faec7b74

    SHA1

    598f50737d562974697edf0001efeed15764ddc8

    SHA256

    139d99e66250012da2e3f1a88919372f9bbe11a64a3c005142f1aaac24c458a4

    SHA512

    2737660e30cc7f634d6f6ac5f162a830b7de3174c7f09e4d7d360040ca00776fce81bc72db878f110adc9e19f839c140f4807256972cd792aa500d0e62c152d7

  • C:\Windows\tasksche.exe
    Filesize

    3.4MB

    MD5

    131ca8785de9fb9b53b3a1670eda7f11

    SHA1

    4b3007510849ed6ec02187511dc9fef5d7b64a1b

    SHA256

    9afb2653c3ec17136c26e894428c4cfe93af04241f28e49bb0029a0f3b2b4581

    SHA512

    99bd525cb1779348099caa188af0082e349811f327c730a709af3ace740d3fb9fc23096e7d47351f69f6f761cd400a3e43a5bb0dbe175cd759c44849930e7766