Analysis

  • max time kernel
    150s
  • max time network
    156s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    31-05-2024 04:07

General

  • Target

    85ee37ea174b466e6a55c36e7e5104a4_JaffaCakes118.dll

  • Size

    5.0MB

  • MD5

    85ee37ea174b466e6a55c36e7e5104a4

  • SHA1

    2ca84a45c50c6664ee928eeb3a3cfc6bdf954226

  • SHA256

    0c3056c18e3201b7963d4a9e9fe1560271562095f5ea43245a38bdbc38f3cdc7

  • SHA512

    db3487b1b482908de15391bcbae0389729b4dae16f53d7e538643b860b66d8b7e963478992fe791004ba5987121dc13df62b47eebfd2192f185dcbab277465a1

  • SSDEEP

    98304:+DqPoBhz13RxcSUDk36SAEdhvxWa9P593R8yAVp2:+DqPe1hxcxk3ZAEUadzR8yc4

Malware Config

Signatures

  • Wannacry

    WannaCry is a ransomware cryptoworm.

  • Contacts a large (3032) amount of remote hosts 1 TTPs

    This may indicate a network scan to discover remotely running services.

  • Executes dropped EXE 3 IoCs
  • Creates a large amount of network flows 1 TTPs

    This may indicate a network scan to discover remotely running services.

  • Drops file in System32 directory 1 IoCs
  • Drops file in Windows directory 2 IoCs
  • Modifies data under HKEY_USERS 24 IoCs
  • Suspicious use of WriteProcessMemory 11 IoCs

Processes

  • C:\Windows\system32\rundll32.exe
    rundll32.exe C:\Users\Admin\AppData\Local\Temp\85ee37ea174b466e6a55c36e7e5104a4_JaffaCakes118.dll,#1
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2320
    • C:\Windows\SysWOW64\rundll32.exe
      rundll32.exe C:\Users\Admin\AppData\Local\Temp\85ee37ea174b466e6a55c36e7e5104a4_JaffaCakes118.dll,#1
      2⤵
      • Drops file in Windows directory
      • Suspicious use of WriteProcessMemory
      PID:2220
      • C:\WINDOWS\mssecsvc.exe
        C:\WINDOWS\mssecsvc.exe
        3⤵
        • Executes dropped EXE
        • Drops file in Windows directory
        PID:2184
        • C:\WINDOWS\tasksche.exe
          C:\WINDOWS\tasksche.exe /i
          4⤵
          • Executes dropped EXE
          PID:2276
  • C:\WINDOWS\mssecsvc.exe
    C:\WINDOWS\mssecsvc.exe -m security
    1⤵
    • Executes dropped EXE
    • Drops file in System32 directory
    • Modifies data under HKEY_USERS
    PID:2824

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Windows\mssecsvc.exe
    Filesize

    3.6MB

    MD5

    5433df247f251572a8ce800369692d55

    SHA1

    d731ac55b841044b41edc21f95e671494f56a1bd

    SHA256

    9539c79cbc93bd3c8d47bb28e5559dd659578efdd68d23b5a532253789b94780

    SHA512

    ca9b4feaca57a9b3d079fee12323936c98d705753a642e96691c7873c3fbade7ec3591aa822f7a5f05b7c696f9f481ab45d18f82ed7da8cfea12ec5abb203c5b

  • C:\Windows\tasksche.exe
    Filesize

    3.4MB

    MD5

    3bacffc806936ef8a8a9c960b49acc32

    SHA1

    5489a7cd1dafd8ef73e7d79fe14bf2f3abb85205

    SHA256

    f70cef584695bc233c392b39fe252cac5a44158940dc330db98ec9c6426fa5e1

    SHA512

    9d80fe87cdd24641bd33a22609010072b8dd3608b3180ffc82c0179253da04bebebfeefe49b9983ec2be17e82ec3f9637fb2dfc13b2ec250c7747cb68db2d633