Analysis

  • max time kernel
    150s
  • max time network
    150s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    31-05-2024 17:14

General

  • Target

    87bf83017d7b2f34594792febc376508_JaffaCakes118.dll

  • Size

    5.0MB

  • MD5

    87bf83017d7b2f34594792febc376508

  • SHA1

    604b87adbe90e17247da99159c2b2b803e19799f

  • SHA256

    4e9736ddc5e3c3d5a75f65cb0f0c3e9fc545c69042d8791a52c7e7fc353d3a38

  • SHA512

    6f4493ea82ad786f2680119c096ec6345c77a62e6582fdb901fb5c73e4cef20f589146daf3d2a726d346ae7001cd5467b3351af107829d04bf625f372eacdc97

  • SSDEEP

    98304:TDqPoBhz1aRxcSUDk36SAEdhvxWa9VR8yAVp2H:TDqPe1Cxcxk3ZAEUaLR8yc4H

Malware Config

Signatures

  • Wannacry

    WannaCry is a ransomware cryptoworm.

  • Contacts a large (3096) amount of remote hosts 1 TTPs

    This may indicate a network scan to discover remotely running services.

  • Executes dropped EXE 3 IoCs
  • Creates a large amount of network flows 1 TTPs

    This may indicate a network scan to discover remotely running services.

  • Drops file in System32 directory 1 IoCs
  • Drops file in Windows directory 2 IoCs
  • Modifies data under HKEY_USERS 24 IoCs
  • Suspicious use of WriteProcessMemory 11 IoCs

Processes

  • C:\Windows\system32\rundll32.exe
    rundll32.exe C:\Users\Admin\AppData\Local\Temp\87bf83017d7b2f34594792febc376508_JaffaCakes118.dll,#1
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2256
    • C:\Windows\SysWOW64\rundll32.exe
      rundll32.exe C:\Users\Admin\AppData\Local\Temp\87bf83017d7b2f34594792febc376508_JaffaCakes118.dll,#1
      2⤵
      • Drops file in Windows directory
      • Suspicious use of WriteProcessMemory
      PID:2120
      • C:\WINDOWS\mssecsvc.exe
        C:\WINDOWS\mssecsvc.exe
        3⤵
        • Executes dropped EXE
        • Drops file in Windows directory
        PID:2944
        • C:\WINDOWS\tasksche.exe
          C:\WINDOWS\tasksche.exe /i
          4⤵
          • Executes dropped EXE
          PID:2568
  • C:\WINDOWS\mssecsvc.exe
    C:\WINDOWS\mssecsvc.exe -m security
    1⤵
    • Executes dropped EXE
    • Drops file in System32 directory
    • Modifies data under HKEY_USERS
    PID:2612

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Windows\mssecsvc.exe
    Filesize

    3.6MB

    MD5

    9719213a71970894d2a15fc00461dc91

    SHA1

    bd8f32d2163221f0aba18a87a332718d2969efee

    SHA256

    27998aaaa5b9c8a7845ec6b9dbcd18a3c6ee56b96c6fea2e1dc86a1ffa394eaf

    SHA512

    861409c412fd041c897a709186e6b4d8a9a0fc2113cae716f744e113cfaab34d45791134b04835a810e338c65620fe2d492e3ae40f18cd3ee64f6d51e28b83e4

  • C:\Windows\tasksche.exe
    Filesize

    3.4MB

    MD5

    f20ba14052ac4c88fe6ab5239b6788b8

    SHA1

    a20f8f628a79f13256b1e8eee4ec1a37bbc19a4f

    SHA256

    73c69cd3e333a7b6028d7ba66c48811bbba85139987d19991ea730b60c928423

    SHA512

    53514becdd2b8f9d99154f360ef41d2dac8c9847c3d30fe053675feca181489bde2b0352b67db0c8eab810cbafeec4d00164e29101ab5d7790c461d95ec5061d