Analysis

  • max time kernel
    150s
  • max time network
    150s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    01-06-2024 04:00

General

  • Target

    894db8bbeec08bdcacb8ddaa21feebed_JaffaCakes118.dll

  • Size

    5.0MB

  • MD5

    894db8bbeec08bdcacb8ddaa21feebed

  • SHA1

    50b593a42ea69ed53dcb8daaab54906365c4b01b

  • SHA256

    abc192687665e185a0a3c52fb0f7c8709e037f2ee706fd33491077551cc1442c

  • SHA512

    5e2272b4a8ea8a84eba5aa1443aa8e56c5a871255fc52c59296cfff76c42aac74e9f31860d8fcd448dfe0356eb52c4a4590d246f23b25782e7107febf4a21fb4

  • SSDEEP

    98304:+DqPoBhz1aRxcSUDk36SAEdhvxWa9P59:+DqPe1Cxcxk3ZAEUad

Malware Config

Signatures

  • Wannacry

    WannaCry is a ransomware cryptoworm.

  • Contacts a large (3155) amount of remote hosts 1 TTPs

    This may indicate a network scan to discover remotely running services.

  • Executes dropped EXE 3 IoCs
  • Creates a large amount of network flows 1 TTPs

    This may indicate a network scan to discover remotely running services.

  • Drops file in System32 directory 1 IoCs
  • Drops file in Windows directory 2 IoCs
  • Modifies data under HKEY_USERS 24 IoCs
  • Suspicious use of WriteProcessMemory 11 IoCs

Processes

  • C:\Windows\system32\rundll32.exe
    rundll32.exe C:\Users\Admin\AppData\Local\Temp\894db8bbeec08bdcacb8ddaa21feebed_JaffaCakes118.dll,#1
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2272
    • C:\Windows\SysWOW64\rundll32.exe
      rundll32.exe C:\Users\Admin\AppData\Local\Temp\894db8bbeec08bdcacb8ddaa21feebed_JaffaCakes118.dll,#1
      2⤵
      • Drops file in Windows directory
      • Suspicious use of WriteProcessMemory
      PID:2060
      • C:\WINDOWS\mssecsvc.exe
        C:\WINDOWS\mssecsvc.exe
        3⤵
        • Executes dropped EXE
        • Drops file in Windows directory
        PID:2592
        • C:\WINDOWS\tasksche.exe
          C:\WINDOWS\tasksche.exe /i
          4⤵
          • Executes dropped EXE
          PID:2416
  • C:\WINDOWS\mssecsvc.exe
    C:\WINDOWS\mssecsvc.exe -m security
    1⤵
    • Executes dropped EXE
    • Drops file in System32 directory
    • Modifies data under HKEY_USERS
    PID:2612

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Windows\mssecsvc.exe
    Filesize

    3.6MB

    MD5

    5821d7401d6a9708e931130ab0711a51

    SHA1

    ef2c2eb28a6368fd136cd729fca0026163d1084c

    SHA256

    8f3494424b80ff468177cea2320256efd95f128d77f1b42a21681eb5c46f4d5f

    SHA512

    c509f1bf8d298b83c1da80aeb4dd8f4d98456e242ef07ea31800076d3a76fa8d9caa2e1cd3dcdf1e26d70113929dbab9e7ccd38edfba484f075f6d13f93c993e

  • C:\Windows\tasksche.exe
    Filesize

    3.4MB

    MD5

    0749681311c27dcae1f71a8d203d438a

    SHA1

    30ba4b8d7abc3dee3f27d086b2e67e4adaf2118c

    SHA256

    66ad4a0f88bbe7cdafe0fe23d08028795b9196af77ae0c52ec1aa60db362fc54

    SHA512

    49613836c9beb89f896a228f2f9cba947fbcea34bb486b2e9c07c3b37db4bb85c1bb9c4398e4e47efbffb68cbd427772a2b746ce38c96e308d307ef14a4991a7