Analysis

  • max time kernel
    150s
  • max time network
    150s
  • platform
    windows7_x64
  • resource
    win7-20240220-en
  • resource tags

    arch:x64arch:x86image:win7-20240220-enlocale:en-usos:windows7-x64system
  • submitted
    01-06-2024 14:23

General

  • Target

    8ab9de65ac04fddfd3425fd2903cd975_JaffaCakes118.dll

  • Size

    5.0MB

  • MD5

    8ab9de65ac04fddfd3425fd2903cd975

  • SHA1

    fd5329e59a23abff85b8b47e9a73d5f64209d92c

  • SHA256

    f311c50591e8685fc12a666f7fc43b08271f0af75013ede94a81d555d1f1fc7e

  • SHA512

    6f51ba3c9dc60da349c2853d983b4f8e4806caa49126966b4c1baf890239936c7fded00803f0e7908df92f1ec6f30ba64a41e8298c7ffbbb2fccc605ffcce271

  • SSDEEP

    98304:+DqPoBhz1aRxcSUDk36SAEdhvxWa9P593R8yAVp2:+DqPe1Cxcxk3ZAEUadzR8yc4

Malware Config

Signatures

  • Wannacry

    WannaCry is a ransomware cryptoworm.

  • Contacts a large (3194) amount of remote hosts 1 TTPs

    This may indicate a network scan to discover remotely running services.

  • Executes dropped EXE 3 IoCs
  • Creates a large amount of network flows 1 TTPs

    This may indicate a network scan to discover remotely running services.

  • Drops file in System32 directory 1 IoCs
  • Drops file in Windows directory 2 IoCs
  • Modifies data under HKEY_USERS 24 IoCs
  • Suspicious use of WriteProcessMemory 11 IoCs

Processes

  • C:\Windows\system32\rundll32.exe
    rundll32.exe C:\Users\Admin\AppData\Local\Temp\8ab9de65ac04fddfd3425fd2903cd975_JaffaCakes118.dll,#1
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2244
    • C:\Windows\SysWOW64\rundll32.exe
      rundll32.exe C:\Users\Admin\AppData\Local\Temp\8ab9de65ac04fddfd3425fd2903cd975_JaffaCakes118.dll,#1
      2⤵
      • Drops file in Windows directory
      • Suspicious use of WriteProcessMemory
      PID:2776
      • C:\WINDOWS\mssecsvc.exe
        C:\WINDOWS\mssecsvc.exe
        3⤵
        • Executes dropped EXE
        • Drops file in Windows directory
        PID:2172
        • C:\WINDOWS\tasksche.exe
          C:\WINDOWS\tasksche.exe /i
          4⤵
          • Executes dropped EXE
          PID:2540
  • C:\WINDOWS\mssecsvc.exe
    C:\WINDOWS\mssecsvc.exe -m security
    1⤵
    • Executes dropped EXE
    • Drops file in System32 directory
    • Modifies data under HKEY_USERS
    PID:2596

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Windows\mssecsvc.exe
    Filesize

    3.6MB

    MD5

    1e7906c4115e025a60a984cb90554751

    SHA1

    3e6702ba7a6b0977619723fe35e3f689cd7c3fe8

    SHA256

    e061d310bbe7fa3535f1fdabd400fafe2ecde8a5c8054568b60c8b3455f9ab05

    SHA512

    7327637924528425474ab7855a261d0c47e3bbf804bc5cc48e1fd2fd5b02bd850070c61886b89497a4e2a51061c42e044a3398b0136167688af590dcf4221782

  • C:\Windows\tasksche.exe
    Filesize

    3.4MB

    MD5

    43e0dd1563eeebb59f9a9c58b3df7cb6

    SHA1

    37d2bbbc6300c4e0e271b7b9d1b5df4d41b4edcb

    SHA256

    c1ae7d768902297d3f0d8413a7c5af68e68b14db549f0760dae2dfffcbd90bfd

    SHA512

    d5110aa6879bb20841d584932bce7f6baa34a7e3bca358877e26a561f5db42a6e70a75e33a7481d4220319deabd0c186fea850d21970c0f70fb034b328b67926