Analysis

  • max time kernel
    150s
  • max time network
    150s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    03-06-2024 13:18

General

  • Target

    91ecf5beae030804c75c8dc485de5065_JaffaCakes118.dll

  • Size

    5.0MB

  • MD5

    91ecf5beae030804c75c8dc485de5065

  • SHA1

    c83f093fb16282d9ce931187215e191dd147ead7

  • SHA256

    f6eaf849d6c474c5db695fa04bce7d4393771f3ae0a1862ada36ce7790395f67

  • SHA512

    4a38b5f2d8680dc88159241c0a1fb5c59df5eaab8b6fd482ea9cb45f9ae335fc85b25d539e409fd2e8b1cfa6bc96a1dc06cde87ef2b6652ca715bc9ccaa3f8f4

  • SSDEEP

    49152:RnsEMSPbcBVQejXx+TSqTdX1HkQo6SAARdhnv:1fPoBhDxcSUDk36SAEdhv

Malware Config

Signatures

  • Wannacry

    WannaCry is a ransomware cryptoworm.

  • Contacts a large (3169) amount of remote hosts 1 TTPs

    This may indicate a network scan to discover remotely running services.

  • Executes dropped EXE 2 IoCs
  • Creates a large amount of network flows 1 TTPs

    This may indicate a network scan to discover remotely running services.

  • Drops file in System32 directory 5 IoCs
  • Drops file in Windows directory 2 IoCs
  • Modifies data under HKEY_USERS 24 IoCs
  • Suspicious use of WriteProcessMemory 11 IoCs

Processes

  • C:\Windows\system32\rundll32.exe
    rundll32.exe C:\Users\Admin\AppData\Local\Temp\91ecf5beae030804c75c8dc485de5065_JaffaCakes118.dll,#1
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2808
    • C:\Windows\SysWOW64\rundll32.exe
      rundll32.exe C:\Users\Admin\AppData\Local\Temp\91ecf5beae030804c75c8dc485de5065_JaffaCakes118.dll,#1
      2⤵
      • Drops file in Windows directory
      • Suspicious use of WriteProcessMemory
      PID:3048
      • C:\WINDOWS\mssecsvr.exe
        C:\WINDOWS\mssecsvr.exe
        3⤵
        • Executes dropped EXE
        • Drops file in Windows directory
        PID:2520
  • C:\WINDOWS\mssecsvr.exe
    C:\WINDOWS\mssecsvr.exe -m security
    1⤵
    • Executes dropped EXE
    • Drops file in System32 directory
    • Modifies data under HKEY_USERS
    PID:2648

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Windows\mssecsvr.exe
    Filesize

    2.2MB

    MD5

    94538b9192b982c496686e20435a7399

    SHA1

    39957f0668b03aadf84cb52926a519b817174e74

    SHA256

    2e23030193830b490ca5af4f030a5ea8c227162c1e5a5a22c6ebe198a78d647f

    SHA512

    988d223361cea485b872c4599fb51437bba9d6fbebd14ce156daf2d9ebfa5596c299165168398e118bdd0a5620913c0fa7173d13b487644d805d1cfd8ccedc22