Analysis

  • max time kernel
    151s
  • max time network
    160s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240226-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system
  • submitted
    03-06-2024 13:18

General

  • Target

    91ecf5beae030804c75c8dc485de5065_JaffaCakes118.dll

  • Size

    5.0MB

  • MD5

    91ecf5beae030804c75c8dc485de5065

  • SHA1

    c83f093fb16282d9ce931187215e191dd147ead7

  • SHA256

    f6eaf849d6c474c5db695fa04bce7d4393771f3ae0a1862ada36ce7790395f67

  • SHA512

    4a38b5f2d8680dc88159241c0a1fb5c59df5eaab8b6fd482ea9cb45f9ae335fc85b25d539e409fd2e8b1cfa6bc96a1dc06cde87ef2b6652ca715bc9ccaa3f8f4

  • SSDEEP

    49152:RnsEMSPbcBVQejXx+TSqTdX1HkQo6SAARdhnv:1fPoBhDxcSUDk36SAEdhv

Malware Config

Signatures

  • Wannacry

    WannaCry is a ransomware cryptoworm.

  • Contacts a large (2807) amount of remote hosts 1 TTPs

    This may indicate a network scan to discover remotely running services.

  • Executes dropped EXE 2 IoCs
  • Creates a large amount of network flows 1 TTPs

    This may indicate a network scan to discover remotely running services.

  • Drops file in System32 directory 4 IoCs
  • Drops file in Windows directory 2 IoCs
  • Modifies data under HKEY_USERS 15 IoCs
  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Windows\system32\rundll32.exe
    rundll32.exe C:\Users\Admin\AppData\Local\Temp\91ecf5beae030804c75c8dc485de5065_JaffaCakes118.dll,#1
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:4296
    • C:\Windows\SysWOW64\rundll32.exe
      rundll32.exe C:\Users\Admin\AppData\Local\Temp\91ecf5beae030804c75c8dc485de5065_JaffaCakes118.dll,#1
      2⤵
      • Drops file in Windows directory
      • Suspicious use of WriteProcessMemory
      PID:1340
      • C:\WINDOWS\mssecsvr.exe
        C:\WINDOWS\mssecsvr.exe
        3⤵
        • Executes dropped EXE
        • Drops file in Windows directory
        PID:3100
  • C:\WINDOWS\mssecsvr.exe
    C:\WINDOWS\mssecsvr.exe -m security
    1⤵
    • Executes dropped EXE
    • Drops file in System32 directory
    • Modifies data under HKEY_USERS
    PID:4720
  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=4136 --field-trial-handle=2744,i,16362475727591565961,3676688664819797550,262144 --variations-seed-version /prefetch:8
    1⤵
      PID:5008

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Windows\mssecsvr.exe
      Filesize

      2.2MB

      MD5

      94538b9192b982c496686e20435a7399

      SHA1

      39957f0668b03aadf84cb52926a519b817174e74

      SHA256

      2e23030193830b490ca5af4f030a5ea8c227162c1e5a5a22c6ebe198a78d647f

      SHA512

      988d223361cea485b872c4599fb51437bba9d6fbebd14ce156daf2d9ebfa5596c299165168398e118bdd0a5620913c0fa7173d13b487644d805d1cfd8ccedc22