Analysis

  • max time kernel
    150s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240426-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system
  • submitted
    05-06-2024 00:38

General

  • Target

    96c927e42636d10e5a2ee217e833bb19_JaffaCakes118.dll

  • Size

    5.0MB

  • MD5

    96c927e42636d10e5a2ee217e833bb19

  • SHA1

    db390da6e675e11aa995fa87112d61239a80ca8a

  • SHA256

    0ff6948dd36eb324ccc264f122d728f92814dccfb734b555cde28f9a63217c11

  • SHA512

    813d5e9df5e6d9ca24ac422a587e0ba751da4d3ef238fc22fe628927be5df972d518f7ab0429681aab644a1100fc252b34df23014d6697125e40d4de01dd3f23

  • SSDEEP

    98304:+DqPoBhz1aRxcSUDk36SAEdhvxWa9P5N3R8yAVp2H:+DqPe1Cxcxk3ZAEUadrR8yc4H

Malware Config

Signatures

  • Wannacry

    WannaCry is a ransomware cryptoworm.

  • Contacts a large (3167) amount of remote hosts 1 TTPs

    This may indicate a network scan to discover remotely running services.

  • Executes dropped EXE 3 IoCs
  • Creates a large amount of network flows 1 TTPs

    This may indicate a network scan to discover remotely running services.

  • Drops file in Windows directory 2 IoCs
  • Modifies data under HKEY_USERS 5 IoCs
  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Windows\system32\rundll32.exe
    rundll32.exe C:\Users\Admin\AppData\Local\Temp\96c927e42636d10e5a2ee217e833bb19_JaffaCakes118.dll,#1
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:3892
    • C:\Windows\SysWOW64\rundll32.exe
      rundll32.exe C:\Users\Admin\AppData\Local\Temp\96c927e42636d10e5a2ee217e833bb19_JaffaCakes118.dll,#1
      2⤵
      • Drops file in Windows directory
      • Suspicious use of WriteProcessMemory
      PID:3216
      • C:\WINDOWS\mssecsvc.exe
        C:\WINDOWS\mssecsvc.exe
        3⤵
        • Executes dropped EXE
        • Drops file in Windows directory
        PID:2660
        • C:\WINDOWS\tasksche.exe
          C:\WINDOWS\tasksche.exe /i
          4⤵
          • Executes dropped EXE
          PID:5112
  • C:\WINDOWS\mssecsvc.exe
    C:\WINDOWS\mssecsvc.exe -m security
    1⤵
    • Executes dropped EXE
    • Modifies data under HKEY_USERS
    PID:348

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Windows\mssecsvc.exe

    Filesize

    3.6MB

    MD5

    f45ea5d81267a5ffe25e128d0ade57c9

    SHA1

    82046dec901ab7cf8442797384e2c1808050d0f4

    SHA256

    ad222892c719fcdddc7ad0b3178305b084ad52737a4496baebc7d92d2df6e6e3

    SHA512

    b2cc7fca36b76e19481bbf0b6777598d1c9d34ebdc2090a011ce30353299d2f98b15428cffd7d3bd6d44cba79fb8fa30e4f65114507f49d338ed9f6c5f036bca

  • C:\Windows\tasksche.exe

    Filesize

    3.4MB

    MD5

    9e8d5f659c435f7a525008d1b5b133f0

    SHA1

    02380c2c5f1342e0c183960513801f3d4acd2d75

    SHA256

    b4324573ee7af3df8b20fb287839e785353fbc1ed7368dd6e38cb9e35e2fc052

    SHA512

    b4f78e8a208da8f0cffeaae4d6008dd6fad32acce866e0d27de7a0a18a2b60f2dc725b88f376cc8835ae9453d11927340b9a9d99f58a70cde6dbb133a8190829