Analysis

  • max time kernel
    150s
  • max time network
    154s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    11/06/2024, 14:04

General

  • Target

    9e71667941dc67fdb007640d260e7134_JaffaCakes118.dll

  • Size

    5.0MB

  • MD5

    9e71667941dc67fdb007640d260e7134

  • SHA1

    8abe2e60a783ea0c2f9fc93156d84d1bb773f172

  • SHA256

    390040ae08517ccd933bd860f7cf1979f9644564c4611f7302c564e2e6858283

  • SHA512

    485ec28ae417e062f559205d5165612d3a0a876be02f3d38dc6a4b9d274761aa78ca0c804027777e46936c34aa72d36f00329e33d224961284174e8bf04e2fe6

  • SSDEEP

    98304:+DqPoBhz1aRxcSUDk36SAEdhvxWa9P593R8yAVp2:+DqPe1Cxcxk3ZAEUadzR8yc4

Malware Config

Signatures

  • Wannacry

    WannaCry is a ransomware cryptoworm.

  • Contacts a large (3186) amount of remote hosts 1 TTPs

    This may indicate a network scan to discover remotely running services.

  • Executes dropped EXE 3 IoCs
  • Creates a large amount of network flows 1 TTPs

    This may indicate a network scan to discover remotely running services.

  • Drops file in System32 directory 1 IoCs
  • Drops file in Windows directory 2 IoCs
  • Modifies data under HKEY_USERS 24 IoCs
  • Suspicious use of WriteProcessMemory 11 IoCs

Processes

  • C:\Windows\system32\rundll32.exe
    rundll32.exe C:\Users\Admin\AppData\Local\Temp\9e71667941dc67fdb007640d260e7134_JaffaCakes118.dll,#1
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:3036
    • C:\Windows\SysWOW64\rundll32.exe
      rundll32.exe C:\Users\Admin\AppData\Local\Temp\9e71667941dc67fdb007640d260e7134_JaffaCakes118.dll,#1
      2⤵
      • Drops file in Windows directory
      • Suspicious use of WriteProcessMemory
      PID:2956
      • C:\WINDOWS\mssecsvc.exe
        C:\WINDOWS\mssecsvc.exe
        3⤵
        • Executes dropped EXE
        • Drops file in Windows directory
        PID:2504
        • C:\WINDOWS\tasksche.exe
          C:\WINDOWS\tasksche.exe /i
          4⤵
          • Executes dropped EXE
          PID:2696
  • C:\WINDOWS\mssecsvc.exe
    C:\WINDOWS\mssecsvc.exe -m security
    1⤵
    • Executes dropped EXE
    • Drops file in System32 directory
    • Modifies data under HKEY_USERS
    PID:2568

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Windows\mssecsvc.exe

          Filesize

          3.6MB

          MD5

          69d5505a4d6bee64a4096083ff61c183

          SHA1

          9cf13e7da02aece3e0a570c1af4e60e4a72adf9b

          SHA256

          78bebebd5515a605aff72fe35643c7b87a860d201ce60eb3afc4fa54bfda66c8

          SHA512

          f00759efa5a0526070a2e5f9f966b3e69fe846178c159c045fc7263ed117db7e9f163bd5feac2fc7c55ad2ca19565c880b0b984f61c634100cf8765bb163d532

        • C:\Windows\tasksche.exe

          Filesize

          3.4MB

          MD5

          64eaa3d56d8ee294217d2c99a4e38fd4

          SHA1

          e02134a02366d4f680394b02ac19e6439645eada

          SHA256

          0f3cc1aafceca64e371e21d436a729c22c56b1e1f1b304499a66fc7255b2c2da

          SHA512

          047aec4af934ca4ef6567b77283f90faeff467cda32ce709553bd1a95c6989aa86233dc5d4d613d187e9819fe511dfd79f7a6c80190c346757f696f9c2627fac