Analysis

  • max time kernel
    150s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240508-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system
  • submitted
    11-06-2024 16:11

General

  • Target

    9ec3170c7181621e1f861af2a4ecda6b_JaffaCakes118.dll

  • Size

    5.0MB

  • MD5

    9ec3170c7181621e1f861af2a4ecda6b

  • SHA1

    17b2d2e917700590c8d6d935a911e4a1cb20e500

  • SHA256

    6ae6c7e5c248bf15f16f50200591b49fee5a967ee6923a7a070c487edef7ce36

  • SHA512

    e9811e4245a93b6f33b7c2a51554febcfd9c048c5def7cdef428ab5f283464544f327622a835410206d6b7bd2a479a6865081684f44c9de946afd0020fd4eadf

  • SSDEEP

    98304:+DqPoBhz1/RxcSUDk36SAEdhvxWa9P593R8yAVp2H:+DqPe1pxcxk3ZAEUadzR8yc4H

Malware Config

Signatures

  • Wannacry

    WannaCry is a ransomware cryptoworm.

  • Contacts a large (2686) amount of remote hosts 1 TTPs

    This may indicate a network scan to discover remotely running services.

  • Executes dropped EXE 3 IoCs
  • Creates a large amount of network flows 1 TTPs

    This may indicate a network scan to discover remotely running services.

  • Drops file in Windows directory 2 IoCs
  • Modifies data under HKEY_USERS 5 IoCs
  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Windows\system32\rundll32.exe
    rundll32.exe C:\Users\Admin\AppData\Local\Temp\9ec3170c7181621e1f861af2a4ecda6b_JaffaCakes118.dll,#1
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:4060
    • C:\Windows\SysWOW64\rundll32.exe
      rundll32.exe C:\Users\Admin\AppData\Local\Temp\9ec3170c7181621e1f861af2a4ecda6b_JaffaCakes118.dll,#1
      2⤵
      • Drops file in Windows directory
      • Suspicious use of WriteProcessMemory
      PID:4740
      • C:\WINDOWS\mssecsvc.exe
        C:\WINDOWS\mssecsvc.exe
        3⤵
        • Executes dropped EXE
        • Drops file in Windows directory
        PID:2232
        • C:\WINDOWS\tasksche.exe
          C:\WINDOWS\tasksche.exe /i
          4⤵
          • Executes dropped EXE
          PID:2616
  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --field-trial-handle=4252,i,7012731823941922179,12386606396608877869,262144 --variations-seed-version --mojo-platform-channel-handle=4248 /prefetch:8
    1⤵
      PID:4036
    • C:\WINDOWS\mssecsvc.exe
      C:\WINDOWS\mssecsvc.exe -m security
      1⤵
      • Executes dropped EXE
      • Modifies data under HKEY_USERS
      PID:2100

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Windows\mssecsvc.exe

      Filesize

      3.6MB

      MD5

      35ecbdb339259c32061e266b21044e46

      SHA1

      76cf2b8db383c21a4d75831fcbeb4f8117c5b117

      SHA256

      eee04d5e53f7e656af273c1e67ec59fd17bf8f6a4826f53683f803e6347d13bb

      SHA512

      23540df035bb101d50a0cf1de4ac2875e9cbaaf9ab18ce2a4af6f7c94e13d9a94af6503620c87bfe6283da9e86c0b19e0fb378ccb8fd4785e707938721fe209f

    • C:\Windows\tasksche.exe

      Filesize

      3.4MB

      MD5

      824625f642157acd1ec61065a88dcbb8

      SHA1

      98c8c4af6e320ad58b59a062819eed61e87eb1f1

      SHA256

      bbccf5138be62684e4fba25f68beb39767a95ef7def084ee67e8baeae5c3423a

      SHA512

      e5c646ba68d6e5efd8d03b1aca2f5bdd6cd6ac33b48765a222c584b596a9320bba56b5ebbec827fcde4f97e8bcab12202f1cd472111e0bbc5173b5dd926bf6ba