Resubmissions
14-06-2024 08:42
240614-kmafxswgpk 1012-06-2024 22:05
240612-1zpz5swcqm 1012-06-2024 21:15
240612-z382ravajl 10Analysis
-
max time kernel
150s -
max time network
154s -
platform
windows7_x64 -
resource
win7-20240611-en -
resource tags
arch:x64arch:x86image:win7-20240611-enlocale:en-usos:windows7-x64system -
submitted
12-06-2024 21:15
Static task
static1
Behavioral task
behavioral1
Sample
a267d7958b57ee1b1cb84b907997c172_JaffaCakes118.dll
Resource
win7-20240611-en
Behavioral task
behavioral2
Sample
a267d7958b57ee1b1cb84b907997c172_JaffaCakes118.dll
Resource
win10v2004-20240611-en
General
-
Target
a267d7958b57ee1b1cb84b907997c172_JaffaCakes118.dll
-
Size
5.0MB
-
MD5
a267d7958b57ee1b1cb84b907997c172
-
SHA1
7ccba7e4234c39b21751e773f2492dc325048ad9
-
SHA256
b88437666813ef3309aa1e80af63a4107b0ffcf828d3f3a6248d137d374e9487
-
SHA512
27f386ecb3b097b7bacbc2472fdc518b6cfd52d03c58fea81051711ade587f4288d0ae684065f7fa6e09c737ee34f9615432531e4c18dd75afdd3c861d6a9a6d
-
SSDEEP
49152:JnjQqMSPbcBVQej/1INRx+TSqTdX1HkQo6SAARdhnvxJM0HY:d8qPoBhz1aRxcSUDk36SAEdhvxWa
Malware Config
Signatures
-
Wannacry
WannaCry is a ransomware cryptoworm.
-
Contacts a large (3155) amount of remote hosts 1 TTPs
This may indicate a network scan to discover remotely running services.
-
Executes dropped EXE 3 IoCs
pid Process 2144 mssecsvc.exe 2996 mssecsvc.exe 2712 tasksche.exe -
Creates a large amount of network flows 1 TTPs
This may indicate a network scan to discover remotely running services.
-
Drops file in System32 directory 1 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\Temporary Internet Files\counters.dat mssecsvc.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\WINDOWS\mssecsvc.exe rundll32.exe File created C:\WINDOWS\tasksche.exe mssecsvc.exe -
Modifies data under HKEY_USERS 1 IoCs
description ioc Process Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings mssecsvc.exe -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 3008 wrote to memory of 3040 3008 rundll32.exe 28 PID 3008 wrote to memory of 3040 3008 rundll32.exe 28 PID 3008 wrote to memory of 3040 3008 rundll32.exe 28 PID 3008 wrote to memory of 3040 3008 rundll32.exe 28 PID 3008 wrote to memory of 3040 3008 rundll32.exe 28 PID 3008 wrote to memory of 3040 3008 rundll32.exe 28 PID 3008 wrote to memory of 3040 3008 rundll32.exe 28 PID 3040 wrote to memory of 2144 3040 rundll32.exe 29 PID 3040 wrote to memory of 2144 3040 rundll32.exe 29 PID 3040 wrote to memory of 2144 3040 rundll32.exe 29 PID 3040 wrote to memory of 2144 3040 rundll32.exe 29
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\a267d7958b57ee1b1cb84b907997c172_JaffaCakes118.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:3008 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\a267d7958b57ee1b1cb84b907997c172_JaffaCakes118.dll,#12⤵
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:3040 -
C:\WINDOWS\mssecsvc.exeC:\WINDOWS\mssecsvc.exe3⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:2144 -
C:\WINDOWS\tasksche.exeC:\WINDOWS\tasksche.exe /i4⤵
- Executes dropped EXE
PID:2712
-
-
-
-
C:\WINDOWS\mssecsvc.exeC:\WINDOWS\mssecsvc.exe -m security1⤵
- Executes dropped EXE
- Drops file in System32 directory
- Modifies data under HKEY_USERS
PID:2996
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3.6MB
MD5a92d2bd3ef824f719a1d7888613f8d99
SHA10207602cc17e660aa396ace208b4f5a1cfcf4ac1
SHA25628eee3558a332fcda557b279f49fa7d8691cd3db728fbb925b2c845b4711db1f
SHA512edf6a2099eb518ffdcdaf06e7c76e71b78faeb2feb3fe99c687ba723f1c3a51ea9377b2430dd89f210f18f3a605a3ca75773012f7e3341326d8dc7f181d7c99a
-
Filesize
3.4MB
MD5924f4b9cd7172359495f38f678f4a2a9
SHA1d1c18d2c67c08c2ace72d62454b1df97e064d813
SHA256e99bc8bf46e522afff858ec0ade4310b14bf8874a984953510e1455976ec0d3a
SHA512dfcf914772645210e03347f3b04aaffc09c9af345420e6d1038572b4ee062c17a8b054daaf416e2b92dfa5c0b9a599ced967d291a2a8b243cdd13c2e7b2dc681