Resubmissions

14-06-2024 08:42

240614-kmafxswgpk 10

12-06-2024 22:05

240612-1zpz5swcqm 10

12-06-2024 21:15

240612-z382ravajl 10

Analysis

  • max time kernel
    150s
  • max time network
    154s
  • platform
    windows7_x64
  • resource
    win7-20240611-en
  • resource tags

    arch:x64arch:x86image:win7-20240611-enlocale:en-usos:windows7-x64system
  • submitted
    12-06-2024 21:15

General

  • Target

    a267d7958b57ee1b1cb84b907997c172_JaffaCakes118.dll

  • Size

    5.0MB

  • MD5

    a267d7958b57ee1b1cb84b907997c172

  • SHA1

    7ccba7e4234c39b21751e773f2492dc325048ad9

  • SHA256

    b88437666813ef3309aa1e80af63a4107b0ffcf828d3f3a6248d137d374e9487

  • SHA512

    27f386ecb3b097b7bacbc2472fdc518b6cfd52d03c58fea81051711ade587f4288d0ae684065f7fa6e09c737ee34f9615432531e4c18dd75afdd3c861d6a9a6d

  • SSDEEP

    49152:JnjQqMSPbcBVQej/1INRx+TSqTdX1HkQo6SAARdhnvxJM0HY:d8qPoBhz1aRxcSUDk36SAEdhvxWa

Malware Config

Signatures

  • Wannacry

    WannaCry is a ransomware cryptoworm.

  • Contacts a large (3155) amount of remote hosts 1 TTPs

    This may indicate a network scan to discover remotely running services.

  • Executes dropped EXE 3 IoCs
  • Creates a large amount of network flows 1 TTPs

    This may indicate a network scan to discover remotely running services.

  • Drops file in System32 directory 1 IoCs
  • Drops file in Windows directory 2 IoCs
  • Modifies data under HKEY_USERS 1 IoCs
  • Suspicious use of WriteProcessMemory 11 IoCs

Processes

  • C:\Windows\system32\rundll32.exe
    rundll32.exe C:\Users\Admin\AppData\Local\Temp\a267d7958b57ee1b1cb84b907997c172_JaffaCakes118.dll,#1
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:3008
    • C:\Windows\SysWOW64\rundll32.exe
      rundll32.exe C:\Users\Admin\AppData\Local\Temp\a267d7958b57ee1b1cb84b907997c172_JaffaCakes118.dll,#1
      2⤵
      • Drops file in Windows directory
      • Suspicious use of WriteProcessMemory
      PID:3040
      • C:\WINDOWS\mssecsvc.exe
        C:\WINDOWS\mssecsvc.exe
        3⤵
        • Executes dropped EXE
        • Drops file in Windows directory
        PID:2144
        • C:\WINDOWS\tasksche.exe
          C:\WINDOWS\tasksche.exe /i
          4⤵
          • Executes dropped EXE
          PID:2712
  • C:\WINDOWS\mssecsvc.exe
    C:\WINDOWS\mssecsvc.exe -m security
    1⤵
    • Executes dropped EXE
    • Drops file in System32 directory
    • Modifies data under HKEY_USERS
    PID:2996

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Windows\mssecsvc.exe

    Filesize

    3.6MB

    MD5

    a92d2bd3ef824f719a1d7888613f8d99

    SHA1

    0207602cc17e660aa396ace208b4f5a1cfcf4ac1

    SHA256

    28eee3558a332fcda557b279f49fa7d8691cd3db728fbb925b2c845b4711db1f

    SHA512

    edf6a2099eb518ffdcdaf06e7c76e71b78faeb2feb3fe99c687ba723f1c3a51ea9377b2430dd89f210f18f3a605a3ca75773012f7e3341326d8dc7f181d7c99a

  • C:\Windows\tasksche.exe

    Filesize

    3.4MB

    MD5

    924f4b9cd7172359495f38f678f4a2a9

    SHA1

    d1c18d2c67c08c2ace72d62454b1df97e064d813

    SHA256

    e99bc8bf46e522afff858ec0ade4310b14bf8874a984953510e1455976ec0d3a

    SHA512

    dfcf914772645210e03347f3b04aaffc09c9af345420e6d1038572b4ee062c17a8b054daaf416e2b92dfa5c0b9a599ced967d291a2a8b243cdd13c2e7b2dc681