Analysis

  • max time kernel
    150s
  • max time network
    155s
  • platform
    windows7_x64
  • resource
    win7-20240611-en
  • resource tags

    arch:x64arch:x86image:win7-20240611-enlocale:en-usos:windows7-x64system
  • submitted
    13-06-2024 21:48

General

  • Target

    a6bb8f21546c00b09a06e3401f3ee8e7_JaffaCakes118.dll

  • Size

    5.0MB

  • MD5

    a6bb8f21546c00b09a06e3401f3ee8e7

  • SHA1

    f12cb293494c713cd4224e2bf1db3b968288a20e

  • SHA256

    671f4737d788a6a7b5fb7b2c04fd9e69473d8de8b9e1a2f2b2eeb75322cdfb57

  • SHA512

    07bd5f4aa30c3d9ff45320626024a126742561ba630b2d2c69732acf1b5dbfc075f9baa643fc0bec15ccee28df0f5cc8e54f319dfcb741665b7fdcee94cf9b2e

  • SSDEEP

    98304:+DqPoBhz1aRxcSUDk36SAEdhvxWa9P593R8:+DqPe1Cxcxk3ZAEUadzR8

Malware Config

Signatures

  • Wannacry

    WannaCry is a ransomware cryptoworm.

  • Contacts a large (3166) amount of remote hosts 1 TTPs

    This may indicate a network scan to discover remotely running services.

  • Executes dropped EXE 3 IoCs
  • Creates a large amount of network flows 1 TTPs

    This may indicate a network scan to discover remotely running services.

  • Drops file in System32 directory 1 IoCs
  • Drops file in Windows directory 2 IoCs
  • Modifies data under HKEY_USERS 24 IoCs
  • Suspicious use of WriteProcessMemory 11 IoCs

Processes

  • C:\Windows\system32\rundll32.exe
    rundll32.exe C:\Users\Admin\AppData\Local\Temp\a6bb8f21546c00b09a06e3401f3ee8e7_JaffaCakes118.dll,#1
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2176
    • C:\Windows\SysWOW64\rundll32.exe
      rundll32.exe C:\Users\Admin\AppData\Local\Temp\a6bb8f21546c00b09a06e3401f3ee8e7_JaffaCakes118.dll,#1
      2⤵
      • Drops file in Windows directory
      • Suspicious use of WriteProcessMemory
      PID:2204
      • C:\WINDOWS\mssecsvc.exe
        C:\WINDOWS\mssecsvc.exe
        3⤵
        • Executes dropped EXE
        • Drops file in Windows directory
        PID:1700
        • C:\WINDOWS\tasksche.exe
          C:\WINDOWS\tasksche.exe /i
          4⤵
          • Executes dropped EXE
          PID:2728
  • C:\WINDOWS\mssecsvc.exe
    C:\WINDOWS\mssecsvc.exe -m security
    1⤵
    • Executes dropped EXE
    • Drops file in System32 directory
    • Modifies data under HKEY_USERS
    PID:2620

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Windows\mssecsvc.exe

    Filesize

    3.6MB

    MD5

    64db244c8798dca9f01eb9bf2af3d270

    SHA1

    ce2b6de66cf42ee926812dd5efbc9dd6ffdf39fa

    SHA256

    e516678b8a98552bdb62532737a087b7e92674358d9a0aa1d9d2e853ddc8879a

    SHA512

    138d9f46e844e162d4419ba75e7ebb5958c3e2e6175c2ffd33f8b094ce8816d223f8979f82952fb26b2981e10031d77a81567a9687a335500a90d400e3972a26

  • C:\Windows\tasksche.exe

    Filesize

    3.4MB

    MD5

    70e3273a2cf7fa7da9831d3f9966b6d5

    SHA1

    46f15d6844d44571ddc32d14a1cd0b60e1c28a5c

    SHA256

    efc32ad7e0d5f9d866ff78689bdea877ca1746a756deb470c6d3258b64237a2b

    SHA512

    0de9f16e33d397b6a1809eed33c7dce3fb9098864bdff765c6278bd1456bc9f3eb6bd47684626f93357567c145f67c2981f8e99f73e0a8cb1caea4a4ca8d5979