Analysis

  • max time kernel
    150s
  • max time network
    150s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    14-06-2024 14:58

General

  • Target

    aa4bd04759c4c86d3a37456a4c0d1aae_JaffaCakes118.dll

  • Size

    5.0MB

  • MD5

    aa4bd04759c4c86d3a37456a4c0d1aae

  • SHA1

    0abb832130a314a9b17c6275dda8e02d254a9456

  • SHA256

    b69d82198abee2589bc919442b55e7598eb741d1b996020ce201433c49603e17

  • SHA512

    8134065407787073681906390da10c5b45aa8afd4839888583de4b45fff4a19ec9dc1b1f72d0b1683d1f4089f52272a5ceb14333cc6703a6cc80c18785737cfc

  • SSDEEP

    98304:TDqPoBhz1aRxcSUDk36SAEdhvxWa9P5kF:TDqPe1Cxcxk3ZAEUada

Malware Config

Signatures

  • Wannacry

    WannaCry is a ransomware cryptoworm.

  • Contacts a large (3297) amount of remote hosts 1 TTPs

    This may indicate a network scan to discover remotely running services.

  • Executes dropped EXE 3 IoCs
  • Creates a large amount of network flows 1 TTPs

    This may indicate a network scan to discover remotely running services.

  • Drops file in System32 directory 1 IoCs
  • Drops file in Windows directory 2 IoCs
  • Modifies data under HKEY_USERS 24 IoCs
  • Suspicious use of WriteProcessMemory 11 IoCs

Processes

  • C:\Windows\system32\rundll32.exe
    rundll32.exe C:\Users\Admin\AppData\Local\Temp\aa4bd04759c4c86d3a37456a4c0d1aae_JaffaCakes118.dll,#1
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2968
    • C:\Windows\SysWOW64\rundll32.exe
      rundll32.exe C:\Users\Admin\AppData\Local\Temp\aa4bd04759c4c86d3a37456a4c0d1aae_JaffaCakes118.dll,#1
      2⤵
      • Drops file in Windows directory
      • Suspicious use of WriteProcessMemory
      PID:2800
      • C:\WINDOWS\mssecsvc.exe
        C:\WINDOWS\mssecsvc.exe
        3⤵
        • Executes dropped EXE
        • Drops file in Windows directory
        PID:2908
        • C:\WINDOWS\tasksche.exe
          C:\WINDOWS\tasksche.exe /i
          4⤵
          • Executes dropped EXE
          PID:2736
  • C:\WINDOWS\mssecsvc.exe
    C:\WINDOWS\mssecsvc.exe -m security
    1⤵
    • Executes dropped EXE
    • Drops file in System32 directory
    • Modifies data under HKEY_USERS
    PID:2636

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Windows\mssecsvc.exe

    Filesize

    3.6MB

    MD5

    c32558b9e0da451b5e1f3c42ec95c77c

    SHA1

    0e6cfd4a08436fd9d7cfe434c179a67872627195

    SHA256

    3b34fd5f2a99632baeb9d5ca8f39cce78ad0211e77bd38368901db795ab16d39

    SHA512

    310aceeadb4694820f3c60c9c287e5ee92f3d813bf214f9abd11459fd1ac558183d3b67e313479f3175fbacdfff2ba411e2eb1956a529b6d8eb0b3e74156d6bb

  • C:\Windows\tasksche.exe

    Filesize

    3.4MB

    MD5

    9eb5cd883bd050ca2fd14493b70ccc95

    SHA1

    69d53fdaa5b012725d48f95d1e5f8b9188138ede

    SHA256

    af321e7a1780cb92bcc1bcf30206aba7ec981f676fa98f741587bead7f2ce922

    SHA512

    85e29c027e6ca318b32003be4bbd6bcb5f6fceaa947083de38e6ac79f92abdf8e92b959b33f89bbbfc9fa551bf7ec7057e2d1dfc551e219c6aebffcab287870b