Analysis

  • max time kernel
    150s
  • max time network
    150s
  • platform
    windows7_x64
  • resource
    win7-20240220-en
  • resource tags

    arch:x64arch:x86image:win7-20240220-enlocale:en-usos:windows7-x64system
  • submitted
    14-06-2024 17:52

General

  • Target

    ab0048b9856d6fb658eb8e042be8c4bd_JaffaCakes118.dll

  • Size

    5.0MB

  • MD5

    ab0048b9856d6fb658eb8e042be8c4bd

  • SHA1

    99d0077d459fd6760aa5e531ec4978c79260ff1e

  • SHA256

    6b215ba58f2847b525c44f3302ad51177512fcdfc2af82d5d2d64bf447d86edc

  • SHA512

    f8262a984d58b07d8802abaa59bfe2fe25edc42ea2f7655da0cee30beb43528bdc590a88f95f31f1a71818721b174f2d7a0ce5137f06c6a15df6b69bbe319abd

  • SSDEEP

    12288:yvbLgPlu+QhMbaIMu7L5NVErCA4z2g6rTcbckPU82900:SbLgddQhfdmMSirYbcMN

Malware Config

Signatures

  • Wannacry

    WannaCry is a ransomware cryptoworm.

  • Contacts a large (3155) amount of remote hosts 1 TTPs

    This may indicate a network scan to discover remotely running services.

  • Executes dropped EXE 3 IoCs
  • Creates a large amount of network flows 1 TTPs

    This may indicate a network scan to discover remotely running services.

  • Drops file in System32 directory 1 IoCs
  • Drops file in Windows directory 2 IoCs
  • Modifies data under HKEY_USERS 24 IoCs
  • Suspicious use of WriteProcessMemory 11 IoCs

Processes

  • C:\Windows\system32\rundll32.exe
    rundll32.exe C:\Users\Admin\AppData\Local\Temp\ab0048b9856d6fb658eb8e042be8c4bd_JaffaCakes118.dll,#1
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2908
    • C:\Windows\SysWOW64\rundll32.exe
      rundll32.exe C:\Users\Admin\AppData\Local\Temp\ab0048b9856d6fb658eb8e042be8c4bd_JaffaCakes118.dll,#1
      2⤵
      • Drops file in Windows directory
      • Suspicious use of WriteProcessMemory
      PID:1668
      • C:\WINDOWS\mssecsvc.exe
        C:\WINDOWS\mssecsvc.exe
        3⤵
        • Executes dropped EXE
        • Drops file in Windows directory
        PID:2224
        • C:\WINDOWS\tasksche.exe
          C:\WINDOWS\tasksche.exe /i
          4⤵
          • Executes dropped EXE
          PID:2432
  • C:\WINDOWS\mssecsvc.exe
    C:\WINDOWS\mssecsvc.exe -m security
    1⤵
    • Executes dropped EXE
    • Drops file in System32 directory
    • Modifies data under HKEY_USERS
    PID:2520

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Windows\mssecsvc.exe

    Filesize

    3.6MB

    MD5

    c8258c48cbeef8f95df45452de3a4799

    SHA1

    ebaf8e324c6129b00f708480c4677467ceaa8c06

    SHA256

    ec4d6c08fc843b9f1c00d6e0c70e8732e54f85818a107c397b53d5f66e5f8356

    SHA512

    dfaeb9f336ea6f107bc90c8f49a65a78729de311dc7f4adbf3c826a7a09e48834ab4a331405080a0c1ac8f2a42a38df4954c175660cdfa0d7e7642381f48667f

  • C:\Windows\tasksche.exe

    Filesize

    3.4MB

    MD5

    0983e10da094d242ab67b2eb84c03dd1

    SHA1

    82725733486da4b36b8467b30d96b170a0dce764

    SHA256

    ae26fb52093752b3abbbcf86849dc01fcf0a0d83bc09443275a6964769437c66

    SHA512

    b9a31ecf66bc159f4b3049c2628400e8a7ad731478560302901d64311e380eff0cd2acf2fc6cde26a7969ba749754c699ceabe40eb4931445e96fd14ef7dccfe