Analysis

  • max time kernel
    150s
  • max time network
    155s
  • platform
    windows7_x64
  • resource
    win7-20240611-en
  • resource tags

    arch:x64arch:x86image:win7-20240611-enlocale:en-usos:windows7-x64system
  • submitted
    14-06-2024 21:15

General

  • Target

    ab80bc09ea8609ec530cbde89ec7d29c_JaffaCakes118.dll

  • Size

    5.0MB

  • MD5

    ab80bc09ea8609ec530cbde89ec7d29c

  • SHA1

    e54b1408d76c1a234c3a4816de52f35370e38557

  • SHA256

    1adc42b3e4869bd7125e52aae5f570ae34aaeebb053ee1faf55c9aeb657943da

  • SHA512

    74cd7eb0f39243641eb67ae8fec5b1678b5ca712787346c69ce14add8f4d0a87c4d6e499ed8d14282d7d72cb8471b1b90fb9509d6050c695c972c24518842156

  • SSDEEP

    98304:+DqPoBhz1aRxcSUDkS6SAEdhvxWa9P5931Vp2X3:+DqPe1CxcxkSZAEUadzD4X

Malware Config

Signatures

  • Wannacry

    WannaCry is a ransomware cryptoworm.

  • Contacts a large (3180) amount of remote hosts 1 TTPs

    This may indicate a network scan to discover remotely running services.

  • Executes dropped EXE 3 IoCs
  • Creates a large amount of network flows 1 TTPs

    This may indicate a network scan to discover remotely running services.

  • Drops file in System32 directory 1 IoCs
  • Drops file in Windows directory 2 IoCs
  • Modifies data under HKEY_USERS 24 IoCs
  • Suspicious use of WriteProcessMemory 11 IoCs

Processes

  • C:\Windows\system32\rundll32.exe
    rundll32.exe C:\Users\Admin\AppData\Local\Temp\ab80bc09ea8609ec530cbde89ec7d29c_JaffaCakes118.dll,#1
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2580
    • C:\Windows\SysWOW64\rundll32.exe
      rundll32.exe C:\Users\Admin\AppData\Local\Temp\ab80bc09ea8609ec530cbde89ec7d29c_JaffaCakes118.dll,#1
      2⤵
      • Drops file in Windows directory
      • Suspicious use of WriteProcessMemory
      PID:2100
      • C:\WINDOWS\mssecsvc.exe
        C:\WINDOWS\mssecsvc.exe
        3⤵
        • Executes dropped EXE
        • Drops file in Windows directory
        PID:2140
        • C:\WINDOWS\tasksche.exe
          C:\WINDOWS\tasksche.exe /i
          4⤵
          • Executes dropped EXE
          PID:2504
  • C:\WINDOWS\mssecsvc.exe
    C:\WINDOWS\mssecsvc.exe -m security
    1⤵
    • Executes dropped EXE
    • Drops file in System32 directory
    • Modifies data under HKEY_USERS
    PID:2624

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Windows\mssecsvc.exe

    Filesize

    3.6MB

    MD5

    6e857c346a88919885c2367388fb2679

    SHA1

    1f5b50bee927e494bdb05f3124507cccca79e303

    SHA256

    66f59db3bdf0b7f1e2cad74295c1e92d99b835e5d861216e627ef6d93e97970e

    SHA512

    4594963d06a0c0317dee821344d7b28873c2db25769011e306df046955f5f6e1191cec18fb6187cd71ac9d0d4b862a9e41df0c19e405b18461238a3b5615b55b

  • C:\Windows\tasksche.exe

    Filesize

    3.4MB

    MD5

    5853b99636d6ce48af34af781d6be42d

    SHA1

    d80cd9ead851c85324ca9bc4e36d4e3d712c22e3

    SHA256

    76e85f8521adf3cc03420d65b0c2b170f40bb7fbb2fe7c2e723100b37e2c3370

    SHA512

    d041b87adc8ecdcdd4e9aea22f470d933fa5448d6fde461d6f072f17e4f97dfb97ea563bc9e70fe480480b285a0c9a33ca843574df5c0d2957201c8af16f741b