Analysis

  • max time kernel
    150s
  • max time network
    150s
  • platform
    windows7_x64
  • resource
    win7-20240508-en
  • resource tags

    arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system
  • submitted
    15-06-2024 12:42

General

  • Target

    ae7afd9cd61ba69634680827681ec156_JaffaCakes118.dll

  • Size

    5.0MB

  • MD5

    ae7afd9cd61ba69634680827681ec156

  • SHA1

    e6c70b3b1700dd38308c9cb5924e4add09182a97

  • SHA256

    72b9d265087cad1a5b7b4971e3d7638018d6bb4197ea304559d3f26b50a66079

  • SHA512

    6b7bba5cd2cc964ca2543c270220f8cf8d5086e902d66b591911fcb4f22dabb7c4e0f17a036b565af052c9046e7c154644c9d666640437c88c55b6946e66d4f7

  • SSDEEP

    24576:SbLgddQhfdmMSirYbcMNgef0KdNLKz662619XEk:SnAQqMSPbcBVKNRAB

Malware Config

Signatures

  • Wannacry

    WannaCry is a ransomware cryptoworm.

  • Contacts a large (2662) amount of remote hosts 1 TTPs

    This may indicate a network scan to discover remotely running services.

  • Executes dropped EXE 3 IoCs
  • Drops file in System32 directory 1 IoCs
  • Drops file in Windows directory 2 IoCs
  • Modifies data under HKEY_USERS 24 IoCs
  • Suspicious use of WriteProcessMemory 11 IoCs

Processes

  • C:\Windows\system32\rundll32.exe
    rundll32.exe C:\Users\Admin\AppData\Local\Temp\ae7afd9cd61ba69634680827681ec156_JaffaCakes118.dll,#1
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1924
    • C:\Windows\SysWOW64\rundll32.exe
      rundll32.exe C:\Users\Admin\AppData\Local\Temp\ae7afd9cd61ba69634680827681ec156_JaffaCakes118.dll,#1
      2⤵
      • Drops file in Windows directory
      • Suspicious use of WriteProcessMemory
      PID:1792
      • C:\WINDOWS\mssecsvc.exe
        C:\WINDOWS\mssecsvc.exe
        3⤵
        • Executes dropped EXE
        • Drops file in Windows directory
        PID:2632
        • C:\WINDOWS\tasksche.exe
          C:\WINDOWS\tasksche.exe /i
          4⤵
          • Executes dropped EXE
          PID:2460
  • C:\WINDOWS\mssecsvc.exe
    C:\WINDOWS\mssecsvc.exe -m security
    1⤵
    • Executes dropped EXE
    • Drops file in System32 directory
    • Modifies data under HKEY_USERS
    PID:2612

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Windows\mssecsvc.exe

    Filesize

    3.6MB

    MD5

    7a1fc08e02a918d742082700c7916e40

    SHA1

    f0d981ab47847638104e234d32a02d1891522d7a

    SHA256

    116109a01c7e8b13eea28f6dcfa6622ffe7823ccb09f8ae710ddcdbbe13e8e88

    SHA512

    d124584ac470da769cc40e3097afe07ca7f9d10f68f5292574d880a56321b32bdf89a146586c0227678db95f0e276e0269a5fedf61c1d9c7bbb78a321c1c68df

  • C:\Windows\tasksche.exe

    Filesize

    3.4MB

    MD5

    019b06f27ee113b9fea8d33ed07e21da

    SHA1

    4efc7d827d63d04ff8b287e02ae50015c60b967b

    SHA256

    b69a89f6d5df4178a50a5a01add401d9540b279c3ea484e8b179d46c7edcd6a3

    SHA512

    694c7a4f68f6ec96254d494ee28913b552a6db79be1b3f738e90a6ed7cb1e89274ceac9a5cb5403f3bb63cd8a22a4c7df7d2448ffd6b56f183a19af961878144