Analysis

  • max time kernel
    150s
  • max time network
    150s
  • platform
    windows7_x64
  • resource
    win7-20231129-en
  • resource tags

    arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system
  • submitted
    15-06-2024 17:50

General

  • Target

    afa43a534b89186dcb549654b3c9a887_JaffaCakes118.dll

  • Size

    5.0MB

  • MD5

    afa43a534b89186dcb549654b3c9a887

  • SHA1

    50a3b4c33a165548a9a6921a5c984ceb26ad27ea

  • SHA256

    0d47f7bfb29d2a17bcaf8614e8c9d7a7b03500527602d926f5d597011e193b50

  • SHA512

    ae7066464795e6b0a51d08ed65a7252e3be1d9fd1034f5a4ba7c0726125f55c4dd8f40abe04f8829f668475790477daceca92a5b9f0734c4e208cccfdbe851a4

  • SSDEEP

    98304:d8qPoBhz1aRxcSUDk36SA9xWa9P593R8yAVp2H:d8qPe1Cxcxk3ZA2adzR8yc4H

Malware Config

Signatures

  • Wannacry

    WannaCry is a ransomware cryptoworm.

  • Contacts a large (3186) amount of remote hosts 1 TTPs

    This may indicate a network scan to discover remotely running services.

  • Executes dropped EXE 3 IoCs
  • Creates a large amount of network flows 1 TTPs

    This may indicate a network scan to discover remotely running services.

  • Drops file in System32 directory 1 IoCs
  • Drops file in Windows directory 2 IoCs
  • Modifies data under HKEY_USERS 1 IoCs
  • Suspicious use of WriteProcessMemory 11 IoCs

Processes

  • C:\Windows\system32\rundll32.exe
    rundll32.exe C:\Users\Admin\AppData\Local\Temp\afa43a534b89186dcb549654b3c9a887_JaffaCakes118.dll,#1
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2220
    • C:\Windows\SysWOW64\rundll32.exe
      rundll32.exe C:\Users\Admin\AppData\Local\Temp\afa43a534b89186dcb549654b3c9a887_JaffaCakes118.dll,#1
      2⤵
      • Drops file in Windows directory
      • Suspicious use of WriteProcessMemory
      PID:1704
      • C:\WINDOWS\mssecsvc.exe
        C:\WINDOWS\mssecsvc.exe
        3⤵
        • Executes dropped EXE
        • Drops file in Windows directory
        PID:2352
        • C:\WINDOWS\tasksche.exe
          C:\WINDOWS\tasksche.exe /i
          4⤵
          • Executes dropped EXE
          PID:2600
  • C:\WINDOWS\mssecsvc.exe
    C:\WINDOWS\mssecsvc.exe -m security
    1⤵
    • Executes dropped EXE
    • Drops file in System32 directory
    • Modifies data under HKEY_USERS
    PID:2372

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Windows\mssecsvc.exe

    Filesize

    3.6MB

    MD5

    6b10f50ccc007f921a3f42530fd3cb4e

    SHA1

    203af92090f7733972359f7e3f8f8b55e4147e45

    SHA256

    83994580a212d2139b46757c28e0a737ed5305b88436a8517553fe7a34fd16dc

    SHA512

    f6abc4f93376c7bdc5b81463fafad7f8677d73594de477a8bc66f81578169da534ce8c061c615d7db738d49001dccbfea654fe4d7b939a889d82acb178a667a8

  • C:\Windows\tasksche.exe

    Filesize

    3.4MB

    MD5

    adc305e297b2b29180bca2f99ccfddb0

    SHA1

    68ff5df984561086735398218ea023d21ba4ba6c

    SHA256

    3e05a7ef86fb918d6af3e26d1abc4b24f223f9b41d82da8f210b5ea259031ed7

    SHA512

    32a2a80b2431774ae6074bbf83798c33e936844ba6bc1a98b7148536a476222d816cc6fd94bd1b296834b443630884bd8e6fdbaa5d68ea1ece2857efeabe9f4f