Analysis

  • max time kernel
    150s
  • max time network
    150s
  • platform
    windows7_x64
  • resource
    win7-20240611-en
  • resource tags

    arch:x64arch:x86image:win7-20240611-enlocale:en-usos:windows7-x64system
  • submitted
    15-06-2024 21:22

General

  • Target

    b02604ec920bc250d015b843b84efa97_JaffaCakes118.dll

  • Size

    5.0MB

  • MD5

    b02604ec920bc250d015b843b84efa97

  • SHA1

    0accc7366352882fa66443481323b24bff982e26

  • SHA256

    2ce28a0df8beb5504ff1769d1b5f57bffd18bcb8cd39669649e445c6a60bf31a

  • SHA512

    3606714c94cc1ca0524a912af8ffc8cc86f5e5e57d71f88f299ce1c1b6a6d9c59e3b31904431461d9fe4cae4e7c536a3b3a3ac3e261afba65dc93cf4b450444a

  • SSDEEP

    98304:TDqPoBhz1aRxcSUDk36SAEdhvxWa9P593R8yAVpi:TDqPe1Cxcxk3ZAEUadzR8ycA

Malware Config

Signatures

  • Wannacry

    WannaCry is a ransomware cryptoworm.

  • Contacts a large (3207) amount of remote hosts 1 TTPs

    This may indicate a network scan to discover remotely running services.

  • Executes dropped EXE 3 IoCs
  • Creates a large amount of network flows 1 TTPs

    This may indicate a network scan to discover remotely running services.

  • Drops file in System32 directory 1 IoCs
  • Drops file in Windows directory 2 IoCs
  • Modifies data under HKEY_USERS 24 IoCs
  • Suspicious use of WriteProcessMemory 11 IoCs

Processes

  • C:\Windows\system32\rundll32.exe
    rundll32.exe C:\Users\Admin\AppData\Local\Temp\b02604ec920bc250d015b843b84efa97_JaffaCakes118.dll,#1
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2108
    • C:\Windows\SysWOW64\rundll32.exe
      rundll32.exe C:\Users\Admin\AppData\Local\Temp\b02604ec920bc250d015b843b84efa97_JaffaCakes118.dll,#1
      2⤵
      • Drops file in Windows directory
      • Suspicious use of WriteProcessMemory
      PID:2396
      • C:\WINDOWS\mssecsvc.exe
        C:\WINDOWS\mssecsvc.exe
        3⤵
        • Executes dropped EXE
        • Drops file in Windows directory
        PID:2208
        • C:\WINDOWS\tasksche.exe
          C:\WINDOWS\tasksche.exe /i
          4⤵
          • Executes dropped EXE
          PID:2684
  • C:\WINDOWS\mssecsvc.exe
    C:\WINDOWS\mssecsvc.exe -m security
    1⤵
    • Executes dropped EXE
    • Drops file in System32 directory
    • Modifies data under HKEY_USERS
    PID:2784

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Windows\mssecsvc.exe

    Filesize

    3.6MB

    MD5

    4a83f302968101a9c12410ef1c647a59

    SHA1

    8b6f7a682b2f92214a3553ee8899e8c4e0f8c869

    SHA256

    54d13721eabf71260fe1ef7da52d7c6c31f1598cea0b5baaca30778ba1a81469

    SHA512

    632960c704797501f9e3878c2c25f1b026f8d24d7726c658614ec29e16e51a7c5e01c9cbf45fb651efe16ded7a94ba82eecbbce5645552ffb1f13d8ee4dac0fd

  • C:\Windows\tasksche.exe

    Filesize

    3.4MB

    MD5

    4b275268b9ed8e597853780e369416de

    SHA1

    a21a488bc6781ceb82701f25445a4b8cf718053c

    SHA256

    99bad35d9f3552a51b0fefbfb90f75f13fc62bdfcfb1de1283650228ed482640

    SHA512

    ff1f7af56ccd85086f85805b4072b23fe2ad0cd6170c4af45da8f98d26dda151d5a6b4d0c944d47a65290404b532ca035bd7879b65f43db57faa1ebc860034f4