Analysis

  • max time kernel
    150s
  • max time network
    150s
  • platform
    windows7_x64
  • resource
    win7-20240508-en
  • resource tags

    arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system
  • submitted
    16-06-2024 04:23

General

  • Target

    b1b508f6e48d032bfd9ad276f9c8f86d_JaffaCakes118.dll

  • Size

    5.0MB

  • MD5

    b1b508f6e48d032bfd9ad276f9c8f86d

  • SHA1

    7c8c3fb551840a92044581f442f338cc0666a9f0

  • SHA256

    d6434eea6725614187f29f4c1fb9436f2aa8b3a1f6f5b1658e739c2d0562eee3

  • SHA512

    b8dfc1b21772be73c89595df4c1c84190df07067aa0fc4b054d0fc28bdb6796f78ce667a7099c6176010d021cf36a0faa6365c35c56b4423d29cf3fc00b7d489

  • SSDEEP

    24576:SbLgddQhfdmMSirYbcMNgef0QeQjG/D8kIqRYoAdNLKz6626Wo/Gsl:SnAQqMSPbcBVQej/1INRAW+Gsl

Malware Config

Signatures

  • Wannacry

    WannaCry is a ransomware cryptoworm.

  • Contacts a large (2663) amount of remote hosts 1 TTPs

    This may indicate a network scan to discover remotely running services.

  • Executes dropped EXE 3 IoCs
  • Drops file in System32 directory 1 IoCs
  • Drops file in Windows directory 2 IoCs
  • Modifies data under HKEY_USERS 24 IoCs
  • Suspicious use of WriteProcessMemory 11 IoCs

Processes

  • C:\Windows\system32\rundll32.exe
    rundll32.exe C:\Users\Admin\AppData\Local\Temp\b1b508f6e48d032bfd9ad276f9c8f86d_JaffaCakes118.dll,#1
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2916
    • C:\Windows\SysWOW64\rundll32.exe
      rundll32.exe C:\Users\Admin\AppData\Local\Temp\b1b508f6e48d032bfd9ad276f9c8f86d_JaffaCakes118.dll,#1
      2⤵
      • Drops file in Windows directory
      • Suspicious use of WriteProcessMemory
      PID:2968
      • C:\WINDOWS\mssecsvc.exe
        C:\WINDOWS\mssecsvc.exe
        3⤵
        • Executes dropped EXE
        • Drops file in Windows directory
        PID:2376
        • C:\WINDOWS\tasksche.exe
          C:\WINDOWS\tasksche.exe /i
          4⤵
          • Executes dropped EXE
          PID:2464
  • C:\WINDOWS\mssecsvc.exe
    C:\WINDOWS\mssecsvc.exe -m security
    1⤵
    • Executes dropped EXE
    • Drops file in System32 directory
    • Modifies data under HKEY_USERS
    PID:2240

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Windows\mssecsvc.exe

    Filesize

    3.6MB

    MD5

    cebc61bb7da1c54560be22c34b13b76c

    SHA1

    e2ccb9ba6d7377b106a62a9968f093cb153095a2

    SHA256

    5e04837db4d06a38dd08cbf861f3415579f349e31e9ca998e318320671975d04

    SHA512

    254dfd5b8064c9a1861e782eda6e0553143a78878e03d0586fe38d54a9aab94ccd740872d29c9083c8d0d95d4915a5acf4ee1451f831ddf88f434fc97ac8f41f

  • C:\Windows\tasksche.exe

    Filesize

    3.4MB

    MD5

    6d9e02cbc2b890d9ff66431c2d53b6e0

    SHA1

    8fb54d846f2a9411d36b14d98f45733e57c8f46d

    SHA256

    7df8f55ef753302be3c6fdf2c1f50c36a537f720f2ebbb3efc6cd054a4705e6d

    SHA512

    ff17bc1ee5e95ecf0661dae1822cb59cec41555a62405d2124e6619a61320225be52a6f1664476918ac7561e0a34b579165b8946b3ed74057a77ddb80914dc72