Analysis

  • max time kernel
    150s
  • max time network
    150s
  • platform
    windows7_x64
  • resource
    win7-20240611-en
  • resource tags

    arch:x64arch:x86image:win7-20240611-enlocale:en-usos:windows7-x64system
  • submitted
    16-06-2024 09:15

General

  • Target

    b2bcb5d052bd5c01f273d23ca1bd03f8_JaffaCakes118.dll

  • Size

    5.0MB

  • MD5

    b2bcb5d052bd5c01f273d23ca1bd03f8

  • SHA1

    9fbc6b7a778bfe6175bfabf5bcbabb1b93c39db3

  • SHA256

    ee0e94f9bf17c7c0491cd22dec56da8030b7e2ecfdfc334b29f8a0983d16b4a6

  • SHA512

    bafa8dc0e290e12831b83ff2694ccc5c53650e1a50fd89c3c64ee5f55d5c1401063b1f3cb6516db0890b7501fa563706f07f93175a36c8179c29a5406c449050

  • SSDEEP

    98304:TDqPoBhz1aRxcSUDkzAdhvxWa9v593R8yAVp2H:TDqPe1CxcxksUaVzR8yc4H

Malware Config

Signatures

  • Wannacry

    WannaCry is a ransomware cryptoworm.

  • Contacts a large (3191) amount of remote hosts 1 TTPs

    This may indicate a network scan to discover remotely running services.

  • Executes dropped EXE 3 IoCs
  • Creates a large amount of network flows 1 TTPs

    This may indicate a network scan to discover remotely running services.

  • Drops file in System32 directory 1 IoCs
  • Drops file in Windows directory 2 IoCs
  • Modifies data under HKEY_USERS 24 IoCs
  • Suspicious use of WriteProcessMemory 11 IoCs

Processes

  • C:\Windows\system32\rundll32.exe
    rundll32.exe C:\Users\Admin\AppData\Local\Temp\b2bcb5d052bd5c01f273d23ca1bd03f8_JaffaCakes118.dll,#1
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2484
    • C:\Windows\SysWOW64\rundll32.exe
      rundll32.exe C:\Users\Admin\AppData\Local\Temp\b2bcb5d052bd5c01f273d23ca1bd03f8_JaffaCakes118.dll,#1
      2⤵
      • Drops file in Windows directory
      • Suspicious use of WriteProcessMemory
      PID:2232
      • C:\WINDOWS\mssecsvc.exe
        C:\WINDOWS\mssecsvc.exe
        3⤵
        • Executes dropped EXE
        • Drops file in Windows directory
        PID:380
        • C:\WINDOWS\tasksche.exe
          C:\WINDOWS\tasksche.exe /i
          4⤵
          • Executes dropped EXE
          PID:2732
  • C:\WINDOWS\mssecsvc.exe
    C:\WINDOWS\mssecsvc.exe -m security
    1⤵
    • Executes dropped EXE
    • Drops file in System32 directory
    • Modifies data under HKEY_USERS
    PID:2360

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Windows\mssecsvc.exe

    Filesize

    3.6MB

    MD5

    8177d1aa276d80dd1ad8e8b5de6ae796

    SHA1

    776f471f28df141ee2d5cf365d4b51be53d06fa8

    SHA256

    2a80d4519e5d2c9c19214e2e833b223a99451fc3d63851b53a37bb3d71b1af6c

    SHA512

    4c970eb85d98fc9e64a3a80c43d82be2bbb3225c46f539588369b7c7b46263dc21bb74599dcb9794f6a1595f4956adf5f84577a56d64bbab1e2bc0cb5160e4ed

  • C:\Windows\tasksche.exe

    Filesize

    3.4MB

    MD5

    c41b977104d3e5ee765b56aac42ba1be

    SHA1

    6eeabfaeb9cd0fe5965a20469a15106e07f69265

    SHA256

    4371e5a5f6814f1e40a584cf3302434382d5ba22da1f2a27f629aea9b992894d

    SHA512

    0f743be8137999ec5fe098660dfb07658bdd60062b439956b6a41adcef3f2876a175f54b0beb214c14e489196705fca6466d18d26f71bee8dc75c1dd03a1e97c