Analysis

  • max time kernel
    150s
  • max time network
    153s
  • platform
    windows7_x64
  • resource
    win7-20240508-en
  • resource tags

    arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system
  • submitted
    17-06-2024 17:32

General

  • Target

    b92837157d74c9c290e6ef61c6df12c1_JaffaCakes118.dll

  • Size

    5.0MB

  • MD5

    b92837157d74c9c290e6ef61c6df12c1

  • SHA1

    446d39ebc62a01152634976966bfbbd12665a603

  • SHA256

    ac088736ba7f0d75716c75bd861d2f0738c9889f04a48db792c0308f5fd71a97

  • SHA512

    cdffff863d33fc21bc19b487f0b51ff3edd7720785dc01c64d60436a04c31ae559a3ae1fc361d462c3a6dcf15469a88a122b67445b5d92db8f37491c83459d82

  • SSDEEP

    24576:SbLgddQhfdmMSirYbcMNgef0QeQjG/D8kIqRYo:SnAQqMSPbcBVQej/1

Malware Config

Signatures

  • Wannacry

    WannaCry is a ransomware cryptoworm.

  • Contacts a large (2664) amount of remote hosts 1 TTPs

    This may indicate a network scan to discover remotely running services.

  • Executes dropped EXE 3 IoCs
  • Drops file in System32 directory 1 IoCs
  • Drops file in Windows directory 2 IoCs
  • Modifies data under HKEY_USERS 24 IoCs
  • Suspicious use of WriteProcessMemory 11 IoCs

Processes

  • C:\Windows\system32\rundll32.exe
    rundll32.exe C:\Users\Admin\AppData\Local\Temp\b92837157d74c9c290e6ef61c6df12c1_JaffaCakes118.dll,#1
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1632
    • C:\Windows\SysWOW64\rundll32.exe
      rundll32.exe C:\Users\Admin\AppData\Local\Temp\b92837157d74c9c290e6ef61c6df12c1_JaffaCakes118.dll,#1
      2⤵
      • Drops file in Windows directory
      • Suspicious use of WriteProcessMemory
      PID:2404
      • C:\WINDOWS\mssecsvc.exe
        C:\WINDOWS\mssecsvc.exe
        3⤵
        • Executes dropped EXE
        • Drops file in Windows directory
        PID:1184
        • C:\WINDOWS\tasksche.exe
          C:\WINDOWS\tasksche.exe /i
          4⤵
          • Executes dropped EXE
          PID:2492
  • C:\WINDOWS\mssecsvc.exe
    C:\WINDOWS\mssecsvc.exe -m security
    1⤵
    • Executes dropped EXE
    • Drops file in System32 directory
    • Modifies data under HKEY_USERS
    PID:2656

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Windows\mssecsvc.exe

    Filesize

    3.6MB

    MD5

    57058c59faa467bb3711e17bc9833955

    SHA1

    3e2a3c4eb0734423c4b4370a14fffb5c36d15db5

    SHA256

    fa7659048adbff8dba41368ebb3942bef8b117f24c37f282cd1c20e46c71694f

    SHA512

    c0c0c1b5b410b24d2bb1badd64b6ea2e1aa92bd829c967485425bed915e38304fe0d6527489f5c10c50c0054aa8f4c6b115d5fdb9c36e4da06e5788eae55321f

  • C:\Windows\tasksche.exe

    Filesize

    3.4MB

    MD5

    1cc8d08ba91ea363f5a4d9ab3e56a0c6

    SHA1

    19063ed2ef149e4af440bfecbbf71c34e341c8e2

    SHA256

    316a63b3960a4f7183b535de13e64b5aa556ebbd6f5009faaca4a540dc2da452

    SHA512

    6be035dd7d22ea5e55f2bf3a19478196ea8e9296800b15324d87035f460a850e4ed4fec5dc6e33ca93148f2f12d09f51af203fb085b3db87155b3c753ce91855