Analysis

  • max time kernel
    150s
  • max time network
    150s
  • platform
    windows7_x64
  • resource
    win7-20240508-en
  • resource tags

    arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system
  • submitted
    22-06-2024 17:52

General

  • Target

    033f9150e241e7accecb60d849481871_JaffaCakes118.dll

  • Size

    5.0MB

  • MD5

    033f9150e241e7accecb60d849481871

  • SHA1

    09067fd23539df1ece704a92b2dca8e32f20f7c8

  • SHA256

    5013a9fc3766f0c065d44c9f6a6a8c0101811d7df4860dd50cf627a0d28ed007

  • SHA512

    e08d2eb9edacbda6dfc7b2a153eaa7f38fe967876df28230e0cc88d3511d8f867f32314f49e761f402d1ff6f10fb411546ca549d855d9676992788670d512015

  • SSDEEP

    98304:dDqPoBhz1aRxcSUZk36SAEdhvxWa9P593R8yAVp2H:dDqPe1Cxc7k3ZAEUadzR8yc4H

Malware Config

Signatures

  • Wannacry

    WannaCry is a ransomware cryptoworm.

  • Contacts a large (2663) amount of remote hosts 1 TTPs

    This may indicate a network scan to discover remotely running services.

  • Executes dropped EXE 3 IoCs
  • Drops file in System32 directory 1 IoCs
  • Drops file in Windows directory 2 IoCs
  • Modifies data under HKEY_USERS 24 IoCs
  • Suspicious use of WriteProcessMemory 11 IoCs

Processes

  • C:\Windows\system32\rundll32.exe
    rundll32.exe C:\Users\Admin\AppData\Local\Temp\033f9150e241e7accecb60d849481871_JaffaCakes118.dll,#1
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2400
    • C:\Windows\SysWOW64\rundll32.exe
      rundll32.exe C:\Users\Admin\AppData\Local\Temp\033f9150e241e7accecb60d849481871_JaffaCakes118.dll,#1
      2⤵
      • Drops file in Windows directory
      • Suspicious use of WriteProcessMemory
      PID:2512
      • C:\WINDOWS\mssecsvc.exe
        C:\WINDOWS\mssecsvc.exe
        3⤵
        • Executes dropped EXE
        • Drops file in Windows directory
        PID:2736
        • C:\WINDOWS\tasksche.exe
          C:\WINDOWS\tasksche.exe /i
          4⤵
          • Executes dropped EXE
          PID:2428
  • C:\WINDOWS\mssecsvc.exe
    C:\WINDOWS\mssecsvc.exe -m security
    1⤵
    • Executes dropped EXE
    • Drops file in System32 directory
    • Modifies data under HKEY_USERS
    PID:2436

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Windows\mssecsvc.exe

    Filesize

    3.6MB

    MD5

    272d02d9694b6108ce0cb93be8af8f16

    SHA1

    6e34070d194e33e9eef908f71e6cc597d3283f5d

    SHA256

    79f1263d4f4c1c3fcb3698f6ebb2214999e4fc462cc15f5fe9f366c1e44d2bb8

    SHA512

    62a7fa4c23e00e41cde6f00270eadc4e17c2b3fc40d5b11526c2791a2aab7f42aee637901c80226d6526c9c57c31b764ccf494b1301016b0111e460c6cd5dc75

  • C:\Windows\tasksche.exe

    Filesize

    3.4MB

    MD5

    c88722ef42a6ee08cbed91406ea5c0e5

    SHA1

    643960f48a68ba0778621871f37389215642c423

    SHA256

    efbc1542b29b798dbbeeb531bbb4b84d422843f9c66d3aff9f301ab9296d8b4c

    SHA512

    5381f40e08c425f96cc8fe2c3e76c4440d39773889e5d137111441805b1786df5f5b38ed60c9461243f8fcb8078d68174c066695ab9b15a96ba5f6a348950f18