Analysis

  • max time kernel
    150s
  • max time network
    156s
  • platform
    windows7_x64
  • resource
    win7-20240704-en
  • resource tags

    arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system
  • submitted
    10-07-2024 07:39

General

  • Target

    33d373e264dc7fdb0bcdbd8e075a6319_JaffaCakes118.dll

  • Size

    5.0MB

  • MD5

    33d373e264dc7fdb0bcdbd8e075a6319

  • SHA1

    918ffd174ee2c58494c00392c2268da43693c603

  • SHA256

    fade02b958b99c08787e13ba1117164bac6ba8ed27740cd590b5beed188fe540

  • SHA512

    88eb07938a594a302e423601783c28b1cf0da401561360424fe5d251d5f2e3830c6577bf38c285894e7c862afc852f78450a22abae22b6b181a8ade3b15cbf7e

  • SSDEEP

    49152:RnxQqMSPbcBVQej/1INRx+TSqTdX1HkQo6SAARdhnv:16qPoBhz1aRxcSUDk36SAEdhv

Malware Config

Signatures

  • Wannacry

    WannaCry is a ransomware cryptoworm.

  • Contacts a large (3268) amount of remote hosts 1 TTPs

    This may indicate a network scan to discover remotely running services.

  • Executes dropped EXE 2 IoCs
  • Creates a large amount of network flows 1 TTPs

    This may indicate a network scan to discover remotely running services.

  • Drops file in System32 directory 5 IoCs
  • Drops file in Windows directory 2 IoCs
  • Modifies data under HKEY_USERS 24 IoCs
  • Suspicious use of WriteProcessMemory 11 IoCs

Processes

  • C:\Windows\system32\rundll32.exe
    rundll32.exe C:\Users\Admin\AppData\Local\Temp\33d373e264dc7fdb0bcdbd8e075a6319_JaffaCakes118.dll,#1
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1908
    • C:\Windows\SysWOW64\rundll32.exe
      rundll32.exe C:\Users\Admin\AppData\Local\Temp\33d373e264dc7fdb0bcdbd8e075a6319_JaffaCakes118.dll,#1
      2⤵
      • Drops file in Windows directory
      • Suspicious use of WriteProcessMemory
      PID:2280
      • C:\WINDOWS\mssecsvr.exe
        C:\WINDOWS\mssecsvr.exe
        3⤵
        • Executes dropped EXE
        • Drops file in Windows directory
        PID:2284
  • C:\WINDOWS\mssecsvr.exe
    C:\WINDOWS\mssecsvr.exe -m security
    1⤵
    • Executes dropped EXE
    • Drops file in System32 directory
    • Modifies data under HKEY_USERS
    PID:2680

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Windows\mssecsvr.exe

    Filesize

    2.2MB

    MD5

    12ffb95049b6e158eb379dd27cf25f72

    SHA1

    eaba4c847f19900099f4b4f86393b07639940750

    SHA256

    828f329b94fa359f6d8541f2dda0652b06ed76e6e864b18cdefb12453a09e74f

    SHA512

    10704ecd9c7e6711e08d8352027be77fd61431ced333914920b703dacdf098ea7576e5046e50e4ab35bc73fd6c432b49dc1e8cb3e699fc199e8867bf8fd4e060