Analysis

  • max time kernel
    150s
  • max time network
    150s
  • platform
    windows7_x64
  • resource
    win7-20240705-en
  • resource tags

    arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system
  • submitted
    12-07-2024 07:49

General

  • Target

    3c8b42f7a4f45b30bb3b76f9fdeadce4_JaffaCakes118.dll

  • Size

    5.0MB

  • MD5

    3c8b42f7a4f45b30bb3b76f9fdeadce4

  • SHA1

    bd434fa3973f6d484598ae5e2f4967b2e3b0b221

  • SHA256

    52a1ff98a2dc520e8751ede1644e78ff4f91f384445078622af7a1876faa219e

  • SHA512

    e56e2bd9dad5fd2e0145e2c17a98bd47d89b705b741a47ba1c1307e282566d64e18821bd6f38135769b4ae493cd59be298353100a59ecec5845a63eb59ab7712

  • SSDEEP

    49152:RnvMSPbcBVQejH+TSqTdX1HkQo6SAARdhnv:1vPoBh7cSUDk36SAEdhv

Malware Config

Signatures

  • Wannacry

    WannaCry is a ransomware cryptoworm.

  • Contacts a large (2156) amount of remote hosts 1 TTPs

    This may indicate a network scan to discover remotely running services.

  • Executes dropped EXE 2 IoCs
  • Drops file in System32 directory 1 IoCs
  • Drops file in Windows directory 2 IoCs
  • Modifies data under HKEY_USERS 24 IoCs
  • Suspicious use of WriteProcessMemory 11 IoCs

Processes

  • C:\Windows\system32\rundll32.exe
    rundll32.exe C:\Users\Admin\AppData\Local\Temp\3c8b42f7a4f45b30bb3b76f9fdeadce4_JaffaCakes118.dll,#1
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2680
    • C:\Windows\SysWOW64\rundll32.exe
      rundll32.exe C:\Users\Admin\AppData\Local\Temp\3c8b42f7a4f45b30bb3b76f9fdeadce4_JaffaCakes118.dll,#1
      2⤵
      • Drops file in Windows directory
      • Suspicious use of WriteProcessMemory
      PID:580
      • C:\WINDOWS\mssecsvr.exe
        C:\WINDOWS\mssecsvr.exe
        3⤵
        • Executes dropped EXE
        • Drops file in Windows directory
        PID:1120
  • C:\WINDOWS\mssecsvr.exe
    C:\WINDOWS\mssecsvr.exe -m security
    1⤵
    • Executes dropped EXE
    • Drops file in System32 directory
    • Modifies data under HKEY_USERS
    PID:2708

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Windows\mssecsvr.exe

    Filesize

    2.2MB

    MD5

    8eb465b7c79153280bb4bb3a8bfcb23d

    SHA1

    e28f49461f575dcc3f1f10d6e4e63c1378f7cf37

    SHA256

    0c880b1ece65d9c99a74f5567ef8f333e00a7b4d067be40245e046ca73275eb1

    SHA512

    50a829359f788ea923144bf02c4f055fd407713ae772dcd4b16b821b7361e6da9a25e73ad14647d4d6b79c3e94a6f5cb57a6df8c35b9e7555672940506e14509