Analysis

  • max time kernel
    150s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240709-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system
  • submitted
    13-07-2024 16:22

General

  • Target

    42708471bba43fab8c0834de27a7a3a4_JaffaCakes118.dll

  • Size

    5.0MB

  • MD5

    42708471bba43fab8c0834de27a7a3a4

  • SHA1

    9a87f4a8ce7bfb5e9dda353a0a308f228353bcfe

  • SHA256

    46d23bc35d038fbeaf2c3e86a89c42319560e8a6a4a3fd3bd743d96f2b49f238

  • SHA512

    bae3fe3021fe0ef0f5a16e9db9a51630daac987c984f673aabab6cd14bf6f88855699c71b6ff97322dbd08e1c5e1c861d7dc117095ad372525d75e8abd47906d

  • SSDEEP

    98304:+DqPoBhz1aRxcSUDk36SAEdhvxWa9P593R8yAVp2:+DqPe1Cxcxk3ZAEUadzR8yc4

Malware Config

Signatures

  • Wannacry

    WannaCry is a ransomware cryptoworm.

  • Contacts a large (3232) amount of remote hosts 1 TTPs

    This may indicate a network scan to discover remotely running services.

  • Executes dropped EXE 3 IoCs
  • Creates a large amount of network flows 1 TTPs

    This may indicate a network scan to discover remotely running services.

  • Drops file in Windows directory 2 IoCs
  • Modifies data under HKEY_USERS 5 IoCs
  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Windows\system32\rundll32.exe
    rundll32.exe C:\Users\Admin\AppData\Local\Temp\42708471bba43fab8c0834de27a7a3a4_JaffaCakes118.dll,#1
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:3548
    • C:\Windows\SysWOW64\rundll32.exe
      rundll32.exe C:\Users\Admin\AppData\Local\Temp\42708471bba43fab8c0834de27a7a3a4_JaffaCakes118.dll,#1
      2⤵
      • Drops file in Windows directory
      • Suspicious use of WriteProcessMemory
      PID:2212
      • C:\WINDOWS\mssecsvc.exe
        C:\WINDOWS\mssecsvc.exe
        3⤵
        • Executes dropped EXE
        • Drops file in Windows directory
        PID:400
        • C:\WINDOWS\tasksche.exe
          C:\WINDOWS\tasksche.exe /i
          4⤵
          • Executes dropped EXE
          PID:4172
  • C:\WINDOWS\mssecsvc.exe
    C:\WINDOWS\mssecsvc.exe -m security
    1⤵
    • Executes dropped EXE
    • Modifies data under HKEY_USERS
    PID:2632

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Windows\mssecsvc.exe

    Filesize

    3.6MB

    MD5

    7d6e0f7ee20eefad8ccf2bd89abc1691

    SHA1

    a5b6fae7eabbbc52d3514b0af036dd5fe9134eed

    SHA256

    b4c3c0d59da89f08f9a0e2d8703548a0734b498862397b8301db7527e207f6cb

    SHA512

    532f6afd1b382b346a07ec2538b51d1bae5608b169dfe62ca0424196e9f15e68643f3c2d0d0ceca9bc82a1178dd85d213dbd91b63730bce6329d0ab23c9430e0

  • C:\Windows\tasksche.exe

    Filesize

    3.4MB

    MD5

    3345ae752bf8ce297ee33bed8ef8dffd

    SHA1

    82ccecde64722d21b0a2c9f5d803145997fb7940

    SHA256

    7b52ecf501e14a1d634b8e67bd75f2ae810de38373803b165e0146ceeb308471

    SHA512

    409ffd2a0d26d4e5b1954116b3860a92289abcbce84d266008943011ba9b0728b51ae21732240fccc8475a219a0d3d687c0af9e80fef3b1f33308e357bf2f43e