Analysis

  • max time kernel
    150s
  • max time network
    151s
  • platform
    windows7_x64
  • resource
    win7-20240705-en
  • resource tags

    arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system
  • submitted
    16-07-2024 01:57

General

  • Target

    4c58581fa08accc15994f3db1098a5bc_JaffaCakes118.dll

  • Size

    5.0MB

  • MD5

    4c58581fa08accc15994f3db1098a5bc

  • SHA1

    1a349b33c6cc821b814138eb9619fcbce20e6eda

  • SHA256

    7ab78920ad07396864187254f5323571807df03ca90c6b5eab2d1c8d0c27b4d5

  • SHA512

    99e85447b5c2a3380cb9add92c5ca2ded417cdc1de2fbc3655b32014a53fd7202cdf6cda6955bbc8605bd6667cffafc9df3a04b10e0dcf15079481ede3b62da1

  • SSDEEP

    49152:znAQqMSPbcBVQej/1INRx+TSqTdX1HkQo6SAA8Kx/aa56L:TDqPoBhz1aRxcSUDk36SANKx/ag6L

Malware Config

Signatures

  • Wannacry

    WannaCry is a ransomware cryptoworm.

  • Contacts a large (3272) amount of remote hosts 1 TTPs

    This may indicate a network scan to discover remotely running services.

  • Executes dropped EXE 3 IoCs
  • Creates a large amount of network flows 1 TTPs

    This may indicate a network scan to discover remotely running services.

  • Drops file in System32 directory 1 IoCs
  • Drops file in Windows directory 2 IoCs
  • Modifies data under HKEY_USERS 24 IoCs
  • Suspicious use of WriteProcessMemory 11 IoCs

Processes

  • C:\Windows\system32\rundll32.exe
    rundll32.exe C:\Users\Admin\AppData\Local\Temp\4c58581fa08accc15994f3db1098a5bc_JaffaCakes118.dll,#1
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2976
    • C:\Windows\SysWOW64\rundll32.exe
      rundll32.exe C:\Users\Admin\AppData\Local\Temp\4c58581fa08accc15994f3db1098a5bc_JaffaCakes118.dll,#1
      2⤵
      • Drops file in Windows directory
      • Suspicious use of WriteProcessMemory
      PID:2524
      • C:\WINDOWS\mssecsvc.exe
        C:\WINDOWS\mssecsvc.exe
        3⤵
        • Executes dropped EXE
        • Drops file in Windows directory
        PID:2100
        • C:\WINDOWS\tasksche.exe
          C:\WINDOWS\tasksche.exe /i
          4⤵
          • Executes dropped EXE
          PID:2784
  • C:\WINDOWS\mssecsvc.exe
    C:\WINDOWS\mssecsvc.exe -m security
    1⤵
    • Executes dropped EXE
    • Drops file in System32 directory
    • Modifies data under HKEY_USERS
    PID:1940

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Windows\mssecsvc.exe

    Filesize

    3.6MB

    MD5

    9bcd08d46432b6dac27417b0de3da8b1

    SHA1

    d16fae609a6cc1049fb008039555c2cc67db8638

    SHA256

    4beab4d0d34aa39daecd1846d8a574aacbda506618bdbabc3ffeea46e121e774

    SHA512

    b987e4b323fc59b82b71f4f5e0fe71b0324811247ab488c19688cdc1430322deaadb6b73528178277b3ac9e3e89f5f938381b768839d99e7a72600ea5dfd636a

  • C:\Windows\tasksche.exe

    Filesize

    3.4MB

    MD5

    82246a37bc2b94a29240a8b49de5cf57

    SHA1

    60d6df7c05d3a037adb5ff61a563a7ae7ab00f36

    SHA256

    372be1952cbc480ee462d263e3e067b82ae542e7b65789508575642bd960f18e

    SHA512

    047cab5fb0ef6bf88db1fe2fbf7200cf810a1b057e9b3488e32a6d8cf96dd56e9d397c5dc16885f48aca4d858a3612af74284819e50006e3279bcf9642200289