Analysis

  • max time kernel
    151s
  • max time network
    158s
  • platform
    windows7_x64
  • resource
    win7-20240704-en
  • resource tags

    arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system
  • submitted
    18-07-2024 13:31

General

  • Target

    57967b6e7787ff7365db472b97691ca1_JaffaCakes118.dll

  • Size

    5.0MB

  • MD5

    57967b6e7787ff7365db472b97691ca1

  • SHA1

    c7c888ac1b1b48275b16dbd34abd23daa8cec8da

  • SHA256

    b90382ed0462a0c27a4edec0bc952549846f0616e2e4c700d9c2da065bb28208

  • SHA512

    2567d5851479d4d0b60803db6600a809988a4a7cc8e29375a943f6028074b497d5a952cc3a2ab03618f2749da7a1aceaae449939c91fc1f7d9a4d2fbe7be9474

  • SSDEEP

    49152:RnnMSPbcBVQej/1INRx+TSqTdXr6SAARdhnv:1nPoBhz1aRxcSUN6SAEdhv

Malware Config

Signatures

  • Wannacry

    WannaCry is a ransomware cryptoworm.

  • Contacts a large (3121) amount of remote hosts 1 TTPs

    This may indicate a network scan to discover remotely running services.

  • Executes dropped EXE 2 IoCs
  • Creates a large amount of network flows 1 TTPs

    This may indicate a network scan to discover remotely running services.

  • Drops file in System32 directory 5 IoCs
  • Drops file in Windows directory 2 IoCs
  • Modifies data under HKEY_USERS 24 IoCs
  • Suspicious use of WriteProcessMemory 11 IoCs

Processes

  • C:\Windows\system32\rundll32.exe
    rundll32.exe C:\Users\Admin\AppData\Local\Temp\57967b6e7787ff7365db472b97691ca1_JaffaCakes118.dll,#1
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2708
    • C:\Windows\SysWOW64\rundll32.exe
      rundll32.exe C:\Users\Admin\AppData\Local\Temp\57967b6e7787ff7365db472b97691ca1_JaffaCakes118.dll,#1
      2⤵
      • Drops file in Windows directory
      • Suspicious use of WriteProcessMemory
      PID:2760
      • C:\WINDOWS\mssecsvr.exe
        C:\WINDOWS\mssecsvr.exe
        3⤵
        • Executes dropped EXE
        • Drops file in Windows directory
        PID:2640
  • C:\WINDOWS\mssecsvr.exe
    C:\WINDOWS\mssecsvr.exe -m security
    1⤵
    • Executes dropped EXE
    • Drops file in System32 directory
    • Modifies data under HKEY_USERS
    PID:2892

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Windows\mssecsvr.exe

    Filesize

    2.2MB

    MD5

    b9ada40ac6b58c2325d073c89e577f1f

    SHA1

    9d9ce5b885b22ea1a9e0c61bbfcf68acd5608792

    SHA256

    c97fb78371881b13c74d14a904ad8c23fc67f12a2d86b71b02c5b4481e3f95fe

    SHA512

    da968bbecc76ab7e444e026e6bcecd15b417005796d649b909b72420f4c23469a688d9d083fc6138f9922460e56052232e69ec8758a3b535bac4f12477e6e4c2