Analysis
-
max time kernel
150s -
max time network
150s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
19/07/2024, 17:15
Static task
static1
Behavioral task
behavioral1
Sample
5ce475f1319e2fc3ce180481fe2076c5_JaffaCakes118.dll
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
5ce475f1319e2fc3ce180481fe2076c5_JaffaCakes118.dll
Resource
win10v2004-20240709-en
General
-
Target
5ce475f1319e2fc3ce180481fe2076c5_JaffaCakes118.dll
-
Size
5.0MB
-
MD5
5ce475f1319e2fc3ce180481fe2076c5
-
SHA1
db0f7f265aecbd9540c1afbadc76f194507deab5
-
SHA256
0db9746d82f929f89c45aa86c9ce9ab2698f88bc936d8643042ca3ed0c67bdf9
-
SHA512
495af72ae45aa4d6674f89e727cfe6bd27d7e32ecf96ab1edabdef289245671fd469497e1a5d2bc807e6812a2307d3eb0f954a82a8e1f075df4326088d85b870
-
SSDEEP
12288:ywbLgPluxQhMbaIMu7L5NVErCA4z2g6rTcbckPU82900N0Xo3LLFzTM8bQr28mw2:JbLgdeQhfdmMSirYbcMNnBm
Malware Config
Signatures
-
Wannacry
WannaCry is a ransomware cryptoworm.
-
Contacts a large (3283) amount of remote hosts 1 TTPs
This may indicate a network scan to discover remotely running services.
-
Executes dropped EXE 3 IoCs
pid Process 3056 mssecsvc.exe 2512 mssecsvc.exe 2260 tasksche.exe -
Creates a large amount of network flows 1 TTPs
This may indicate a network scan to discover remotely running services.
-
Drops file in System32 directory 1 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\Temporary Internet Files\counters.dat mssecsvc.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\WINDOWS\mssecsvc.exe rundll32.exe File created C:\WINDOWS\tasksche.exe mssecsvc.exe -
Modifies data under HKEY_USERS 1 IoCs
description ioc Process Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings mssecsvc.exe -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 904 wrote to memory of 1864 904 rundll32.exe 30 PID 904 wrote to memory of 1864 904 rundll32.exe 30 PID 904 wrote to memory of 1864 904 rundll32.exe 30 PID 904 wrote to memory of 1864 904 rundll32.exe 30 PID 904 wrote to memory of 1864 904 rundll32.exe 30 PID 904 wrote to memory of 1864 904 rundll32.exe 30 PID 904 wrote to memory of 1864 904 rundll32.exe 30 PID 1864 wrote to memory of 3056 1864 rundll32.exe 31 PID 1864 wrote to memory of 3056 1864 rundll32.exe 31 PID 1864 wrote to memory of 3056 1864 rundll32.exe 31 PID 1864 wrote to memory of 3056 1864 rundll32.exe 31
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\5ce475f1319e2fc3ce180481fe2076c5_JaffaCakes118.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:904 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\5ce475f1319e2fc3ce180481fe2076c5_JaffaCakes118.dll,#12⤵
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:1864 -
C:\WINDOWS\mssecsvc.exeC:\WINDOWS\mssecsvc.exe3⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:3056 -
C:\WINDOWS\tasksche.exeC:\WINDOWS\tasksche.exe /i4⤵
- Executes dropped EXE
PID:2260
-
-
-
-
C:\WINDOWS\mssecsvc.exeC:\WINDOWS\mssecsvc.exe -m security1⤵
- Executes dropped EXE
- Drops file in System32 directory
- Modifies data under HKEY_USERS
PID:2512
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3.6MB
MD583dc595d785f0390988dc93db83e54e7
SHA1106d659897adb5ad91dd9e2cb81daae25db2caa8
SHA2564da565d82edd3c7b4ea2b1c47010b4676365bc800bd793cb205156da8f8563e2
SHA5129fedc63040eed6b522a56d82ab4a38b8c778f5e3fdf9f9792ee6d60fab67b04d15a7eb7efb97ebce5336eecdd8e58339b3ba787446ac8f2feddb63afe1b52341
-
Filesize
3.4MB
MD51456612fadf028f514760ab4e5083141
SHA1ef1b7b6d35686c4423b41dc8cd45ed55741c5797
SHA256b6590fb7124a01cd8b1d1fd60bf992d5ed3c8fe05f707a87c57c60d5b90fe543
SHA5124a0a578c75ed4e04d6ca80d553fb1ef1b0a5d036c9e19a386515e98cd3824d4b155946a104a68f7631a8e19b7330d7ba8668ff7093140353fcdd84afe957d44b