Analysis
-
max time kernel
150s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
19-07-2024 17:15
Static task
static1
Behavioral task
behavioral1
Sample
5ce475f1319e2fc3ce180481fe2076c5_JaffaCakes118.dll
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
5ce475f1319e2fc3ce180481fe2076c5_JaffaCakes118.dll
Resource
win10v2004-20240709-en
General
-
Target
5ce475f1319e2fc3ce180481fe2076c5_JaffaCakes118.dll
-
Size
5.0MB
-
MD5
5ce475f1319e2fc3ce180481fe2076c5
-
SHA1
db0f7f265aecbd9540c1afbadc76f194507deab5
-
SHA256
0db9746d82f929f89c45aa86c9ce9ab2698f88bc936d8643042ca3ed0c67bdf9
-
SHA512
495af72ae45aa4d6674f89e727cfe6bd27d7e32ecf96ab1edabdef289245671fd469497e1a5d2bc807e6812a2307d3eb0f954a82a8e1f075df4326088d85b870
-
SSDEEP
12288:ywbLgPluxQhMbaIMu7L5NVErCA4z2g6rTcbckPU82900N0Xo3LLFzTM8bQr28mw2:JbLgdeQhfdmMSirYbcMNnBm
Malware Config
Signatures
-
Wannacry
WannaCry is a ransomware cryptoworm.
-
Contacts a large (3276) amount of remote hosts 1 TTPs
This may indicate a network scan to discover remotely running services.
-
Executes dropped EXE 3 IoCs
pid Process 4656 mssecsvc.exe 2924 mssecsvc.exe 4188 tasksche.exe -
Creates a large amount of network flows 1 TTPs
This may indicate a network scan to discover remotely running services.
-
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\WINDOWS\mssecsvc.exe rundll32.exe File created C:\WINDOWS\tasksche.exe mssecsvc.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 2852 wrote to memory of 4756 2852 rundll32.exe 84 PID 2852 wrote to memory of 4756 2852 rundll32.exe 84 PID 2852 wrote to memory of 4756 2852 rundll32.exe 84 PID 4756 wrote to memory of 4656 4756 rundll32.exe 85 PID 4756 wrote to memory of 4656 4756 rundll32.exe 85 PID 4756 wrote to memory of 4656 4756 rundll32.exe 85
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\5ce475f1319e2fc3ce180481fe2076c5_JaffaCakes118.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:2852 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\5ce475f1319e2fc3ce180481fe2076c5_JaffaCakes118.dll,#12⤵
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:4756 -
C:\WINDOWS\mssecsvc.exeC:\WINDOWS\mssecsvc.exe3⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:4656 -
C:\WINDOWS\tasksche.exeC:\WINDOWS\tasksche.exe /i4⤵
- Executes dropped EXE
PID:4188
-
-
-
-
C:\WINDOWS\mssecsvc.exeC:\WINDOWS\mssecsvc.exe -m security1⤵
- Executes dropped EXE
PID:2924
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3.6MB
MD583dc595d785f0390988dc93db83e54e7
SHA1106d659897adb5ad91dd9e2cb81daae25db2caa8
SHA2564da565d82edd3c7b4ea2b1c47010b4676365bc800bd793cb205156da8f8563e2
SHA5129fedc63040eed6b522a56d82ab4a38b8c778f5e3fdf9f9792ee6d60fab67b04d15a7eb7efb97ebce5336eecdd8e58339b3ba787446ac8f2feddb63afe1b52341
-
Filesize
3.4MB
MD51456612fadf028f514760ab4e5083141
SHA1ef1b7b6d35686c4423b41dc8cd45ed55741c5797
SHA256b6590fb7124a01cd8b1d1fd60bf992d5ed3c8fe05f707a87c57c60d5b90fe543
SHA5124a0a578c75ed4e04d6ca80d553fb1ef1b0a5d036c9e19a386515e98cd3824d4b155946a104a68f7631a8e19b7330d7ba8668ff7093140353fcdd84afe957d44b