Analysis
-
max time kernel
150s -
max time network
150s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
22-07-2024 00:43
Static task
static1
Behavioral task
behavioral1
Sample
62186bebffffcfafb1c70a8ff03fa317_JaffaCakes118.dll
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
62186bebffffcfafb1c70a8ff03fa317_JaffaCakes118.dll
Resource
win10v2004-20240709-en
General
-
Target
62186bebffffcfafb1c70a8ff03fa317_JaffaCakes118.dll
-
Size
5.0MB
-
MD5
62186bebffffcfafb1c70a8ff03fa317
-
SHA1
6fc4434a5fc48ef8c1792f8d7ca49cba14556378
-
SHA256
1dd001ef5ae3fdc07d44feae5246b23f199e01ce4f7e2b7dd5a354f7aea227fa
-
SHA512
8cb8d6f6e26cf4e5dd9a894025fe4c8063f3c13bf52a4b0faefcb27f1c95ec2121d9f8d3a4365da34483061d69f1c0da639fc7429a49e4091a2a35dac5775135
-
SSDEEP
49152:JnjQqMSPbcBVQej/1INRx+TSqTdX1HkQo6SAARd:d8qPoBhz1aRxcSUDk36SAEd
Malware Config
Signatures
-
Wannacry
WannaCry is a ransomware cryptoworm.
-
Contacts a large (3187) amount of remote hosts 1 TTPs
This may indicate a network scan to discover remotely running services.
-
Executes dropped EXE 3 IoCs
pid Process 1972 mssecsvc.exe 2552 mssecsvc.exe 2396 tasksche.exe -
Creates a large amount of network flows 1 TTPs
This may indicate a network scan to discover remotely running services.
-
Drops file in System32 directory 1 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\Temporary Internet Files\counters.dat mssecsvc.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\WINDOWS\mssecsvc.exe rundll32.exe File created C:\WINDOWS\tasksche.exe mssecsvc.exe -
Modifies data under HKEY_USERS 1 IoCs
description ioc Process Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings mssecsvc.exe -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 1712 wrote to memory of 1700 1712 rundll32.exe 30 PID 1712 wrote to memory of 1700 1712 rundll32.exe 30 PID 1712 wrote to memory of 1700 1712 rundll32.exe 30 PID 1712 wrote to memory of 1700 1712 rundll32.exe 30 PID 1712 wrote to memory of 1700 1712 rundll32.exe 30 PID 1712 wrote to memory of 1700 1712 rundll32.exe 30 PID 1712 wrote to memory of 1700 1712 rundll32.exe 30 PID 1700 wrote to memory of 1972 1700 rundll32.exe 31 PID 1700 wrote to memory of 1972 1700 rundll32.exe 31 PID 1700 wrote to memory of 1972 1700 rundll32.exe 31 PID 1700 wrote to memory of 1972 1700 rundll32.exe 31
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\62186bebffffcfafb1c70a8ff03fa317_JaffaCakes118.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1712 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\62186bebffffcfafb1c70a8ff03fa317_JaffaCakes118.dll,#12⤵
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:1700 -
C:\WINDOWS\mssecsvc.exeC:\WINDOWS\mssecsvc.exe3⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:1972 -
C:\WINDOWS\tasksche.exeC:\WINDOWS\tasksche.exe /i4⤵
- Executes dropped EXE
PID:2396
-
-
-
-
C:\WINDOWS\mssecsvc.exeC:\WINDOWS\mssecsvc.exe -m security1⤵
- Executes dropped EXE
- Drops file in System32 directory
- Modifies data under HKEY_USERS
PID:2552
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3.6MB
MD5929b5c4d4aa798214e85226ad735c229
SHA17d7f88545a844bd9e4e51263d8e3f2548e3d112f
SHA2563d57f0bc2b6d14cf215d70d5f6e525622d1e451626c26a8fa9d2daf47de6c8f8
SHA512fc89df57b54be5aef57fd9e2328bdc181895aee73813d0ecb867815e69d8987f084ffbb570f049c1ff371851500ef0121dd12ebe809acbc6cc2337203444353d
-
Filesize
3.4MB
MD5db04f37a8f947c39285253dbf4eb490f
SHA1ac9c6ae440c86c6df633c8c156809cfce4254064
SHA2564038bd684b85e9451ca37e7233c2b39dbf0ad7967829179b75cafc0c661c986b
SHA512b17162b1dfe12465e2b8fbf9f70f8e5a646a9798ff6625cf6181a62e65ebbd4a1773daa7cc954caf7bf6907c990b487847aa3a4cbb5cf6f5575cdeb5b1d09296