Analysis

  • max time kernel
    150s
  • max time network
    151s
  • platform
    windows7_x64
  • resource
    win7-20240708-en
  • resource tags

    arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system
  • submitted
    23-07-2024 14:14

General

  • Target

    67e4c40e171d9de8ee90763ad3b1ea96_JaffaCakes118.dll

  • Size

    5.0MB

  • MD5

    67e4c40e171d9de8ee90763ad3b1ea96

  • SHA1

    758467d777fd49fbcdbd1a252221f23b7ad7004f

  • SHA256

    1ec3e2414cfbfde6262c4860516eca5411a10992381d531750c7a1856c8714f5

  • SHA512

    fcb3f222f75012e823f9cfe07243c245091be8fa8ac21eec50af9e55e24f162a6b99ed4b4cf5993a842e25067a6c9c399c5c8c21e27c2aba5dce1391820477bf

  • SSDEEP

    49152:SnAQqMSPbcBVI/1INRx+TSqTdX1HkQo6SAARdhnvxJM0H9:+DqPoBC1aRxcSUDk36SAEdhvxWa9

Malware Config

Signatures

  • Wannacry

    WannaCry is a ransomware cryptoworm.

  • Contacts a large (3324) amount of remote hosts 1 TTPs

    This may indicate a network scan to discover remotely running services.

  • Executes dropped EXE 3 IoCs
  • Creates a large amount of network flows 1 TTPs

    This may indicate a network scan to discover remotely running services.

  • Drops file in System32 directory 1 IoCs
  • Drops file in Windows directory 2 IoCs
  • Modifies data under HKEY_USERS 24 IoCs
  • Suspicious use of WriteProcessMemory 11 IoCs

Processes

  • C:\Windows\system32\rundll32.exe
    rundll32.exe C:\Users\Admin\AppData\Local\Temp\67e4c40e171d9de8ee90763ad3b1ea96_JaffaCakes118.dll,#1
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2880
    • C:\Windows\SysWOW64\rundll32.exe
      rundll32.exe C:\Users\Admin\AppData\Local\Temp\67e4c40e171d9de8ee90763ad3b1ea96_JaffaCakes118.dll,#1
      2⤵
      • Drops file in Windows directory
      • Suspicious use of WriteProcessMemory
      PID:2940
      • C:\WINDOWS\mssecsvc.exe
        C:\WINDOWS\mssecsvc.exe
        3⤵
        • Executes dropped EXE
        • Drops file in Windows directory
        PID:3024
        • C:\WINDOWS\tasksche.exe
          C:\WINDOWS\tasksche.exe /i
          4⤵
          • Executes dropped EXE
          PID:2596
  • C:\WINDOWS\mssecsvc.exe
    C:\WINDOWS\mssecsvc.exe -m security
    1⤵
    • Executes dropped EXE
    • Drops file in System32 directory
    • Modifies data under HKEY_USERS
    PID:2916

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Windows\mssecsvc.exe

    Filesize

    3.6MB

    MD5

    3ec64b8581cdcc2c04c507a024c1420b

    SHA1

    e8b5acd08cf06bb70d6ad3c83d883f7b2dfb2b4d

    SHA256

    faa9d3ffecd9b6a0a44e9505b6ae04cb322128fd32842fedc400e3875513369c

    SHA512

    533a97dfc1eab5c88e25f18e3a2c4b793de84adefcaefea9323d12ed0c690c5967890eca2d6968341c26323d2cfa3d517fe68cf84e9136934e6ace14109f17e9

  • C:\Windows\tasksche.exe

    Filesize

    3.4MB

    MD5

    bf99a876e20591c313195e392c508221

    SHA1

    9b77767175ea56123b3cdc5b1e83a984476542ab

    SHA256

    436b4dce2c9839a0cdcf28b175d2b46598ce548dc080987487f62e50fa83dcb2

    SHA512

    aece9efbbfe3741cd44cceb0318e0b332015fb98f96a7775a9ca72e6295624bc52fd14652a76bb139f382374f6edf09f8227be96ff8a89fd22197fa3cb0ae143