Analysis

  • max time kernel
    150s
  • max time network
    152s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240709-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system
  • submitted
    24-07-2024 22:20

General

  • Target

    6d0270440e080a1b40a9389a830eeb54_JaffaCakes118.dll

  • Size

    5.0MB

  • MD5

    6d0270440e080a1b40a9389a830eeb54

  • SHA1

    650413cc676c3c6020f997fdcda7a222531d769f

  • SHA256

    33b06096ea66dae40a349d477d7daa7a6616b8b9e11ba2f14d183e0cea553d3d

  • SHA512

    e4bc2729c914a9b91d397f499d65f55a5bf54452763ed70aff78cee442e31d39e8bfa492f2ed5b923acd038f36669a5e9da49906d0527e2626fb7bb6c9ec61ae

  • SSDEEP

    98304:T8qPoBhz1aRxcSUDk36SAEdhvxWa9P593R8yAVp2H:T8qPe1Cxcxk3ZAEUadzR8yc4H

Malware Config

Signatures

  • Wannacry

    WannaCry is a ransomware cryptoworm.

  • Contacts a large (3305) amount of remote hosts 1 TTPs

    This may indicate a network scan to discover remotely running services.

  • Executes dropped EXE 3 IoCs
  • Creates a large amount of network flows 1 TTPs

    This may indicate a network scan to discover remotely running services.

  • Drops file in Windows directory 2 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Windows\system32\rundll32.exe
    rundll32.exe C:\Users\Admin\AppData\Local\Temp\6d0270440e080a1b40a9389a830eeb54_JaffaCakes118.dll,#1
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:4408
    • C:\Windows\SysWOW64\rundll32.exe
      rundll32.exe C:\Users\Admin\AppData\Local\Temp\6d0270440e080a1b40a9389a830eeb54_JaffaCakes118.dll,#1
      2⤵
      • Drops file in Windows directory
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:2644
      • C:\WINDOWS\mssecsvc.exe
        C:\WINDOWS\mssecsvc.exe
        3⤵
        • Executes dropped EXE
        • Drops file in Windows directory
        • System Location Discovery: System Language Discovery
        PID:2108
        • C:\WINDOWS\tasksche.exe
          C:\WINDOWS\tasksche.exe /i
          4⤵
          • Executes dropped EXE
          PID:3996
  • C:\WINDOWS\mssecsvc.exe
    C:\WINDOWS\mssecsvc.exe -m security
    1⤵
    • Executes dropped EXE
    • System Location Discovery: System Language Discovery
    PID:2492

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Windows\mssecsvc.exe

    Filesize

    3.6MB

    MD5

    e6012315930c5b2a7d584e704ac5fb8c

    SHA1

    777b3a7aaf869da2ddff6b63c6e2587317d550c5

    SHA256

    df7bb854097066e444e43f2efd1d0e44a81b2f2ff59c8fa294ea1a9ea047fd7a

    SHA512

    49c6d31c4257cf0914e900b83c32cc53149282b56603a1cf92f810e8266fe69480a8faa87bbc0f4bab71c70812e582c899878971db38919138416bb829073165

  • C:\Windows\tasksche.exe

    Filesize

    3.4MB

    MD5

    7f7ccaa16fb15eb1c7399d422f8363e8

    SHA1

    bd44d0ab543bf814d93b719c24e90d8dd7111234

    SHA256

    2584e1521065e45ec3c17767c065429038fc6291c091097ea8b22c8a502c41dd

    SHA512

    83e334b80de08903cfa9891a3fa349c1ece7e19f8e62b74a017512fa9a7989a0fd31929bf1fc13847bee04f2da3dacf6bc3f5ee58f0e4b9d495f4b9af12ed2b7