Analysis

  • max time kernel
    150s
  • max time network
    155s
  • platform
    windows7_x64
  • resource
    win7-20240704-en
  • resource tags

    arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system
  • submitted
    31-07-2024 07:55

General

  • Target

    7bcceca57402c25aa5f2410480f6c515_JaffaCakes118.dll

  • Size

    5.0MB

  • MD5

    7bcceca57402c25aa5f2410480f6c515

  • SHA1

    08913b0ce5b6357c02dbff3557f31ad317ecc753

  • SHA256

    e27787a3aceac31b912f39e97d49e5bf5b2e19cc16c710a14d6943e31f3658b7

  • SHA512

    653fd350b4a8a233a08c0e9f64642b49a8f9712605a30b2e18bec3e06e9785da91fa90a1bcd857382933e137a197dd6aaba1fc1b15126139f2b663a5284cecee

  • SSDEEP

    49152:znAQqMSPbcBVQej/1INRx+TSqTdX1HkQo6SAAD8yAH1plAH:TDqPoBhz1aRxcSUDk36SAg8yAVp2H

Malware Config

Signatures

  • Wannacry

    WannaCry is a ransomware cryptoworm.

  • Contacts a large (3205) amount of remote hosts 1 TTPs

    This may indicate a network scan to discover remotely running services.

  • Executes dropped EXE 3 IoCs
  • Creates a large amount of network flows 1 TTPs

    This may indicate a network scan to discover remotely running services.

  • Drops file in System32 directory 1 IoCs
  • Drops file in Windows directory 2 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies data under HKEY_USERS 24 IoCs
  • Suspicious use of WriteProcessMemory 11 IoCs

Processes

  • C:\Windows\system32\rundll32.exe
    rundll32.exe C:\Users\Admin\AppData\Local\Temp\7bcceca57402c25aa5f2410480f6c515_JaffaCakes118.dll,#1
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2376
    • C:\Windows\SysWOW64\rundll32.exe
      rundll32.exe C:\Users\Admin\AppData\Local\Temp\7bcceca57402c25aa5f2410480f6c515_JaffaCakes118.dll,#1
      2⤵
      • Drops file in Windows directory
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:2952
      • C:\WINDOWS\mssecsvc.exe
        C:\WINDOWS\mssecsvc.exe
        3⤵
        • Executes dropped EXE
        • Drops file in Windows directory
        • System Location Discovery: System Language Discovery
        PID:2968
        • C:\WINDOWS\tasksche.exe
          C:\WINDOWS\tasksche.exe /i
          4⤵
          • Executes dropped EXE
          PID:2644
  • C:\WINDOWS\mssecsvc.exe
    C:\WINDOWS\mssecsvc.exe -m security
    1⤵
    • Executes dropped EXE
    • Drops file in System32 directory
    • System Location Discovery: System Language Discovery
    • Modifies data under HKEY_USERS
    PID:2032

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Windows\mssecsvc.exe

    Filesize

    3.6MB

    MD5

    182c6af504b2f776e46a4d4ee2aa3471

    SHA1

    99c250cc48d9a5c79550b9f61aea3ade2cd99187

    SHA256

    c63e0d8a241bbead89e3e4154070f523b78b509a073836497e11154a8b38b9df

    SHA512

    b539dba594f447ceaf6d1984aa578c1990c7aab55ed4572c0b37f6d47773df99ab7f4eed1915c48055d5fcf42dfe52a63a9969568e28c1c2920538e089c05139

  • C:\Windows\tasksche.exe

    Filesize

    3.4MB

    MD5

    c614ee43316b9d409a65b91a1644429f

    SHA1

    8fb0f4ec1ebb2bb82ebd089d541ea0148f5c49a9

    SHA256

    02e3ccd01c8b231b0179d19b1c86e374a7a4864f3762faad15f5f5077a3bc76f

    SHA512

    0a9f3ef85398a2156f3637e9db5c31bba0ace601bdb0e238c46a3fb174b9a90f6947052b391ec9be3265076df2eb804d9cca9d5a10cc868b117be9e9ea276c4b