Analysis

  • max time kernel
    150s
  • max time network
    150s
  • platform
    windows7_x64
  • resource
    win7-20240708-en
  • resource tags

    arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system
  • submitted
    12-08-2024 16:06

General

  • Target

    8f60323ecdbbd33f58430a9e84d508eb_JaffaCakes118.dll

  • Size

    5.0MB

  • MD5

    8f60323ecdbbd33f58430a9e84d508eb

  • SHA1

    72f1f34beaaa2f4d73c3e364ebc220e0481c6153

  • SHA256

    69f1817165685f56295cba654b84eb9ca5bd598be118f04b9f79688b928ee13c

  • SHA512

    c3aa160a428be0a8f4f21de47d59b4a7c97c069e57767532fccb2c9298a30eb550e97944731c7cbeb3d941e86fcd7b86900702a69ff2b5d4b15ebef4f0e1173d

  • SSDEEP

    24576:SbLgd3yt4IiXctzDqGJ0cy7+Z0vIikqbNNkrKLSR2lyFlSPjCSQOqsqbYqK:SnmLIishzy71v/rbhSR24DZS

Malware Config

Signatures

  • Wannacry

    WannaCry is a ransomware cryptoworm.

  • Contacts a large (3184) amount of remote hosts 1 TTPs

    This may indicate a network scan to discover remotely running services.

  • Executes dropped EXE 2 IoCs
  • Creates a large amount of network flows 1 TTPs

    This may indicate a network scan to discover remotely running services.

  • Drops file in System32 directory 1 IoCs
  • Drops file in Windows directory 2 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies data under HKEY_USERS 24 IoCs
  • Suspicious use of WriteProcessMemory 11 IoCs

Processes

  • C:\Windows\system32\rundll32.exe
    rundll32.exe C:\Users\Admin\AppData\Local\Temp\8f60323ecdbbd33f58430a9e84d508eb_JaffaCakes118.dll,#1
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2328
    • C:\Windows\SysWOW64\rundll32.exe
      rundll32.exe C:\Users\Admin\AppData\Local\Temp\8f60323ecdbbd33f58430a9e84d508eb_JaffaCakes118.dll,#1
      2⤵
      • Drops file in Windows directory
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:3036
      • C:\WINDOWS\mssecsvc.exe
        C:\WINDOWS\mssecsvc.exe
        3⤵
        • Executes dropped EXE
        • Drops file in Windows directory
        • System Location Discovery: System Language Discovery
        PID:1940
  • C:\WINDOWS\mssecsvc.exe
    C:\WINDOWS\mssecsvc.exe -m security
    1⤵
    • Executes dropped EXE
    • Drops file in System32 directory
    • System Location Discovery: System Language Discovery
    • Modifies data under HKEY_USERS
    PID:2540

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Windows\mssecsvc.exe

    Filesize

    3.6MB

    MD5

    6b4ac3cc3691ff805bb5ce9551c1bf72

    SHA1

    c05454c6d14a56824176611708581ef4689e4b0c

    SHA256

    695f9c29b4e13900ff7ee5ef803dd9a0be6d62eb22d6906d9d2aac58a1c0ad7d

    SHA512

    c4bba11b56b6d0e98079f680f387996a628620149f187ab91fc7e1f1cabd27680f7e2df20d9ec6b77f199f25c7d9efedff4e2d8cf9e603572282523565a5f340