Analysis

  • max time kernel
    150s
  • max time network
    150s
  • platform
    windows7_x64
  • resource
    win7-20240705-en
  • resource tags

    arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system
  • submitted
    19-08-2024 03:02

General

  • Target

    a9530b1bf77e4147b0897565a54ea0fd_JaffaCakes118.dll

  • Size

    5.0MB

  • MD5

    a9530b1bf77e4147b0897565a54ea0fd

  • SHA1

    65cf9cadecd520d7051dfdfe7c11e5c100b4b819

  • SHA256

    d1defdf54699d79d34b2f83d8e0d3422090d0950ee0f4b0f7b7c998bf19c9cec

  • SHA512

    d4390fa16c90075ae727c85bf52b74a2c7169c2e2826e5e1834f9534e4aaa57d987b1fd22523c4c5c3da2c09ce6fe8cffb002c9ef418e73b4d5594a2161a56c9

  • SSDEEP

    49152:RnnMSPbcBVQej/1INRx+TSqTdX1HkQo6SAXivRdhnv:1nPoBhz1aRxcSUDk36SAXiZdhv

Malware Config

Signatures

  • Wannacry

    WannaCry is a ransomware cryptoworm.

  • Contacts a large (3113) amount of remote hosts 1 TTPs

    This may indicate a network scan to discover remotely running services.

  • Executes dropped EXE 2 IoCs
  • Creates a large amount of network flows 1 TTPs

    This may indicate a network scan to discover remotely running services.

  • Drops file in System32 directory 5 IoCs
  • Drops file in Windows directory 2 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies data under HKEY_USERS 24 IoCs
  • Suspicious use of WriteProcessMemory 11 IoCs

Processes

  • C:\Windows\system32\rundll32.exe
    rundll32.exe C:\Users\Admin\AppData\Local\Temp\a9530b1bf77e4147b0897565a54ea0fd_JaffaCakes118.dll,#1
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2780
    • C:\Windows\SysWOW64\rundll32.exe
      rundll32.exe C:\Users\Admin\AppData\Local\Temp\a9530b1bf77e4147b0897565a54ea0fd_JaffaCakes118.dll,#1
      2⤵
      • Drops file in Windows directory
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:2816
      • C:\WINDOWS\mssecsvr.exe
        C:\WINDOWS\mssecsvr.exe
        3⤵
        • Executes dropped EXE
        • Drops file in Windows directory
        • System Location Discovery: System Language Discovery
        PID:2928
  • C:\WINDOWS\mssecsvr.exe
    C:\WINDOWS\mssecsvr.exe -m security
    1⤵
    • Executes dropped EXE
    • Drops file in System32 directory
    • System Location Discovery: System Language Discovery
    • Modifies data under HKEY_USERS
    PID:1736

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Windows\mssecsvr.exe

    Filesize

    2.2MB

    MD5

    152c3616d46169bcfb00bc1c7e9ac472

    SHA1

    10e5f06e894c2d617b72afeda1ae3fd94ccc1931

    SHA256

    1c2abccc6339037ed813840435eaffa02789481b01b529078543cec9691348c1

    SHA512

    3eed6751c20fd70c324698abf0ff8aaf1ac6d59ad7e6e906ad2fbbc1b36491fa57bef8faeb14b507d787b74c08275ab4e6bc6132b77b54462d46ac51caa8cd8c