Analysis
-
max time kernel
150s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
25-08-2024 05:18
Static task
static1
Behavioral task
behavioral1
Sample
c00746c27c6f8cf3c8e99e49cd02609d_JaffaCakes118.dll
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
c00746c27c6f8cf3c8e99e49cd02609d_JaffaCakes118.dll
Resource
win10v2004-20240802-en
General
-
Target
c00746c27c6f8cf3c8e99e49cd02609d_JaffaCakes118.dll
-
Size
5.0MB
-
MD5
c00746c27c6f8cf3c8e99e49cd02609d
-
SHA1
d6fd7e085422e23b56bb53355528f4889425ac3c
-
SHA256
87472f9d103ac03e57a2ed4b5d7e0a239c48bd371a00d35696a067804233f3e2
-
SHA512
0dc37029c2935cf254c9fa6aee5e4dd5afb6a84a807403bad44ed7af7d90ccd543e86fa8d5422fd52ab96498529e5e5259fe7328b12e3f42161baf1c9be4d39b
-
SSDEEP
49152:SnjQqMSPbcBVQej/1INRx+TSqTdX1HkQo6SAARdhnv:+8qPoBhz1aRxcSUDk36SAEdhv
Malware Config
Signatures
-
Wannacry
WannaCry is a ransomware cryptoworm.
-
Contacts a large (3379) amount of remote hosts 1 TTPs
This may indicate a network scan to discover remotely running services.
-
Executes dropped EXE 3 IoCs
pid Process 1316 mssecsvc.exe 2800 mssecsvc.exe 1044 tasksche.exe -
Creates a large amount of network flows 1 TTPs
This may indicate a network scan to discover remotely running services.
-
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\WINDOWS\mssecsvc.exe rundll32.exe File created C:\WINDOWS\tasksche.exe mssecsvc.exe -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mssecsvc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mssecsvc.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 3428 wrote to memory of 2972 3428 rundll32.exe 84 PID 3428 wrote to memory of 2972 3428 rundll32.exe 84 PID 3428 wrote to memory of 2972 3428 rundll32.exe 84 PID 2972 wrote to memory of 1316 2972 rundll32.exe 85 PID 2972 wrote to memory of 1316 2972 rundll32.exe 85 PID 2972 wrote to memory of 1316 2972 rundll32.exe 85
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\c00746c27c6f8cf3c8e99e49cd02609d_JaffaCakes118.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:3428 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\c00746c27c6f8cf3c8e99e49cd02609d_JaffaCakes118.dll,#12⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2972 -
C:\WINDOWS\mssecsvc.exeC:\WINDOWS\mssecsvc.exe3⤵
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:1316 -
C:\WINDOWS\tasksche.exeC:\WINDOWS\tasksche.exe /i4⤵
- Executes dropped EXE
PID:1044
-
-
-
-
C:\WINDOWS\mssecsvc.exeC:\WINDOWS\mssecsvc.exe -m security1⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2800
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3.6MB
MD50a43264152308915166b769cb06e5c22
SHA1842a188d078d2feea50bd7caec1340262ec403ce
SHA2563d262736288b669891351783caedd1312436c8446ad4f713222bed1669222104
SHA512a0b8226f097a7edf099584c8666cac1d285aedd456354396381d90d6587accf50497ad86a0620213b7496e973d3adafd220df5a88b2612477e1bfdb3659ff3a1
-
Filesize
3.4MB
MD50c47cb295262b88d54e6c38aaae45083
SHA1c5af34f55b424fd3b1d50d8257bc2339330e8462
SHA25689d41ea8ff8ede377c17078b8c1f471d84fe1a5e3c51d50455f99edc4c40fc94
SHA512688ce8730e0b31990fba2c01a81055af0af0875d4106bb8fa566b8de35ef5fb48b70dae9b295fd391fb24db21cebfdc6fd7ac9f8bb84f3c54b8416b86b2f6fc4