Analysis

  • max time kernel
    150s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    25-08-2024 15:53

General

  • Target

    c113b4c6b800aaf04e97194c239760ce_JaffaCakes118.dll

  • Size

    5.0MB

  • MD5

    c113b4c6b800aaf04e97194c239760ce

  • SHA1

    6808c1f69cf5b9e37188de7716c70265f44dda27

  • SHA256

    50e3a3bf860227fff83b8005e6cee4d84fc88150191a732cb9c357879f4a6dff

  • SHA512

    d9ae48d57a38982f035cfe4b5de93d5d94ece529459ac7ed32d9bf6ee64211c1c2526c63a8b882884064ed8d63239e78f57f275c8eeb8255dc6ae96d47ae84a7

  • SSDEEP

    98304:d8qPoBhz1aRxcSUDk36SAEdhvxWa9P59N2H:d8qPe1Cxcxk3ZAEUadYH

Malware Config

Signatures

  • Wannacry

    WannaCry is a ransomware cryptoworm.

  • Contacts a large (3299) amount of remote hosts 1 TTPs

    This may indicate a network scan to discover remotely running services.

  • Executes dropped EXE 3 IoCs
  • Creates a large amount of network flows 1 TTPs

    This may indicate a network scan to discover remotely running services.

  • Drops file in Windows directory 2 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Windows\system32\rundll32.exe
    rundll32.exe C:\Users\Admin\AppData\Local\Temp\c113b4c6b800aaf04e97194c239760ce_JaffaCakes118.dll,#1
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1056
    • C:\Windows\SysWOW64\rundll32.exe
      rundll32.exe C:\Users\Admin\AppData\Local\Temp\c113b4c6b800aaf04e97194c239760ce_JaffaCakes118.dll,#1
      2⤵
      • Drops file in Windows directory
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:4856
      • C:\WINDOWS\mssecsvc.exe
        C:\WINDOWS\mssecsvc.exe
        3⤵
        • Executes dropped EXE
        • Drops file in Windows directory
        • System Location Discovery: System Language Discovery
        PID:4328
        • C:\WINDOWS\tasksche.exe
          C:\WINDOWS\tasksche.exe /i
          4⤵
          • Executes dropped EXE
          PID:4784
  • C:\WINDOWS\mssecsvc.exe
    C:\WINDOWS\mssecsvc.exe -m security
    1⤵
    • Executes dropped EXE
    • System Location Discovery: System Language Discovery
    PID:4008

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Windows\mssecsvc.exe

    Filesize

    3.6MB

    MD5

    cfe9d8d7f313652cb6972efa2e73bf57

    SHA1

    557f2b513b12095a2a621cfada882271bc1d22a6

    SHA256

    d3580a2fe78295df8b4b5c724364c0fe326a29c595f19ab0f5a0e4ef68929ad4

    SHA512

    ad850f8be53558b4cb39c63cacc2f3a4c0da1e51088cff26b62abe246cabfba2e23e3f3a53f1099c2715f97020ecdbcb1f007f5c66ae8478f6bb0640f057cfe2

  • C:\Windows\tasksche.exe

    Filesize

    3.4MB

    MD5

    59c01fe27118952e8bd265409ebeef36

    SHA1

    69480ae9e6fe8c3e4bf9f28fb1930442917d60d5

    SHA256

    4d3edeb41200637503f343c8329e7b3c7faae031f47099247c04fa05d7ef34f5

    SHA512

    537798fa73c311adad9a0834cb48ce6378ebc19a9209a71dee687e35e7bdd9b8f4afa0e8c52617e9b4f60731f20f6da6f77f95b09341427648e5409195033006