Analysis

  • max time kernel
    150s
  • max time network
    150s
  • platform
    windows7_x64
  • resource
    win7-20240708-en
  • resource tags

    arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system
  • submitted
    26-08-2024 04:12

General

  • Target

    c24245382f00395061b695c6156301e1_JaffaCakes118.dll

  • Size

    5.0MB

  • MD5

    c24245382f00395061b695c6156301e1

  • SHA1

    dafb0bd90559adb8da2c816172202420fb24ba71

  • SHA256

    60f2d2df3fc462ab21f6aac50edbd58f9f2aa2ce917d0eb7132bddf76845c39e

  • SHA512

    5ba8d775e099b766e8dd1be677e30a278512f821ad2880d325a16020bf4badb11cb3fabf9ccd6c7f0ef6e8714a51ad8861ba2454f6c2b54ae3ac57d66498afee

  • SSDEEP

    49152:SnAQqMSPbcBVQej/1INRx+TSqTdX1HkQo6SAARdhnvxJM0H9PAME:+DqPoBhz1aRxcSUDk36SAEdhvxWa9P5

Malware Config

Signatures

  • Wannacry

    WannaCry is a ransomware cryptoworm.

  • Contacts a large (3028) amount of remote hosts 1 TTPs

    This may indicate a network scan to discover remotely running services.

  • Executes dropped EXE 3 IoCs
  • Creates a large amount of network flows 1 TTPs

    This may indicate a network scan to discover remotely running services.

  • Drops file in System32 directory 1 IoCs
  • Drops file in Windows directory 2 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies data under HKEY_USERS 24 IoCs
  • Suspicious use of WriteProcessMemory 11 IoCs

Processes

  • C:\Windows\system32\rundll32.exe
    rundll32.exe C:\Users\Admin\AppData\Local\Temp\c24245382f00395061b695c6156301e1_JaffaCakes118.dll,#1
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2636
    • C:\Windows\SysWOW64\rundll32.exe
      rundll32.exe C:\Users\Admin\AppData\Local\Temp\c24245382f00395061b695c6156301e1_JaffaCakes118.dll,#1
      2⤵
      • Drops file in Windows directory
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:2364
      • C:\WINDOWS\mssecsvc.exe
        C:\WINDOWS\mssecsvc.exe
        3⤵
        • Executes dropped EXE
        • Drops file in Windows directory
        • System Location Discovery: System Language Discovery
        PID:2688
        • C:\WINDOWS\tasksche.exe
          C:\WINDOWS\tasksche.exe /i
          4⤵
          • Executes dropped EXE
          PID:2632
  • C:\WINDOWS\mssecsvc.exe
    C:\WINDOWS\mssecsvc.exe -m security
    1⤵
    • Executes dropped EXE
    • Drops file in System32 directory
    • System Location Discovery: System Language Discovery
    • Modifies data under HKEY_USERS
    PID:2696

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Windows\mssecsvc.exe

    Filesize

    3.6MB

    MD5

    c6d62ea48e907a90d24991dd6d351362

    SHA1

    84da4f1bd3a269122bf87c3305f00b4cf30befda

    SHA256

    2744ff187491936c99101cda8a6a7e618ce570d1bffcabdb9d394643d937ffc1

    SHA512

    5f0d806b111967176de9a682192d6b4bf0f63baa4a511eacbeb66b0a80b279acbfd1aadb46d29b3b386b7bb7ffeb7d945601139322653b0a7d1a2cf7b12e5150

  • C:\Windows\tasksche.exe

    Filesize

    3.4MB

    MD5

    18cd1b0fa42b651602d7f2fe9be4496f

    SHA1

    2a2f6b6478716f0896fba98aec974dd928ee2924

    SHA256

    4f3b533069c1451dc13c82ad350820ccac8e907e356f2e89d960bdf1c8ab4b65

    SHA512

    7c4539b175e6c92fbd02c1780f66c7c21c3c481c0f130366f00c0d7304178ad5f3286f730613abe59323f4436610784ab128e7bb5eefabbd6959af05b29a36b0