Analysis

  • max time kernel
    150s
  • max time network
    150s
  • platform
    windows7_x64
  • resource
    win7-20240708-en
  • resource tags

    arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system
  • submitted
    26-08-2024 18:56

General

  • Target

    c39ef17b430500800eec81e2e533cd04_JaffaCakes118.dll

  • Size

    5.0MB

  • MD5

    c39ef17b430500800eec81e2e533cd04

  • SHA1

    3a1877c5ac546c0b775ef1d4120504b635997c41

  • SHA256

    b02e20777f567446bbec7866ec617df54f9b364e8b3325af01aee64aef1e5ff3

  • SHA512

    3c24f1f4e658fa933cc92f0a6daa8d47acb98a2799ef6bf43198809977d8e76337f046cc5fbb28b8c5f930e29cb24446e36fd7b3e633d36c559ba706c14321f2

  • SSDEEP

    49152:SnAQqMSPbcBVQej/1INRx+TSqTdX1HkQo6SAAQ:+DqPoBhz1aRxcSUDk36SA

Malware Config

Signatures

  • Wannacry

    WannaCry is a ransomware cryptoworm.

  • Contacts a large (3145) amount of remote hosts 1 TTPs

    This may indicate a network scan to discover remotely running services.

  • Executes dropped EXE 3 IoCs
  • Creates a large amount of network flows 1 TTPs

    This may indicate a network scan to discover remotely running services.

  • Drops file in System32 directory 1 IoCs
  • Drops file in Windows directory 2 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies data under HKEY_USERS 24 IoCs
  • Suspicious use of WriteProcessMemory 11 IoCs

Processes

  • C:\Windows\system32\rundll32.exe
    rundll32.exe C:\Users\Admin\AppData\Local\Temp\c39ef17b430500800eec81e2e533cd04_JaffaCakes118.dll,#1
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2508
    • C:\Windows\SysWOW64\rundll32.exe
      rundll32.exe C:\Users\Admin\AppData\Local\Temp\c39ef17b430500800eec81e2e533cd04_JaffaCakes118.dll,#1
      2⤵
      • Drops file in Windows directory
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:784
      • C:\WINDOWS\mssecsvc.exe
        C:\WINDOWS\mssecsvc.exe
        3⤵
        • Executes dropped EXE
        • Drops file in Windows directory
        • System Location Discovery: System Language Discovery
        PID:2944
        • C:\WINDOWS\tasksche.exe
          C:\WINDOWS\tasksche.exe /i
          4⤵
          • Executes dropped EXE
          PID:2684
  • C:\WINDOWS\mssecsvc.exe
    C:\WINDOWS\mssecsvc.exe -m security
    1⤵
    • Executes dropped EXE
    • Drops file in System32 directory
    • System Location Discovery: System Language Discovery
    • Modifies data under HKEY_USERS
    PID:2628

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Windows\mssecsvc.exe

    Filesize

    3.6MB

    MD5

    bc24a48e946cc7bea800a599f27238dc

    SHA1

    5c8b603bd83252e28c8f622530aecb75573c3532

    SHA256

    647677b339620f4ab10149e947cfed6e967639cc803393fda73fd6cc5e43dff9

    SHA512

    a4bbd1f4262c8184d78f3f4bd65c354e7d485624dccf41f58f9f3efa6e9cfea6c6d385d385b6ca366338ee73336f169b89405751d63c3e9be2f486d06947a55a

  • C:\Windows\tasksche.exe

    Filesize

    3.4MB

    MD5

    37f93e38832352dcf810c779baea423b

    SHA1

    c0a48c6b043f1f9c389580f2b582d653ad087a5d

    SHA256

    b666682f4ae806ace07f96e8ea85b20cfb653da239c6f30bbfcd5c960cf44da1

    SHA512

    832010b61c3994a101540a33212235a900825012625ae0962a8b866ffd288186a662c6d859a222cb31a9d38e34ead23e399ef53762764b42d1aff108659d15e2