Analysis

  • max time kernel
    150s
  • max time network
    150s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    06-09-2024 12:36

General

  • Target

    cf8b93b7cdc5a160a13ba9005cc1a22a_JaffaCakes118.dll

  • Size

    5.0MB

  • MD5

    cf8b93b7cdc5a160a13ba9005cc1a22a

  • SHA1

    afc4386ff1244833febc67bded46fc3be2aea644

  • SHA256

    e937c20a96c0d4df624432e70de793f9854b2df1be1fc67e9a18133177056861

  • SHA512

    c18c7a9bc36f990bb2b9223e74a867454eae7acae3e6b2b99ee2c84c4a9c540047f825f3b17203a85f00a4c9c2e3c95c931309acc1da2f097c145454cddd10b5

  • SSDEEP

    98304:dDqPoBhz1aRxcSUDk36SAEdhvxWa9P593R8yAVp2H:dDqPe1Cxcxk3ZAEUadzR8yc4H

Malware Config

Signatures

  • Wannacry

    WannaCry is a ransomware cryptoworm.

  • Contacts a large (3325) amount of remote hosts 1 TTPs

    This may indicate a network scan to discover remotely running services.

  • Executes dropped EXE 3 IoCs
  • Creates a large amount of network flows 1 TTPs

    This may indicate a network scan to discover remotely running services.

  • Drops file in System32 directory 1 IoCs
  • Drops file in Windows directory 2 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies data under HKEY_USERS 24 IoCs
  • Suspicious use of WriteProcessMemory 11 IoCs

Processes

  • C:\Windows\system32\rundll32.exe
    rundll32.exe C:\Users\Admin\AppData\Local\Temp\cf8b93b7cdc5a160a13ba9005cc1a22a_JaffaCakes118.dll,#1
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2356
    • C:\Windows\SysWOW64\rundll32.exe
      rundll32.exe C:\Users\Admin\AppData\Local\Temp\cf8b93b7cdc5a160a13ba9005cc1a22a_JaffaCakes118.dll,#1
      2⤵
      • Drops file in Windows directory
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:2168
      • C:\WINDOWS\mssecsvc.exe
        C:\WINDOWS\mssecsvc.exe
        3⤵
        • Executes dropped EXE
        • Drops file in Windows directory
        • System Location Discovery: System Language Discovery
        PID:2524
        • C:\WINDOWS\tasksche.exe
          C:\WINDOWS\tasksche.exe /i
          4⤵
          • Executes dropped EXE
          PID:2660
  • C:\WINDOWS\mssecsvc.exe
    C:\WINDOWS\mssecsvc.exe -m security
    1⤵
    • Executes dropped EXE
    • Drops file in System32 directory
    • System Location Discovery: System Language Discovery
    • Modifies data under HKEY_USERS
    PID:2372

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Windows\mssecsvc.exe

    Filesize

    3.6MB

    MD5

    cce3ac3f89c438c5b1f8093131b73758

    SHA1

    d6217a53d7a0b802dcd6d6eb2200907e4ac647a5

    SHA256

    deabbb94168b75d3a6ab1da9bd7fb4c9124f12258a68e337236b23700d0a60a6

    SHA512

    ceb0ceb119b9b42e805d949f8f63f14a0b609521da0dce9c54c07f9f8c9c7df1daf31fbed552d40d9f89538aa433e4caf460f72a78724d49493fe3312bfe1222

  • C:\Windows\tasksche.exe

    Filesize

    3.4MB

    MD5

    c906087fbfe90924bc4f903e527e52e8

    SHA1

    0ce9bd4724cae1edc5141e6c8074ad5fcaf9fc6a

    SHA256

    802d815d1cd9e4193cf586124622bde16ecb5d7127a1c0aa9a13d1e3e46f564a

    SHA512

    c479f547bf5e79cfab2985173f200583047e7f47ac565b248ccae802d2e4633cb410a7c502d4923fa6f34d6ca9bd77f898d3ef001a1a42c8939aff861a35457b