Analysis

  • max time kernel
    150s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    06-09-2024 14:15

General

  • Target

    cfb8e24c51476d67124476d7f9ab734f_JaffaCakes118.dll

  • Size

    5.0MB

  • MD5

    cfb8e24c51476d67124476d7f9ab734f

  • SHA1

    764d67ff69b5e42e16020f13fd82640ab53ddc7f

  • SHA256

    2a2cf60ecf5fded877ac54be621a6ff5eda5e21c1c831d7db64e3186470e4bff

  • SHA512

    0ba182bf7c3bd92fd00cde395989971104833f026e95276c003bc4180a0d51076fa721d8c85dee9d2a916897387ed120a0854f80bca5e2c0f0b0f2e02f7b510f

  • SSDEEP

    24576:SbLgddQhfdmMSirYbcMNgef0QeQjG/D8kIqRYoAdNLKz6626nq/:SnAQqMSPbcBVQej/1INR

Malware Config

Signatures

  • Wannacry

    WannaCry is a ransomware cryptoworm.

  • Contacts a large (3293) amount of remote hosts 1 TTPs

    This may indicate a network scan to discover remotely running services.

  • Executes dropped EXE 3 IoCs
  • Creates a large amount of network flows 1 TTPs

    This may indicate a network scan to discover remotely running services.

  • Drops file in Windows directory 2 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies data under HKEY_USERS 5 IoCs
  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Windows\system32\rundll32.exe
    rundll32.exe C:\Users\Admin\AppData\Local\Temp\cfb8e24c51476d67124476d7f9ab734f_JaffaCakes118.dll,#1
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2512
    • C:\Windows\SysWOW64\rundll32.exe
      rundll32.exe C:\Users\Admin\AppData\Local\Temp\cfb8e24c51476d67124476d7f9ab734f_JaffaCakes118.dll,#1
      2⤵
      • Drops file in Windows directory
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:1472
      • C:\WINDOWS\mssecsvc.exe
        C:\WINDOWS\mssecsvc.exe
        3⤵
        • Executes dropped EXE
        • Drops file in Windows directory
        • System Location Discovery: System Language Discovery
        PID:944
        • C:\WINDOWS\tasksche.exe
          C:\WINDOWS\tasksche.exe /i
          4⤵
          • Executes dropped EXE
          PID:2472
  • C:\WINDOWS\mssecsvc.exe
    C:\WINDOWS\mssecsvc.exe -m security
    1⤵
    • Executes dropped EXE
    • System Location Discovery: System Language Discovery
    • Modifies data under HKEY_USERS
    PID:3000

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Windows\mssecsvc.exe

    Filesize

    3.6MB

    MD5

    ceef6befba88192fe8c05d895feec40b

    SHA1

    77eda95533a18400d98401e95ab9b93f3f5ecb64

    SHA256

    941a998d4c4b9ed2edd9bd4104de5f09cd4c2ccc3153c2cffeb4fc16d2103712

    SHA512

    64ff97aa8d20d5f3e079ca0d049b0f827a8b0a8fbf64590bf83a835fe67205ef55abf1d0cc72de08866c80883b04e76bc9653e6efa70a53c5f7cfa9bac7b6fb7

  • C:\Windows\tasksche.exe

    Filesize

    3.4MB

    MD5

    1c891306d05a78f677ceb8a9fc18cece

    SHA1

    153f3c1b155c832d367c50f5e7beec8100bebf42

    SHA256

    fef3fca8124aadc5f54578ec457be4765bebbc208091db56e827a3ae7a78b2d6

    SHA512

    e05f7ffa0ac1f9c40e7b55954efe0637ee88dc57512860284d9305ce8a8d17b19ccdd33528b4f77317af94c9dac172de51bbc959b9667d03ea7912a68159226b