Analysis

  • max time kernel
    150s
  • max time network
    150s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    06-09-2024 20:20

General

  • Target

    d062b3cb924993cd249b85595d4b3460_JaffaCakes118.dll

  • Size

    5.0MB

  • MD5

    d062b3cb924993cd249b85595d4b3460

  • SHA1

    88d23685781d5a0844e09b40dbe2c74440b77edd

  • SHA256

    419b4ede467eab1c250b2b004fc5ca1565e355e2b94380ef9d7cd833609cc6f6

  • SHA512

    dd036ab3b208ceae290519a5d3d0e31a661eb4a4a8136bc8f37acc008ff1ea33ca1e8abf40442ce0a128b950de75514c815d41bac8977961b95e55c7d394bd48

  • SSDEEP

    49152:SnAQqMSPbcBVQej/1INRx+TSqTdX1HkQo6SAAR:+DqPoBhz1aRxcSUDk36SAE

Malware Config

Signatures

  • Wannacry

    WannaCry is a ransomware cryptoworm.

  • Contacts a large (3340) amount of remote hosts 1 TTPs

    This may indicate a network scan to discover remotely running services.

  • Executes dropped EXE 3 IoCs
  • Creates a large amount of network flows 1 TTPs

    This may indicate a network scan to discover remotely running services.

  • Drops file in System32 directory 1 IoCs
  • Drops file in Windows directory 2 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies data under HKEY_USERS 24 IoCs
  • Suspicious use of WriteProcessMemory 11 IoCs

Processes

  • C:\Windows\system32\rundll32.exe
    rundll32.exe C:\Users\Admin\AppData\Local\Temp\d062b3cb924993cd249b85595d4b3460_JaffaCakes118.dll,#1
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1732
    • C:\Windows\SysWOW64\rundll32.exe
      rundll32.exe C:\Users\Admin\AppData\Local\Temp\d062b3cb924993cd249b85595d4b3460_JaffaCakes118.dll,#1
      2⤵
      • Drops file in Windows directory
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:2520
      • C:\WINDOWS\mssecsvc.exe
        C:\WINDOWS\mssecsvc.exe
        3⤵
        • Executes dropped EXE
        • Drops file in Windows directory
        • System Location Discovery: System Language Discovery
        PID:708
        • C:\WINDOWS\tasksche.exe
          C:\WINDOWS\tasksche.exe /i
          4⤵
          • Executes dropped EXE
          PID:2756
  • C:\WINDOWS\mssecsvc.exe
    C:\WINDOWS\mssecsvc.exe -m security
    1⤵
    • Executes dropped EXE
    • Drops file in System32 directory
    • System Location Discovery: System Language Discovery
    • Modifies data under HKEY_USERS
    PID:2324

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Windows\mssecsvc.exe

    Filesize

    3.6MB

    MD5

    d7efc0afbe7aaea15d168edef9bb20fa

    SHA1

    fbee59132da223a474b50b4499b69ffa79e66809

    SHA256

    60fa74bd47e89445e765c470f9da648e4521c368dc8a2fd32cd577a0357412d6

    SHA512

    14d9da7d102662e5c9f3bb8a46235470d0a5e3713a870183617601244b8e09ee67acbc1ab56b7d761a5b8b97f02197a0a924e4887615b6e569e353e2aeb9345b

  • C:\Windows\tasksche.exe

    Filesize

    3.4MB

    MD5

    f85622eaa1ac4ea6dc2488c005b0c3ac

    SHA1

    d0fdabb28d896fce304817704efb4cca01526345

    SHA256

    c25c6959cacac4585c1004ce3d783e04ed457fceb11014c5fe42c35ab6fae372

    SHA512

    a3e34846d47d0ac70c2aee0d0dea5d5cb00e2952a687b1006e0b2cda2627ab0d2df64bf450adc5274ae7cc2c20051589297b8eded975f7b9d8abcd73eb6dffe6