Analysis

  • max time kernel
    150s
  • max time network
    150s
  • platform
    windows7_x64
  • resource
    win7-20240708-en
  • resource tags

    arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system
  • submitted
    07-09-2024 04:37

General

  • Target

    d11751c7780d639141ea57f0f682fb51_JaffaCakes118.dll

  • Size

    5.0MB

  • MD5

    d11751c7780d639141ea57f0f682fb51

  • SHA1

    0cf2fa3d9bffacf24cb61c2477313d139b709a9f

  • SHA256

    f9007e458ae15f06360a2eaf5ba107890309f5b1f92de5a43485b50898265000

  • SHA512

    e0f6c7e014f109c2d38cf6f733f959c11d938cb36f4afca99aae574b5baaa53685fd78ec14d3df6cb3255cd9e1a3a6594f99a8b551d2cb10bc49fff506770f40

  • SSDEEP

    98304:+DqPoBhz1aRxcSUDk36SAEdhvxWa9P59eOun8yAVp2H:+DqPe1Cxcxk3ZAEUadUn8yc4H

Malware Config

Signatures

  • Wannacry

    WannaCry is a ransomware cryptoworm.

  • Contacts a large (3255) amount of remote hosts 1 TTPs

    This may indicate a network scan to discover remotely running services.

  • Executes dropped EXE 3 IoCs
  • Creates a large amount of network flows 1 TTPs

    This may indicate a network scan to discover remotely running services.

  • Drops file in System32 directory 1 IoCs
  • Drops file in Windows directory 2 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies data under HKEY_USERS 24 IoCs
  • Suspicious use of WriteProcessMemory 11 IoCs

Processes

  • C:\Windows\system32\rundll32.exe
    rundll32.exe C:\Users\Admin\AppData\Local\Temp\d11751c7780d639141ea57f0f682fb51_JaffaCakes118.dll,#1
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2432
    • C:\Windows\SysWOW64\rundll32.exe
      rundll32.exe C:\Users\Admin\AppData\Local\Temp\d11751c7780d639141ea57f0f682fb51_JaffaCakes118.dll,#1
      2⤵
      • Drops file in Windows directory
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:3064
      • C:\WINDOWS\mssecsvc.exe
        C:\WINDOWS\mssecsvc.exe
        3⤵
        • Executes dropped EXE
        • Drops file in Windows directory
        • System Location Discovery: System Language Discovery
        PID:2660
        • C:\WINDOWS\tasksche.exe
          C:\WINDOWS\tasksche.exe /i
          4⤵
          • Executes dropped EXE
          PID:2848
  • C:\WINDOWS\mssecsvc.exe
    C:\WINDOWS\mssecsvc.exe -m security
    1⤵
    • Executes dropped EXE
    • Drops file in System32 directory
    • System Location Discovery: System Language Discovery
    • Modifies data under HKEY_USERS
    PID:2676

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Windows\mssecsvc.exe

    Filesize

    3.6MB

    MD5

    dbc59cc6442d560eb55cc9cfe68ee222

    SHA1

    f7c11003dc8655217133180debd5922bdd8513e9

    SHA256

    35fc564c7b00cb1754dfd93064d0aad415c5e8200f74709be2c40a3b8fa5c530

    SHA512

    970d468bc12f88d91e255096cab9346c88253ea61cd891dde3a058c508eb73136ddca40e7384d9985d3eb29c80d3df634bfccf61528ec25658bf1a21c32941f8

  • C:\Windows\tasksche.exe

    Filesize

    3.4MB

    MD5

    2811b9c85849f377535f1023ffff5b47

    SHA1

    7c3fed1af0f3e2126c196ec1544427a8cb0de6ff

    SHA256

    5c4391fba2aacce728f024211e5635ab705b2966ecf5961f641bd1e499eb7197

    SHA512

    4157ad396327d8dd2a11618c1d9515f4109533e6e2e7662f08a3656177b90f79281a3b7df4f4b79a49dc6a5dd4df08905aefbf22c53c378be521e8e3788bed5c