Analysis

  • max time kernel
    150s
  • max time network
    157s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    07-09-2024 11:56

General

  • Target

    d1e0f268f7543bb14299fd5caa464bd5_JaffaCakes118.dll

  • Size

    5.0MB

  • MD5

    d1e0f268f7543bb14299fd5caa464bd5

  • SHA1

    008747abb2bb6d42d18d71ce8e1ec0fcfa4f64c3

  • SHA256

    64df13da1342eedbfc49140f060b31d0edbe095258261d3634368ea1cf55997f

  • SHA512

    40898a496c2339b03284c1799b2d7544e51d24e886cc323d061a0b0b3bfb134bc7235a2ca3659525b76d49d11ac10c87ff5cc02af0ee248367a0fd0b58603ed3

  • SSDEEP

    98304:+DqPoBU1aRxcSUDk36SAEdhvxWa9P593R8yAVp2H:+DqPv1Cxcxk3ZAEUadzR8yc4H

Malware Config

Signatures

  • Wannacry

    WannaCry is a ransomware cryptoworm.

  • Contacts a large (3101) amount of remote hosts 1 TTPs

    This may indicate a network scan to discover remotely running services.

  • Executes dropped EXE 3 IoCs
  • Creates a large amount of network flows 1 TTPs

    This may indicate a network scan to discover remotely running services.

  • Drops file in System32 directory 1 IoCs
  • Drops file in Windows directory 2 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies data under HKEY_USERS 24 IoCs
  • Suspicious use of WriteProcessMemory 11 IoCs

Processes

  • C:\Windows\system32\rundll32.exe
    rundll32.exe C:\Users\Admin\AppData\Local\Temp\d1e0f268f7543bb14299fd5caa464bd5_JaffaCakes118.dll,#1
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2392
    • C:\Windows\SysWOW64\rundll32.exe
      rundll32.exe C:\Users\Admin\AppData\Local\Temp\d1e0f268f7543bb14299fd5caa464bd5_JaffaCakes118.dll,#1
      2⤵
      • Drops file in Windows directory
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:296
      • C:\WINDOWS\mssecsvc.exe
        C:\WINDOWS\mssecsvc.exe
        3⤵
        • Executes dropped EXE
        • Drops file in Windows directory
        • System Location Discovery: System Language Discovery
        PID:1932
        • C:\WINDOWS\tasksche.exe
          C:\WINDOWS\tasksche.exe /i
          4⤵
          • Executes dropped EXE
          PID:2572
  • C:\WINDOWS\mssecsvc.exe
    C:\WINDOWS\mssecsvc.exe -m security
    1⤵
    • Executes dropped EXE
    • Drops file in System32 directory
    • System Location Discovery: System Language Discovery
    • Modifies data under HKEY_USERS
    PID:2944

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Windows\mssecsvc.exe

    Filesize

    3.6MB

    MD5

    19776e8521a66a064f1fe4d8d6c3e23a

    SHA1

    b0ae731c6da04ec99a4bd80e0c89a5d951051d83

    SHA256

    52d6e286c148692bd033036618ee086d3ade8f234631b1efd0e21d4564873b0b

    SHA512

    82e3031503ae0c29d8077ce00a9f0a015b13c21c9c713a674e7b291b413aa809eb9bafa4221b480a5af001db1fcf05bb6ab9e27b67891eaf48fd7edf3cc9b5de

  • C:\Windows\tasksche.exe

    Filesize

    3.4MB

    MD5

    d33ff47a1931f0f0e044ea25c51e4d52

    SHA1

    4ffa7cf2d9ba0d5194e01fcba19d9937c96a0cfd

    SHA256

    d04fefb25e74cc2c9b4832cdfb0ecd3e764b39370ef15a7ff757fad67fd41ee6

    SHA512

    cd7f68d520b4592e20c800e3e5a0538ef432cbfbc13a2fe7adbabc9fd87d1fd977a1fafd14ccbda4cab9b0a655b8da31aa6f69c11a77e882547586fef16e391d