Analysis

  • max time kernel
    150s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    08-09-2024 12:12

General

  • Target

    d454f558f644289b2a4add1c44986abf_JaffaCakes118.dll

  • Size

    5.0MB

  • MD5

    d454f558f644289b2a4add1c44986abf

  • SHA1

    7ab6673c1c18a0fa12aa1f15a71e069b19c06c20

  • SHA256

    ce0beae359bd37e504a089a30a4489e39e63985b91e8700cf77ce6b89401500b

  • SHA512

    1819dc72bb74720d75d85507a86019be8f1048a4eea2089ed7a1f99a6afffa99d5f4664ef8983c660aab2e426742f4aaf0651283e1977629c16461e4cfa08cf8

  • SSDEEP

    49152:RnpdMSPbcBVQej/1INRx+TSqTdX1HkQo6SAARdhnv:1pdPoBhz1aRxcSUDk36SAEdhv

Malware Config

Signatures

  • Wannacry

    WannaCry is a ransomware cryptoworm.

  • Contacts a large (3182) amount of remote hosts 1 TTPs

    This may indicate a network scan to discover remotely running services.

  • Executes dropped EXE 2 IoCs
  • Creates a large amount of network flows 1 TTPs

    This may indicate a network scan to discover remotely running services.

  • Drops file in System32 directory 4 IoCs
  • Drops file in Windows directory 2 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies data under HKEY_USERS 15 IoCs
  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Windows\system32\rundll32.exe
    rundll32.exe C:\Users\Admin\AppData\Local\Temp\d454f558f644289b2a4add1c44986abf_JaffaCakes118.dll,#1
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:4260
    • C:\Windows\SysWOW64\rundll32.exe
      rundll32.exe C:\Users\Admin\AppData\Local\Temp\d454f558f644289b2a4add1c44986abf_JaffaCakes118.dll,#1
      2⤵
      • Drops file in Windows directory
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:3452
      • C:\WINDOWS\mssecsvr.exe
        C:\WINDOWS\mssecsvr.exe
        3⤵
        • Executes dropped EXE
        • Drops file in Windows directory
        • System Location Discovery: System Language Discovery
        PID:3828
  • C:\WINDOWS\mssecsvr.exe
    C:\WINDOWS\mssecsvr.exe -m security
    1⤵
    • Executes dropped EXE
    • Drops file in System32 directory
    • System Location Discovery: System Language Discovery
    • Modifies data under HKEY_USERS
    PID:3024

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Windows\mssecsvr.exe

    Filesize

    2.2MB

    MD5

    d942bf3a88c096501022ad38abe0d7fe

    SHA1

    9a65ce9c3a1feede75358b160d43c1fd1f07575e

    SHA256

    02d475b23b44cafd7f6f4ab865deb335aca0aed94af9fe38475d75d2003cd55b

    SHA512

    fa9d9f4af5962d559992b2decd2099041b057f6515311e9ee798b6d1717e862fb1ea7c125271f768ad82668c8d35925dcfd7c489068cd3f6c83e358d0c707677