Analysis

  • max time kernel
    150s
  • max time network
    150s
  • platform
    windows7_x64
  • resource
    win7-20240708-en
  • resource tags

    arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system
  • submitted
    09-09-2024 18:12

General

  • Target

    d6d9deeb3e81eae9e76462684aba5cb2_JaffaCakes118.dll

  • Size

    5.0MB

  • MD5

    d6d9deeb3e81eae9e76462684aba5cb2

  • SHA1

    3f586459526cb110971124924423502f915d9129

  • SHA256

    98f99fd5705c3e7610060eb4f55bf1fcc7ce0ef10ff59e277ceabd40aa2b97af

  • SHA512

    ba5d4d1a39b48c7e3e1087bd87828581199e3f2c8b58fd3e3ab8a4800f679e9fd9ad775d06f46692f2776b85afa2b69b6be77ddd2caa587d62c3cf3d793c4f42

  • SSDEEP

    98304:+DqPoBhw1aRxcSUDk36SAEdhvxWa9P593R8yAVp2H:+DqPp1Cxcxk3ZAEUadzR8yc4H

Malware Config

Signatures

  • Wannacry

    WannaCry is a ransomware cryptoworm.

  • Contacts a large (3220) amount of remote hosts 1 TTPs

    This may indicate a network scan to discover remotely running services.

  • Executes dropped EXE 3 IoCs
  • Creates a large amount of network flows 1 TTPs

    This may indicate a network scan to discover remotely running services.

  • Drops file in System32 directory 1 IoCs
  • Drops file in Windows directory 2 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies data under HKEY_USERS 24 IoCs
  • Suspicious use of WriteProcessMemory 11 IoCs

Processes

  • C:\Windows\system32\rundll32.exe
    rundll32.exe C:\Users\Admin\AppData\Local\Temp\d6d9deeb3e81eae9e76462684aba5cb2_JaffaCakes118.dll,#1
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2416
    • C:\Windows\SysWOW64\rundll32.exe
      rundll32.exe C:\Users\Admin\AppData\Local\Temp\d6d9deeb3e81eae9e76462684aba5cb2_JaffaCakes118.dll,#1
      2⤵
      • Drops file in Windows directory
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:1624
      • C:\WINDOWS\mssecsvc.exe
        C:\WINDOWS\mssecsvc.exe
        3⤵
        • Executes dropped EXE
        • Drops file in Windows directory
        • System Location Discovery: System Language Discovery
        PID:2080
        • C:\WINDOWS\tasksche.exe
          C:\WINDOWS\tasksche.exe /i
          4⤵
          • Executes dropped EXE
          PID:2864
  • C:\WINDOWS\mssecsvc.exe
    C:\WINDOWS\mssecsvc.exe -m security
    1⤵
    • Executes dropped EXE
    • Drops file in System32 directory
    • System Location Discovery: System Language Discovery
    • Modifies data under HKEY_USERS
    PID:2136

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Windows\mssecsvc.exe

    Filesize

    3.6MB

    MD5

    3ad03d650836c3f5be1ad1f178bd736e

    SHA1

    d47383102c807b09c7856f6e9a6fa3de5be4688a

    SHA256

    5794ac6d6161471117ee3e240cf646bbb07725484e3bf40457881a9e72454d7e

    SHA512

    a689104bb9924cd7258939add3dffa44de70e14aec84058370e83ffc4419253af11cd244e0d632222f524365817b90679eaab8d0b37c8eb279ccf6deef0ebd05

  • C:\Windows\tasksche.exe

    Filesize

    3.4MB

    MD5

    c8d22f30a5e4b35f916440823f318825

    SHA1

    b0a9be583ecdf99d70c7920e468f53b32cf2285f

    SHA256

    463860bc6523849aff3a676008f737ae56b37f04063dacc48aea196ed334291c

    SHA512

    4e643f255d47b4f8778366ea69a2b9cbc3dea08098bd683cb335876d26649cda86e84747795577d388583685d447c36c545dd50459cb10390a9f50badb1daa90