Analysis

  • max time kernel
    150s
  • max time network
    150s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    10-09-2024 22:10

General

  • Target

    d91f7855e93b37beb95078d0213fe6c0_JaffaCakes118.dll

  • Size

    5.0MB

  • MD5

    d91f7855e93b37beb95078d0213fe6c0

  • SHA1

    4b02ec3393b58fc922fa0e33a50a7597fb1f2652

  • SHA256

    c5dcea9fb7b0f9017fc949b411d44bbf486fea0de66293c6d2df60d6b5443989

  • SHA512

    fde40fa23d579f408340f161f111206622757b25e1e1dbdff88d7d83a6e5ff4bd28e0c21dc468d20e828332def9da1362e786deef639bd23ef516bae1551b550

  • SSDEEP

    24576:SbLgddQhfdmMSirYbcMNgef09ME7A4kqAH1pNZtA0p+9XEk:SnAQqMSPbcBV9R8yAH1plAH

Malware Config

Signatures

  • Wannacry

    WannaCry is a ransomware cryptoworm.

  • Contacts a large (3310) amount of remote hosts 1 TTPs

    This may indicate a network scan to discover remotely running services.

  • Executes dropped EXE 3 IoCs
  • Creates a large amount of network flows 1 TTPs

    This may indicate a network scan to discover remotely running services.

  • Drops file in System32 directory 1 IoCs
  • Drops file in Windows directory 2 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies data under HKEY_USERS 24 IoCs
  • Suspicious use of WriteProcessMemory 11 IoCs

Processes

  • C:\Windows\system32\rundll32.exe
    rundll32.exe C:\Users\Admin\AppData\Local\Temp\d91f7855e93b37beb95078d0213fe6c0_JaffaCakes118.dll,#1
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2624
    • C:\Windows\SysWOW64\rundll32.exe
      rundll32.exe C:\Users\Admin\AppData\Local\Temp\d91f7855e93b37beb95078d0213fe6c0_JaffaCakes118.dll,#1
      2⤵
      • Drops file in Windows directory
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:2904
      • C:\WINDOWS\mssecsvc.exe
        C:\WINDOWS\mssecsvc.exe
        3⤵
        • Executes dropped EXE
        • Drops file in Windows directory
        • System Location Discovery: System Language Discovery
        PID:2876
        • C:\WINDOWS\tasksche.exe
          C:\WINDOWS\tasksche.exe /i
          4⤵
          • Executes dropped EXE
          PID:2336
  • C:\WINDOWS\mssecsvc.exe
    C:\WINDOWS\mssecsvc.exe -m security
    1⤵
    • Executes dropped EXE
    • Drops file in System32 directory
    • System Location Discovery: System Language Discovery
    • Modifies data under HKEY_USERS
    PID:2516

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Windows\mssecsvc.exe

    Filesize

    3.6MB

    MD5

    2204ea2b9427a0fd2b46b7bf62bd0212

    SHA1

    7e694d7492c784d1ad1af5ab4281432a6b93479c

    SHA256

    6e9991a36d0e29d79d9f07fb02ff122e97b2392d8ab3e1eac06480e6ddd9b911

    SHA512

    66e43c1de3763eac91e9d78e85482720c54ba8e9a87d34a0715a516e47dd47f4ccf48f0eb96d5910557aa5ad24e9d6cc80e0dc2ae46c7bfe52830b05540a6bab

  • C:\Windows\tasksche.exe

    Filesize

    3.4MB

    MD5

    646ed508c8a64664429075a93999fae6

    SHA1

    6b42ddfa009835973e399860ff185660a84bb5fe

    SHA256

    94f6511befd927d7a894e90357d3c596ae62b1f3c63e75524ec7d9c8a2216f6d

    SHA512

    b1077d1a1e64c9a471a048a81386903231a1890fb3333ff564b31cf709efe4af576a9eba87a8dd97301860181967d82b17a9d9065ba7c6fd311e05677d457296