Analysis

  • max time kernel
    150s
  • max time network
    153s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240910-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240910-enlocale:en-usos:windows10-2004-x64system
  • submitted
    10-09-2024 21:50

General

  • Target

    d9180a5abf3cbe6d832ca4c20f93fea3_JaffaCakes118.dll

  • Size

    5.0MB

  • MD5

    d9180a5abf3cbe6d832ca4c20f93fea3

  • SHA1

    208b4b343e4c29f3c25190d1741784e69d01b9a2

  • SHA256

    fc806101e3f446a9421bf149f04217f252c66eb383eea291300a550291eb27db

  • SHA512

    be657953a298022114c40a108d1b2cfd6ddce3e2722940b4f89f64eacab274f5a3dfe4848ada548d410f693e7de77a5c1dd63d92e3b905a5f577455276a38c26

  • SSDEEP

    49152:znAQqMSVhnvxJM0H9PAMEcaEau3R8yAH1plAH:TDqVhvxWa9P593R8yAVp2H

Malware Config

Signatures

  • Wannacry

    WannaCry is a ransomware cryptoworm.

  • Contacts a large (3208) amount of remote hosts 1 TTPs

    This may indicate a network scan to discover remotely running services.

  • Executes dropped EXE 3 IoCs
  • Creates a large amount of network flows 1 TTPs

    This may indicate a network scan to discover remotely running services.

  • Drops file in Windows directory 2 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies data under HKEY_USERS 5 IoCs
  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Windows\system32\rundll32.exe
    rundll32.exe C:\Users\Admin\AppData\Local\Temp\d9180a5abf3cbe6d832ca4c20f93fea3_JaffaCakes118.dll,#1
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:696
    • C:\Windows\SysWOW64\rundll32.exe
      rundll32.exe C:\Users\Admin\AppData\Local\Temp\d9180a5abf3cbe6d832ca4c20f93fea3_JaffaCakes118.dll,#1
      2⤵
      • Drops file in Windows directory
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:544
      • C:\WINDOWS\mssecsvc.exe
        C:\WINDOWS\mssecsvc.exe
        3⤵
        • Executes dropped EXE
        • Drops file in Windows directory
        • System Location Discovery: System Language Discovery
        PID:2476
        • C:\WINDOWS\tasksche.exe
          C:\WINDOWS\tasksche.exe /i
          4⤵
          • Executes dropped EXE
          PID:2608
  • C:\WINDOWS\mssecsvc.exe
    C:\WINDOWS\mssecsvc.exe -m security
    1⤵
    • Executes dropped EXE
    • System Location Discovery: System Language Discovery
    • Modifies data under HKEY_USERS
    PID:1504

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Windows\mssecsvc.exe

    Filesize

    3.6MB

    MD5

    e1083614a4dfc9eb13fa15c18cc868ad

    SHA1

    7756a66162ed78a4cc81a99850c1c0f6e3f91482

    SHA256

    a32d2f86c7c000229f10c761220785776ee1a059ab9c99a1dabf91f48b9c3ae8

    SHA512

    bf420b7d37a42e6fae107d963c870c42fb5f59255a06757dc8ed84414603a0ff0b6d0c1c9a1997dd47fd443ff7f2a78a98f31037a78fb3d34820e0dece0cd1ff

  • C:\Windows\tasksche.exe

    Filesize

    3.4MB

    MD5

    020ae51f2ca07438aa68c0102b68dd6d

    SHA1

    c68d41164a9e4d35b3d2f7d5e3e79558f67939de

    SHA256

    3655f93de2acd6656c7683a082422d5df53aa3730bc9c4d42a8cd06866b2bb8f

    SHA512

    47a97847bb2c9ec9f23d3867c050193b808a5d0433a35d85c0b8b0bafa09cf16f50723d37a741aaed7eaca0206a42b88712994251aa3427774b6e671053e13a7