Analysis

  • max time kernel
    150s
  • max time network
    150s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    11-09-2024 05:40

General

  • Target

    d9b74eee31998e83fdbda390976f0478_JaffaCakes118.dll

  • Size

    5.0MB

  • MD5

    d9b74eee31998e83fdbda390976f0478

  • SHA1

    30cf09c8e6408832f906b9e599780c8152a6cc0d

  • SHA256

    e51312acc7bb484f92e75cd7815415bb0912fc69964f5b26db6b2a2a78ee220b

  • SHA512

    81f9df85b8988ce8072989b109b6249ffaf61c9e2ff76be161962e9a677e7b59463459da8a11feb681be5bd43103f3fad058fea1e1306feb9767994c6b2ee130

  • SSDEEP

    49152:znAQqMSPbcBVQej/1INRx+TSqTdX1HkQ:TDqPoBhz1aRxcSUDk

Malware Config

Signatures

  • Wannacry

    WannaCry is a ransomware cryptoworm.

  • Contacts a large (3282) amount of remote hosts 1 TTPs

    This may indicate a network scan to discover remotely running services.

  • Executes dropped EXE 3 IoCs
  • Creates a large amount of network flows 1 TTPs

    This may indicate a network scan to discover remotely running services.

  • Drops file in System32 directory 1 IoCs
  • Drops file in Windows directory 2 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies data under HKEY_USERS 24 IoCs
  • Suspicious use of WriteProcessMemory 11 IoCs

Processes

  • C:\Windows\system32\rundll32.exe
    rundll32.exe C:\Users\Admin\AppData\Local\Temp\d9b74eee31998e83fdbda390976f0478_JaffaCakes118.dll,#1
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1732
    • C:\Windows\SysWOW64\rundll32.exe
      rundll32.exe C:\Users\Admin\AppData\Local\Temp\d9b74eee31998e83fdbda390976f0478_JaffaCakes118.dll,#1
      2⤵
      • Drops file in Windows directory
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:2100
      • C:\WINDOWS\mssecsvc.exe
        C:\WINDOWS\mssecsvc.exe
        3⤵
        • Executes dropped EXE
        • Drops file in Windows directory
        • System Location Discovery: System Language Discovery
        PID:2356
        • C:\WINDOWS\tasksche.exe
          C:\WINDOWS\tasksche.exe /i
          4⤵
          • Executes dropped EXE
          PID:1664
  • C:\WINDOWS\mssecsvc.exe
    C:\WINDOWS\mssecsvc.exe -m security
    1⤵
    • Executes dropped EXE
    • Drops file in System32 directory
    • System Location Discovery: System Language Discovery
    • Modifies data under HKEY_USERS
    PID:1536

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Windows\mssecsvc.exe

    Filesize

    3.6MB

    MD5

    244984b4d507fd1fcf405c46504ae113

    SHA1

    555a8937fb1fd248e818227b2cd86ad19bbaea74

    SHA256

    b49139f4c29eaa95d3f188b348fbe8c17cf0f4359a9948fe673b8ba075f5da85

    SHA512

    9c0390c771390102f97f3d16b9e4f9facdee9d44883a02811ff12c9fa27c184049fb7b8ea4aa4b469c8b839faeb36d5a08e70811ddf84333f61c17edded5f240

  • C:\Windows\tasksche.exe

    Filesize

    3.4MB

    MD5

    2c8472da3bf7aea7575f62975e0d1c4e

    SHA1

    1bdbbd87f440db805fd0912cde7f23eebd7a6ecd

    SHA256

    2a963939c6b31e6a8a7de7ce96e1e6130639e046d3a2377e8ee5009f50c12a29

    SHA512

    5cdf476e9f9f397193fcd77b5ef1816b6449c6fa7fac208e7241f3aa57e94b9ec633a8d0a1271365b67e5524e9d8210bd3bb54d796b7101d91378408f344645e