Analysis

  • max time kernel
    150s
  • max time network
    154s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    12-09-2024 02:38

General

  • Target

    dbaa6972976aa730e66dd5e064d1799f_JaffaCakes118.dll

  • Size

    5.0MB

  • MD5

    dbaa6972976aa730e66dd5e064d1799f

  • SHA1

    47411ee85b1f0486455395848af1026443b4e500

  • SHA256

    fb75c5c043143911a4a7691ae86b6f3a93c8f39f1d7d560a851f19e3208e9ff8

  • SHA512

    8f398e1b9f7f644e517323ddb447d7dfb9b2993760fab0c6a0453dcc3b85ba10a802616d5ae3d11bbcc3fdfb2383698fe7e53e31962361456200c93cdd7f944b

  • SSDEEP

    49152:znAQqMSPbcBVQej/1INRx+TSqTdX1HkQo6SAARdhnvxJM0H9PA:TDqPoBhz1aRxcSUDk36SAEdhvxWa9P

Malware Config

Signatures

  • Wannacry

    WannaCry is a ransomware cryptoworm.

  • Contacts a large (3184) amount of remote hosts 1 TTPs

    This may indicate a network scan to discover remotely running services.

  • Executes dropped EXE 3 IoCs
  • Creates a large amount of network flows 1 TTPs

    This may indicate a network scan to discover remotely running services.

  • Drops file in System32 directory 1 IoCs
  • Drops file in Windows directory 2 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies data under HKEY_USERS 24 IoCs
  • Suspicious use of WriteProcessMemory 11 IoCs

Processes

  • C:\Windows\system32\rundll32.exe
    rundll32.exe C:\Users\Admin\AppData\Local\Temp\dbaa6972976aa730e66dd5e064d1799f_JaffaCakes118.dll,#1
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2992
    • C:\Windows\SysWOW64\rundll32.exe
      rundll32.exe C:\Users\Admin\AppData\Local\Temp\dbaa6972976aa730e66dd5e064d1799f_JaffaCakes118.dll,#1
      2⤵
      • Drops file in Windows directory
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:2260
      • C:\WINDOWS\mssecsvc.exe
        C:\WINDOWS\mssecsvc.exe
        3⤵
        • Executes dropped EXE
        • Drops file in Windows directory
        • System Location Discovery: System Language Discovery
        PID:1400
        • C:\WINDOWS\tasksche.exe
          C:\WINDOWS\tasksche.exe /i
          4⤵
          • Executes dropped EXE
          PID:2828
  • C:\WINDOWS\mssecsvc.exe
    C:\WINDOWS\mssecsvc.exe -m security
    1⤵
    • Executes dropped EXE
    • Drops file in System32 directory
    • System Location Discovery: System Language Discovery
    • Modifies data under HKEY_USERS
    PID:2936

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Windows\mssecsvc.exe

    Filesize

    3.6MB

    MD5

    976f9f563150aa5ef673145f70d0bdf1

    SHA1

    37526d6f5f856ca8f10789d0614b8258e554a2fb

    SHA256

    64e2183b3ade839c6431d1672c6950b1d13aa4dc3c1ed191d6f44e1ad15c1ffb

    SHA512

    417687f8f97e101ef48cd4c45483e5c47310e97d2750f6818fbb691a50b4ba2fe28d033caf2e9004d6a87dd7da8d63691ff1ccffec644eb96df7fd5cd4809989

  • C:\Windows\tasksche.exe

    Filesize

    3.4MB

    MD5

    aea7ce3109b4b9c84a738e3356614038

    SHA1

    70303c292882d94259700ddf12498b28b76f707f

    SHA256

    d9551cc1468cf9ded8c1babe8fe646e309c3de1a33422c768647077348a236d7

    SHA512

    ed1ffe444b91fe36a4ff906a8056fc78a9e3b7e9b4fa3efd831de65fd88bfaf0d39ee8071ec31e1eb201e8efa9c3f1e368eddb461248efe14df41b0ec2d29a48