Analysis

  • max time kernel
    150s
  • max time network
    151s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    16-09-2024 21:09

General

  • Target

    e592dd2cae721ac8aa51f347606ada8a_JaffaCakes118.dll

  • Size

    5.0MB

  • MD5

    e592dd2cae721ac8aa51f347606ada8a

  • SHA1

    b383467235c9f59fe3bf02ef1072e5dcb6673d15

  • SHA256

    67cab1567aff6376cad332526db12abf5843182bd625d96be7751ce3a2885b4c

  • SHA512

    91d1334c3734ae0f71d5347054787337548bfc7835506098647bcfee3d2f0231daa7700c23a2d87f09e43c36a544d4ee07755e63572eeba73a817d50d2b1defe

  • SSDEEP

    98304:+DqPoBhz1aRxcSUDk36SAEdhvxWa9P593R8yAVp2jeOT1:+DqPe1Cxcxk3ZAEUadzR8yc4jeOT

Malware Config

Signatures

  • Wannacry

    WannaCry is a ransomware cryptoworm.

  • Contacts a large (3275) amount of remote hosts 1 TTPs

    This may indicate a network scan to discover remotely running services.

  • Executes dropped EXE 3 IoCs
  • Creates a large amount of network flows 1 TTPs

    This may indicate a network scan to discover remotely running services.

  • Drops file in System32 directory 1 IoCs
  • Drops file in Windows directory 2 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies data under HKEY_USERS 24 IoCs
  • Suspicious use of WriteProcessMemory 11 IoCs

Processes

  • C:\Windows\system32\rundll32.exe
    rundll32.exe C:\Users\Admin\AppData\Local\Temp\e592dd2cae721ac8aa51f347606ada8a_JaffaCakes118.dll,#1
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1860
    • C:\Windows\SysWOW64\rundll32.exe
      rundll32.exe C:\Users\Admin\AppData\Local\Temp\e592dd2cae721ac8aa51f347606ada8a_JaffaCakes118.dll,#1
      2⤵
      • Drops file in Windows directory
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:2092
      • C:\WINDOWS\mssecsvc.exe
        C:\WINDOWS\mssecsvc.exe
        3⤵
        • Executes dropped EXE
        • Drops file in Windows directory
        • System Location Discovery: System Language Discovery
        PID:2392
        • C:\WINDOWS\tasksche.exe
          C:\WINDOWS\tasksche.exe /i
          4⤵
          • Executes dropped EXE
          PID:2464
  • C:\WINDOWS\mssecsvc.exe
    C:\WINDOWS\mssecsvc.exe -m security
    1⤵
    • Executes dropped EXE
    • Drops file in System32 directory
    • System Location Discovery: System Language Discovery
    • Modifies data under HKEY_USERS
    PID:1736

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Windows\mssecsvc.exe

    Filesize

    3.6MB

    MD5

    254a847075c5a76c84051f065af16af4

    SHA1

    b8011e7f6c60c6a10aee0bf6dc89e400a8977597

    SHA256

    30a020af1b4e6b5b913609b99a65d4cb4038bb96118b07803058745f593c6062

    SHA512

    3369f1e309106e89f4fc9d2a13222ebd0f06e905e9bf2e2ea7e17ae8634ae0eee314a55cc6e1e5f5a9621a880197ba0de7810fd80193f52993ba3cbe6a785801

  • C:\Windows\tasksche.exe

    Filesize

    3.4MB

    MD5

    e65b8d548d35f90e5d39f974914d4f13

    SHA1

    8efe91191f549f6923b31bfbe515807b8acf9154

    SHA256

    79b3701623167a48ebf8a9e93026315605e67f469cf629a1ee24e8cbfbc52ba6

    SHA512

    0d701b481e16a151028cb19212124a9a5ec39703ffc69a51b794f400fa33f30ad4d4b4f5b022e1b81f873306bdcc434c9b36f3d44d2edf77758f0262cea25bf8