Analysis

  • max time kernel
    150s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    21-09-2024 00:09

General

  • Target

    eeb3e9dbc293f20d5389be41fd28654f_JaffaCakes118.dll

  • Size

    5.0MB

  • MD5

    eeb3e9dbc293f20d5389be41fd28654f

  • SHA1

    c7834423964472d850b3447a524e83e0d5d2ed53

  • SHA256

    83be7f2061c01a6a24326b61c78d249f3f8cde5a35672369cbe8263279e7f58b

  • SHA512

    c2b48501182291913e76e871861d22cfbb9de71a6d7f1cf970c14d71e0d691c6824d6d8b61da6e19ae16f8379b8ab4502914730468578c8d1577f2a2a856201a

  • SSDEEP

    24576:SbLgddQhfdmMSirYbcMNgef0QeQjG/D8kIqRYoAdNLKz6626SX6SASk+:SnAQqMSPbcBVQej/1INRr6SAA

Malware Config

Signatures

  • Wannacry

    WannaCry is a ransomware cryptoworm.

  • Contacts a large (3350) amount of remote hosts 1 TTPs

    This may indicate a network scan to discover remotely running services.

  • Executes dropped EXE 3 IoCs
  • Creates a large amount of network flows 1 TTPs

    This may indicate a network scan to discover remotely running services.

  • Drops file in Windows directory 2 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies data under HKEY_USERS 5 IoCs
  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Windows\system32\rundll32.exe
    rundll32.exe C:\Users\Admin\AppData\Local\Temp\eeb3e9dbc293f20d5389be41fd28654f_JaffaCakes118.dll,#1
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:4076
    • C:\Windows\SysWOW64\rundll32.exe
      rundll32.exe C:\Users\Admin\AppData\Local\Temp\eeb3e9dbc293f20d5389be41fd28654f_JaffaCakes118.dll,#1
      2⤵
      • Drops file in Windows directory
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:3212
      • C:\WINDOWS\mssecsvc.exe
        C:\WINDOWS\mssecsvc.exe
        3⤵
        • Executes dropped EXE
        • Drops file in Windows directory
        • System Location Discovery: System Language Discovery
        PID:4840
        • C:\WINDOWS\tasksche.exe
          C:\WINDOWS\tasksche.exe /i
          4⤵
          • Executes dropped EXE
          PID:4804
  • C:\WINDOWS\mssecsvc.exe
    C:\WINDOWS\mssecsvc.exe -m security
    1⤵
    • Executes dropped EXE
    • System Location Discovery: System Language Discovery
    • Modifies data under HKEY_USERS
    PID:4956

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Windows\mssecsvc.exe

    Filesize

    3.6MB

    MD5

    46b44d77c144127cd1ab2eea786f62db

    SHA1

    add2edbcc7dc1c302b31a14766c3c705b06b70c7

    SHA256

    e5b92217e412c0d63eea908374f01fd2910c404b9b9f5e1a119773bec0b2b52b

    SHA512

    fff4f7fd2751bda2cf1f90bb57e7fbba6833cf21b914d21a9788adcd471e9e64c8053f074e5d94421fa21533c3b660efa7e0f3e1d1e651a80a8a1f5f03ca835c

  • C:\Windows\tasksche.exe

    Filesize

    3.4MB

    MD5

    9797b37f9b82c200d96eb0a8f4484f8e

    SHA1

    8c8156c01897e79da97599eca24738adda6852d4

    SHA256

    7d1d42696141fff6fb813537b1a8ddcb7cfd4a61e0ce6830276f7416a1ab4200

    SHA512

    97e5d45f9d49ef0d4e31f794fc4725e9e64377e19c696b969f1ca64afd03ad5d3b32eacaf15a126b4bc508535c9fc611e4f3023d886721603eeae66c1df61456