Analysis

  • max time kernel
    150s
  • max time network
    150s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    21-09-2024 09:50

General

  • Target

    ef894d1c6dd120fad5a885bc737d6338_JaffaCakes118.dll

  • Size

    5.0MB

  • MD5

    ef894d1c6dd120fad5a885bc737d6338

  • SHA1

    5a0b060469b3d9a0ae8b46969e5a92cf7cbcb909

  • SHA256

    7f45d112de4bb9aec75ce9e2f22997d10d383fc82c357d1c1f97ea5a10132663

  • SHA512

    fd5b844dbf51814963bfb6f307029fc1fbebd58f1eb5ac782d5fcfd99f5e26a1e1bfc44d9027b9d44ea407541a96ed0752d03437c1b912a850ad23831a330c13

  • SSDEEP

    98304:+DqPoBhz1aRxcSUDk36SAEdhvxWa9P593R8yAVp2gC:+DqPe1Cxcxk3ZAEUadzR8yc4

Malware Config

Signatures

  • Wannacry

    WannaCry is a ransomware cryptoworm.

  • Contacts a large (3260) amount of remote hosts 1 TTPs

    This may indicate a network scan to discover remotely running services.

  • Executes dropped EXE 3 IoCs
  • Creates a large amount of network flows 1 TTPs

    This may indicate a network scan to discover remotely running services.

  • Drops file in System32 directory 1 IoCs
  • Drops file in Windows directory 2 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies data under HKEY_USERS 24 IoCs
  • Suspicious use of WriteProcessMemory 11 IoCs

Processes

  • C:\Windows\system32\rundll32.exe
    rundll32.exe C:\Users\Admin\AppData\Local\Temp\ef894d1c6dd120fad5a885bc737d6338_JaffaCakes118.dll,#1
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1076
    • C:\Windows\SysWOW64\rundll32.exe
      rundll32.exe C:\Users\Admin\AppData\Local\Temp\ef894d1c6dd120fad5a885bc737d6338_JaffaCakes118.dll,#1
      2⤵
      • Drops file in Windows directory
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:1276
      • C:\WINDOWS\mssecsvc.exe
        C:\WINDOWS\mssecsvc.exe
        3⤵
        • Executes dropped EXE
        • Drops file in Windows directory
        • System Location Discovery: System Language Discovery
        PID:1292
        • C:\WINDOWS\tasksche.exe
          C:\WINDOWS\tasksche.exe /i
          4⤵
          • Executes dropped EXE
          PID:2880
  • C:\WINDOWS\mssecsvc.exe
    C:\WINDOWS\mssecsvc.exe -m security
    1⤵
    • Executes dropped EXE
    • Drops file in System32 directory
    • System Location Discovery: System Language Discovery
    • Modifies data under HKEY_USERS
    PID:2800

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Windows\mssecsvc.exe

    Filesize

    3.6MB

    MD5

    f94040a4f1b7430da9cb70bfa8b8b4d9

    SHA1

    062b604b2548dd13917642ee451932d0233e6dbb

    SHA256

    72f4ef533c5b4cfe283595a81559b5bb8de1369029c5a13e42ee03fb534fc1b3

    SHA512

    8d73f9b232f420004c351baa1adb46d1354e5c1f9777004467be5d3fef1f85f79403ec9a0de2a6ef0c82466942736e4650a97b091525ccea77c85f6823d85bfe

  • C:\Windows\tasksche.exe

    Filesize

    3.4MB

    MD5

    9cace6e7d4ea5a7a5ec8f43b950b6a94

    SHA1

    943d612a6cd432d5d728b40646dcbe5aef34f035

    SHA256

    b0f6a5ce8795c8dd770e2d05ce987439fc1d281e0a113711ad17d9788753c2ec

    SHA512

    ad061f264a244091daddb297b3fe5daffc8a845e01630d9c7fec99679a02f7634ed6e9e72c944e49f8ef3ab3e35c68afda5783fff815f4eb0321542224d57c6a