Analysis

  • max time kernel
    150s
  • max time network
    155s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    21-09-2024 10:18

General

  • Target

    ef94900545e4a455081c70c5e780fecc_JaffaCakes118.dll

  • Size

    5.0MB

  • MD5

    ef94900545e4a455081c70c5e780fecc

  • SHA1

    5767fc1c43a42a3e020c26d4ba76cb33827f782d

  • SHA256

    154f4f786c332668051cf43aa48639129316f418a8576842cf2841984555cf72

  • SHA512

    fa6d27b66206dc57d2b38a544442536159f2b37186a5ee1e7f7517295acbad26c8b1e172689caff28bf16ca3473627c322bcc264b79d03438c2d275dfa72f896

  • SSDEEP

    98304:+DqPoBhz1aRxcSUD/Nj9msGxWa9P593R8yAVp2H:+DqPe1CxcxN9msZadzR8yc4H

Malware Config

Signatures

  • Wannacry

    WannaCry is a ransomware cryptoworm.

  • Contacts a large (3255) amount of remote hosts 1 TTPs

    This may indicate a network scan to discover remotely running services.

  • Executes dropped EXE 3 IoCs
  • Creates a large amount of network flows 1 TTPs

    This may indicate a network scan to discover remotely running services.

  • Drops file in Windows directory 2 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies data under HKEY_USERS 5 IoCs
  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Windows\system32\rundll32.exe
    rundll32.exe C:\Users\Admin\AppData\Local\Temp\ef94900545e4a455081c70c5e780fecc_JaffaCakes118.dll,#1
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:3604
    • C:\Windows\SysWOW64\rundll32.exe
      rundll32.exe C:\Users\Admin\AppData\Local\Temp\ef94900545e4a455081c70c5e780fecc_JaffaCakes118.dll,#1
      2⤵
      • Drops file in Windows directory
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:2988
      • C:\WINDOWS\mssecsvc.exe
        C:\WINDOWS\mssecsvc.exe
        3⤵
        • Executes dropped EXE
        • Drops file in Windows directory
        • System Location Discovery: System Language Discovery
        PID:2252
        • C:\WINDOWS\tasksche.exe
          C:\WINDOWS\tasksche.exe /i
          4⤵
          • Executes dropped EXE
          PID:5032
  • C:\WINDOWS\mssecsvc.exe
    C:\WINDOWS\mssecsvc.exe -m security
    1⤵
    • Executes dropped EXE
    • System Location Discovery: System Language Discovery
    • Modifies data under HKEY_USERS
    PID:1276

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Windows\mssecsvc.exe

    Filesize

    3.6MB

    MD5

    a2813ecbc617827612128847085db806

    SHA1

    643e4cb025b8fb6b6e7d8d3bed44294ccdc09e13

    SHA256

    260739932a53cc3ea15c458c545f2b09ef7880379ef111c5626f58f72df8b364

    SHA512

    02e907596f07e863226f1b4f657ec782f617dd41bf88ae995d64630108b2f855ac65b7f57a122bd736ecffb4537d324de74f48bd047a3933dc43f6e6375f29a8

  • C:\Windows\tasksche.exe

    Filesize

    3.4MB

    MD5

    9a23902978100b37fc7e286c43dde290

    SHA1

    77484b1b1680088f530f056eee2f1c287cd0dc2f

    SHA256

    eb57e1a987cfd6f90c6f23fa5d44f6f83c104370e5cef61f630ad4a3135b6571

    SHA512

    a6efe7798214fad1878c6ec5ea4dd9f6a145fa356dbcd807968f4755c933eb2d35c7e14e03e360c98dc9e2ee0ecacb58de2131d282a67bf6e252a7f13a4e4ee5