Analysis
-
max time kernel
150s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
25-09-2024 11:38
Static task
static1
Behavioral task
behavioral1
Sample
f5edfb2c732e903f70e6f59b95b11337_JaffaCakes118.dll
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
f5edfb2c732e903f70e6f59b95b11337_JaffaCakes118.dll
Resource
win10v2004-20240802-en
General
-
Target
f5edfb2c732e903f70e6f59b95b11337_JaffaCakes118.dll
-
Size
5.0MB
-
MD5
f5edfb2c732e903f70e6f59b95b11337
-
SHA1
896bee860f09bd7a8afe993ea4e5930ebe1d0184
-
SHA256
883724cb261e190d56d9d07b33538157d4f9cb8c1c0b8f943058444544ddfe7d
-
SHA512
c1283596f13b3d5b64f1dcc88d55fd06e6ff3a1444787b09639e3e6bf6f3b6b723ab927c37d7eec55cd1277da33823584b224ccbf207f506b55e220c41b3dd78
-
SSDEEP
49152:JnjQqMSPbcBVQej/1INRx+TSqTdX1HkQo6SAARdhnvxJM0H9PAME:d8qPoBhz1aRxcSUDk36SAEdhvxWa9P5
Malware Config
Signatures
-
Wannacry
WannaCry is a ransomware cryptoworm.
-
Contacts a large (3255) amount of remote hosts 1 TTPs
This may indicate a network scan to discover remotely running services.
-
Executes dropped EXE 3 IoCs
pid Process 700 mssecsvc.exe 4744 mssecsvc.exe 2028 tasksche.exe -
Creates a large amount of network flows 1 TTPs
This may indicate a network scan to discover remotely running services.
-
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\WINDOWS\mssecsvc.exe rundll32.exe File created C:\WINDOWS\tasksche.exe mssecsvc.exe -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mssecsvc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mssecsvc.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 2804 wrote to memory of 5032 2804 rundll32.exe 82 PID 2804 wrote to memory of 5032 2804 rundll32.exe 82 PID 2804 wrote to memory of 5032 2804 rundll32.exe 82 PID 5032 wrote to memory of 700 5032 rundll32.exe 83 PID 5032 wrote to memory of 700 5032 rundll32.exe 83 PID 5032 wrote to memory of 700 5032 rundll32.exe 83
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\f5edfb2c732e903f70e6f59b95b11337_JaffaCakes118.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:2804 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\f5edfb2c732e903f70e6f59b95b11337_JaffaCakes118.dll,#12⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:5032 -
C:\WINDOWS\mssecsvc.exeC:\WINDOWS\mssecsvc.exe3⤵
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:700 -
C:\WINDOWS\tasksche.exeC:\WINDOWS\tasksche.exe /i4⤵
- Executes dropped EXE
PID:2028
-
-
-
-
C:\WINDOWS\mssecsvc.exeC:\WINDOWS\mssecsvc.exe -m security1⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4744
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3.6MB
MD5bcfe18815382d5d14bcd57c1df126da7
SHA1d73879391096217b18f57ee3a14e863f1eae7554
SHA256de5c754ff8e64887297554047008b2aaffcc3b8a109cfe2c902a86d360006250
SHA512503babe036e6b2eb26fe35457920a511c8f1d645b99ac62b16484578c5254a31d8e396a261065f1594b5de0a0c795f38b5cc78fc9571ddaed28b5573b8664723
-
Filesize
3.4MB
MD517f4431421c689b216d1e0407d68cc6e
SHA1ed6e9893eef369aa2285b14271900766d77bbae4
SHA2564190bfd1100c9800f8fdf3eaadafe69bb3450d680d0136d2b430882578ef8e37
SHA51296c03ac3d5841c271f61c3dd47c48adae45d9e560aecb45fad5c84612e9a4ac5486f20fb96ceb759567cb9f2df4572d02c3da00fe9492e40e6478eb28d38b287