Analysis

  • max time kernel
    150s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    27-09-2024 21:30

General

  • Target

    faf057ab6cd5849561c1234231236771_JaffaCakes118.dll

  • Size

    5.0MB

  • MD5

    faf057ab6cd5849561c1234231236771

  • SHA1

    335b1c43769e39fdcad4fc1063a7ea9a45c552c8

  • SHA256

    2b2e04ac2e70d765d873964171cec6894ee04c0251939dd471440ac17eb428a3

  • SHA512

    4f65b4de9206dda864f283932acac91d304398bc4f12194bff641d012053d0949dd28f9566a75cce303017de0bb56ca8a7ffee1d815962beaf52d03741861f69

  • SSDEEP

    98304:TDqPoBhz1aRxcSUDk36SAr593R8yAVp2H:TDqPe1Cxcxk3ZArzR8yc4H

Malware Config

Signatures

  • Wannacry

    WannaCry is a ransomware cryptoworm.

  • Contacts a large (3363) amount of remote hosts 1 TTPs

    This may indicate a network scan to discover remotely running services.

  • Executes dropped EXE 3 IoCs
  • Creates a large amount of network flows 1 TTPs

    This may indicate a network scan to discover remotely running services.

  • Drops file in Windows directory 2 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies data under HKEY_USERS 5 IoCs
  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Windows\system32\rundll32.exe
    rundll32.exe C:\Users\Admin\AppData\Local\Temp\faf057ab6cd5849561c1234231236771_JaffaCakes118.dll,#1
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:3420
    • C:\Windows\SysWOW64\rundll32.exe
      rundll32.exe C:\Users\Admin\AppData\Local\Temp\faf057ab6cd5849561c1234231236771_JaffaCakes118.dll,#1
      2⤵
      • Drops file in Windows directory
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:1200
      • C:\WINDOWS\mssecsvc.exe
        C:\WINDOWS\mssecsvc.exe
        3⤵
        • Executes dropped EXE
        • Drops file in Windows directory
        • System Location Discovery: System Language Discovery
        PID:4412
        • C:\WINDOWS\tasksche.exe
          C:\WINDOWS\tasksche.exe /i
          4⤵
          • Executes dropped EXE
          PID:4696
  • C:\WINDOWS\mssecsvc.exe
    C:\WINDOWS\mssecsvc.exe -m security
    1⤵
    • Executes dropped EXE
    • System Location Discovery: System Language Discovery
    • Modifies data under HKEY_USERS
    PID:4228

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Windows\mssecsvc.exe

    Filesize

    3.6MB

    MD5

    2a4ccdee97907b7c5fc48fa9b87fd420

    SHA1

    ed267b971a87edd3993090c6c3de2fb1e2e9ed37

    SHA256

    893f520b51b594710877a979bd2f70c543ce841a837fddaba03ca6e0568adfae

    SHA512

    d840d6b3aceaa5a2c3384dad9574c2b35e06e07606d5d021a67228ec07ddac5038267409df5f400fd1fe64f519001d7410ba775ff79f7097128477b841a97617

  • C:\Windows\tasksche.exe

    Filesize

    3.4MB

    MD5

    555e346044923ab6e1d481cfa9a663d3

    SHA1

    1acc33e2279d65c7ec2616ca5b5aeee5ea8eeeb9

    SHA256

    82d69c27870fbbf3efabb2aec8822e4f4fd20f4170da6a1a82293e7b3633d9ec

    SHA512

    d5631e90e50bd620594ba9f114ffb267210e6ea807c6584c3ee1ec3009d33239aa3a44ad90d1cbe3e4c73fd90e432bfc0665450b09c0d84d0238918a6130cd98