Analysis

  • max time kernel
    150s
  • max time network
    150s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    27-09-2024 11:35

General

  • Target

    fa54c6f948949abcc7e6e125e6de6f78_JaffaCakes118.dll

  • Size

    5.0MB

  • MD5

    fa54c6f948949abcc7e6e125e6de6f78

  • SHA1

    deb48ea1fd7cb6089199d6ea82a54d9c9fcb323d

  • SHA256

    740175806b713aa062e1bc41c8cae34d7d8e1696757389a47ebf95a94195842d

  • SHA512

    fa6cd5afa1f4727fb5081177f25e78c27fa135b545c275ee8e33d38a330d8bc6c3ce69fd4745c3b229185ad58808ce7e678806c5f05acadeeb3024668e9778a7

  • SSDEEP

    98304:TDqPoBhz1aRxcSUDk36SAEdhvxWa9P5wyAVp2:TDqPe1Cxcxk3ZAEUadSyc4

Malware Config

Signatures

  • Wannacry

    WannaCry is a ransomware cryptoworm.

  • Contacts a large (3337) amount of remote hosts 1 TTPs

    This may indicate a network scan to discover remotely running services.

  • Executes dropped EXE 3 IoCs
  • Creates a large amount of network flows 1 TTPs

    This may indicate a network scan to discover remotely running services.

  • Drops file in System32 directory 1 IoCs
  • Drops file in Windows directory 2 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies data under HKEY_USERS 24 IoCs
  • Suspicious use of WriteProcessMemory 11 IoCs

Processes

  • C:\Windows\system32\rundll32.exe
    rundll32.exe C:\Users\Admin\AppData\Local\Temp\fa54c6f948949abcc7e6e125e6de6f78_JaffaCakes118.dll,#1
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2844
    • C:\Windows\SysWOW64\rundll32.exe
      rundll32.exe C:\Users\Admin\AppData\Local\Temp\fa54c6f948949abcc7e6e125e6de6f78_JaffaCakes118.dll,#1
      2⤵
      • Drops file in Windows directory
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:2860
      • C:\WINDOWS\mssecsvc.exe
        C:\WINDOWS\mssecsvc.exe
        3⤵
        • Executes dropped EXE
        • Drops file in Windows directory
        • System Location Discovery: System Language Discovery
        PID:2908
        • C:\WINDOWS\tasksche.exe
          C:\WINDOWS\tasksche.exe /i
          4⤵
          • Executes dropped EXE
          PID:2384
  • C:\WINDOWS\mssecsvc.exe
    C:\WINDOWS\mssecsvc.exe -m security
    1⤵
    • Executes dropped EXE
    • Drops file in System32 directory
    • System Location Discovery: System Language Discovery
    • Modifies data under HKEY_USERS
    PID:1916

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Windows\mssecsvc.exe

    Filesize

    3.6MB

    MD5

    0a305cb00f5b5ccee3eeb839d59dcc29

    SHA1

    5dcacb4a9c827fb5493834fcc458e566c2025dcd

    SHA256

    1242a277ebc04329df04b9e56768e0d3d7efb8aa159f950fdb7a43c68b3b80d5

    SHA512

    894bd48c3d328dc63f34e0c15ee8bad4a484d856eb8f5e5b318b581e4497ed4739575cdbfafebb7c9ef84d3eb00ed8819e3633c9d9074bdc0b7203221f524a9c

  • C:\Windows\tasksche.exe

    Filesize

    3.4MB

    MD5

    5ff644bf9ddb7607f493572489cb5fe6

    SHA1

    5e7452c49ef2fae9b777a84154a99a6fb683f34e

    SHA256

    405fa830e11193f4280f8a0ca28ce20c445967e828d710a6f24043f9488e8267

    SHA512

    5fb304f44bc98c17ce42e71b44f92ce02badf529b6e6891623fb69461fe5837db1444f580c6f6a0920839b7f4c4a0bfa1d9b58549bbf03300c4d7ac8c5da6203