Analysis

  • max time kernel
    150s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    28-09-2024 02:55

General

  • Target

    fb5de52c034669c51327ab62cc751ca3_JaffaCakes118.dll

  • Size

    5.0MB

  • MD5

    fb5de52c034669c51327ab62cc751ca3

  • SHA1

    10f84fa83905dda60ecbb009abd48d236e6431c6

  • SHA256

    bc618b7ddd672c575e8a624d50d21a9ac6ce33df9ca62fb42f72d1a50b0e0489

  • SHA512

    0d5fd1a5619aaff0d45459e289cc8ff30701cc32ad44adfca7179bdc284ddca4d9ee3c52b12ad260a2749752af080ad7633e55e78eae0997644917802aed7cf1

  • SSDEEP

    49152:SnjQqMSPbcBVQej/1INRx+TSqTdX1HkQYAMEcaEau3R8yAFHAD:+8qPoBhz1aRxcSUDkn593R8yA

Malware Config

Signatures

  • Wannacry

    WannaCry is a ransomware cryptoworm.

  • Contacts a large (3221) amount of remote hosts 1 TTPs

    This may indicate a network scan to discover remotely running services.

  • Executes dropped EXE 3 IoCs
  • Creates a large amount of network flows 1 TTPs

    This may indicate a network scan to discover remotely running services.

  • Drops file in Windows directory 2 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Windows\system32\rundll32.exe
    rundll32.exe C:\Users\Admin\AppData\Local\Temp\fb5de52c034669c51327ab62cc751ca3_JaffaCakes118.dll,#1
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2748
    • C:\Windows\SysWOW64\rundll32.exe
      rundll32.exe C:\Users\Admin\AppData\Local\Temp\fb5de52c034669c51327ab62cc751ca3_JaffaCakes118.dll,#1
      2⤵
      • Drops file in Windows directory
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:904
      • C:\WINDOWS\mssecsvc.exe
        C:\WINDOWS\mssecsvc.exe
        3⤵
        • Executes dropped EXE
        • Drops file in Windows directory
        • System Location Discovery: System Language Discovery
        PID:4464
        • C:\WINDOWS\tasksche.exe
          C:\WINDOWS\tasksche.exe /i
          4⤵
          • Executes dropped EXE
          PID:4552
  • C:\WINDOWS\mssecsvc.exe
    C:\WINDOWS\mssecsvc.exe -m security
    1⤵
    • Executes dropped EXE
    • System Location Discovery: System Language Discovery
    PID:4920

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Windows\mssecsvc.exe

    Filesize

    3.6MB

    MD5

    ea8097eab115bd657a19c29ac3b37d86

    SHA1

    dfa70772d299e4074156edd79cfc40c9fc7de45f

    SHA256

    74ebf956d373dd23e9678bf4b9d884d011248e3a7ef4b4ee2b5481b11b791a18

    SHA512

    3b314ee9e0fb9d4dd69f436771cd6232940d5343aaf2f65126e394ea2765b857b64aa40233845b060f373ad74621c604a0598696e785427826a324ce28c6f058

  • C:\Windows\tasksche.exe

    Filesize

    3.4MB

    MD5

    e2a2138a1b3a86f2709abb37791ce846

    SHA1

    9985c8a25c9036ecf3a003c160a4c456d7f387ca

    SHA256

    f9d6691d392786b9c1e8837591daaf088ad15d09703042813c3ec05658d8f42b

    SHA512

    b841be76136f17d392bd7447961ffd3bfbc114e1f073b38d5207032ffa9e77fd0d7654ee5532e6c71cab6bb4cbae3bf22b533387a13df58004ac1cadb65a21dc