Analysis

  • max time kernel
    150s
  • max time network
    150s
  • platform
    windows7_x64
  • resource
    win7-20240708-en
  • resource tags

    arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system
  • submitted
    29-09-2024 03:12

General

  • Target

    fdb0acaefe261bb6234b71718144da09_JaffaCakes118.dll

  • Size

    5.0MB

  • MD5

    fdb0acaefe261bb6234b71718144da09

  • SHA1

    1836f968ff558509ca24eff208edc10d162fda9c

  • SHA256

    244ba63744af25ee8281f609f63d8cab5d0328a943eb0f98060eca03ef3c8377

  • SHA512

    fbf7ea45619273a40133436c0ba0fb71ef7c83e4a2af4d51f6b6f093bc73434b8dcabfff1f7f5e07334297c0740684e9e6d839ba4c61391f5eacbb2fe6258011

  • SSDEEP

    49152:SnAQqMSPbcBVMAMEcaEau3R8yAH1plAH:+DqPoBS593R8yAVp2H

Malware Config

Signatures

  • Wannacry

    WannaCry is a ransomware cryptoworm.

  • Contacts a large (3261) amount of remote hosts 1 TTPs

    This may indicate a network scan to discover remotely running services.

  • Executes dropped EXE 3 IoCs
  • Creates a large amount of network flows 1 TTPs

    This may indicate a network scan to discover remotely running services.

  • Drops file in System32 directory 1 IoCs
  • Drops file in Windows directory 2 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies data under HKEY_USERS 24 IoCs
  • Suspicious use of WriteProcessMemory 11 IoCs

Processes

  • C:\Windows\system32\rundll32.exe
    rundll32.exe C:\Users\Admin\AppData\Local\Temp\fdb0acaefe261bb6234b71718144da09_JaffaCakes118.dll,#1
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2744
    • C:\Windows\SysWOW64\rundll32.exe
      rundll32.exe C:\Users\Admin\AppData\Local\Temp\fdb0acaefe261bb6234b71718144da09_JaffaCakes118.dll,#1
      2⤵
      • Drops file in Windows directory
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:2804
      • C:\WINDOWS\mssecsvc.exe
        C:\WINDOWS\mssecsvc.exe
        3⤵
        • Executes dropped EXE
        • Drops file in Windows directory
        • System Location Discovery: System Language Discovery
        PID:2820
        • C:\WINDOWS\tasksche.exe
          C:\WINDOWS\tasksche.exe /i
          4⤵
          • Executes dropped EXE
          PID:2828
  • C:\WINDOWS\mssecsvc.exe
    C:\WINDOWS\mssecsvc.exe -m security
    1⤵
    • Executes dropped EXE
    • Drops file in System32 directory
    • System Location Discovery: System Language Discovery
    • Modifies data under HKEY_USERS
    PID:2632

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Windows\mssecsvc.exe

    Filesize

    3.6MB

    MD5

    f813d73319cef27050954a0b621bd6f7

    SHA1

    e6a142059362b84fd48f79e29752cae1db9954b6

    SHA256

    e9e74b16bff15b3be630712f9df27b3e7b4f413e19794e9d6f9fe405c939ae91

    SHA512

    75881cf9d257815b69a1029038d36ac8ba49af29f3facd552208557e384f9b9981911588549021b065e7647af9b5b96d770aaf415308f67ae28e44a6d1739ad2

  • C:\Windows\tasksche.exe

    Filesize

    3.4MB

    MD5

    954c4c2b490695d3b0aff003079bb007

    SHA1

    642a773284afc3b5751c8c1cac3c957ce9c62d6a

    SHA256

    e50607d077ae54c8ee627a80d0007dcfb39647ac693db8543c0505d6560ef08d

    SHA512

    36d4b5bdb915a990e201bf453b243de104e99f6bf499f32fa99ba13f6118a917f12260d9113b6c60fe7be15c02003290a5dd21b2523f8aa7437ec3f0b3f475bc