Analysis

  • max time kernel
    150s
  • max time network
    150s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    29-09-2024 19:14

General

  • Target

    ff334977f091f279eb668bb007dc9edd_JaffaCakes118.dll

  • Size

    5.0MB

  • MD5

    ff334977f091f279eb668bb007dc9edd

  • SHA1

    07e12334f1c21f772aecca0454168a4f2c625f57

  • SHA256

    8c1be674164a3e956a5732112040e5ec564e17f9616902cfa712d1a20c0e6c62

  • SHA512

    e54e34beee3da4f736b08b7ceed99fed317d2ef34bcf2e6f5e6d5607b7f460cb5b9d16c7eddcccd16b3eaa2501a44708883d66a8b8c1ddd1b5cef1e16bd10a33

  • SSDEEP

    49152:SnAQqMSPbcBVQej/1INRx+TSqTdOxJM0H9PAMEcaEau3R8yAHw:+DqPoBhz1aRxcSUwxWa9P593R8yA

Malware Config

Signatures

  • Wannacry

    WannaCry is a ransomware cryptoworm.

  • Contacts a large (3287) amount of remote hosts 1 TTPs

    This may indicate a network scan to discover remotely running services.

  • Executes dropped EXE 3 IoCs
  • Creates a large amount of network flows 1 TTPs

    This may indicate a network scan to discover remotely running services.

  • Drops file in System32 directory 1 IoCs
  • Drops file in Windows directory 2 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies data under HKEY_USERS 24 IoCs
  • Suspicious use of WriteProcessMemory 11 IoCs

Processes

  • C:\Windows\system32\rundll32.exe
    rundll32.exe C:\Users\Admin\AppData\Local\Temp\ff334977f091f279eb668bb007dc9edd_JaffaCakes118.dll,#1
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2904
    • C:\Windows\SysWOW64\rundll32.exe
      rundll32.exe C:\Users\Admin\AppData\Local\Temp\ff334977f091f279eb668bb007dc9edd_JaffaCakes118.dll,#1
      2⤵
      • Drops file in Windows directory
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:2996
      • C:\WINDOWS\mssecsvc.exe
        C:\WINDOWS\mssecsvc.exe
        3⤵
        • Executes dropped EXE
        • Drops file in Windows directory
        • System Location Discovery: System Language Discovery
        PID:3036
        • C:\WINDOWS\tasksche.exe
          C:\WINDOWS\tasksche.exe /i
          4⤵
          • Executes dropped EXE
          PID:2892
  • C:\WINDOWS\mssecsvc.exe
    C:\WINDOWS\mssecsvc.exe -m security
    1⤵
    • Executes dropped EXE
    • Drops file in System32 directory
    • System Location Discovery: System Language Discovery
    • Modifies data under HKEY_USERS
    PID:2492

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Windows\mssecsvc.exe

    Filesize

    3.6MB

    MD5

    0ea6bd08158b898afd8a9327a442281d

    SHA1

    3b56b4b32f9bb5e855b3e8c2acea5b048a9cf6c4

    SHA256

    d238cd3be8b85707276937a53db00dfa2662ade95e7311aaf41a8a6c0ffa1215

    SHA512

    93bbb6725f778bfc712267cde195dbf04492e2a4f78c5b8fa529ae09ecf2c2eab52b32de386920e9dfa40b9482388332510bc75a09c1e8c215b9e6ecde28c9d5

  • C:\Windows\tasksche.exe

    Filesize

    3.4MB

    MD5

    a57f7967e6bc1941828aae58b2f7aa56

    SHA1

    2bfb7578ee1b7e52dd8b2ee646aac42ed1bb028a

    SHA256

    292a77c0b7b31161f98447141447a4063aaaa02aaac48f98f31570e43fe1c06d

    SHA512

    21f81d3a70bbf3fbbe055a34875c5a7e64cf2ff4ba836449e9165a52933083d33be204d0169f86ca6baa306b87204650857b989434112d197692ff085c1633ae