Analysis
-
max time kernel
150s -
max time network
150s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
02/05/2024, 03:44
Static task
static1
Behavioral task
behavioral1
Sample
0d65e35e3f4c02a1f114caa06febcfb9_JaffaCakes118.dll
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
0d65e35e3f4c02a1f114caa06febcfb9_JaffaCakes118.dll
Resource
win10v2004-20240426-en
General
-
Target
0d65e35e3f4c02a1f114caa06febcfb9_JaffaCakes118.dll
-
Size
5.0MB
-
MD5
0d65e35e3f4c02a1f114caa06febcfb9
-
SHA1
18117e82f22d3c97fc375c550182d2ac9ded8301
-
SHA256
695e60fde52ae7bf5eb14e06a27675da78649a1e6fc79c9bf1e57fe006973d65
-
SHA512
34f6f6cc672ee4f4a9fc2072cf6376834152778a60fc0409da0f468f77dedc1b1371156246f1afbba184845f43e486e88db9135faffcc50efd5115cee52ae80b
-
SSDEEP
49152:SnAQqMSPbcBVQej4INRx+TSqTdbxJM0He:+DqPoBh0aRxcSU9xWae
Malware Config
Signatures
-
Wannacry
WannaCry is a ransomware cryptoworm.
-
Contacts a large (3193) amount of remote hosts 1 TTPs
This may indicate a network scan to discover remotely running services.
-
Executes dropped EXE 3 IoCs
pid Process 2684 mssecsvc.exe 2180 mssecsvc.exe 2700 tasksche.exe -
Creates a large amount of network flows 1 TTPs
This may indicate a network scan to discover remotely running services.
-
Drops file in System32 directory 1 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\Temporary Internet Files\counters.dat mssecsvc.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\WINDOWS\mssecsvc.exe rundll32.exe File created C:\WINDOWS\tasksche.exe mssecsvc.exe -
Modifies data under HKEY_USERS 24 IoCs
description ioc Process Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ProxyEnable = "0" mssecsvc.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ mssecsvc.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{3F6778D6-6084-4C66-927A-DC2A42130F35} mssecsvc.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{3F6778D6-6084-4C66-927A-DC2A42130F35}\WpadNetworkName = "Network 3" mssecsvc.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\0a-fd-43-05-e3-85 mssecsvc.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings mssecsvc.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\UNCAsIntranet = "0" mssecsvc.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\AutoDetect = "1" mssecsvc.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\History\CachePrefix = "Visited:" mssecsvc.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad mssecsvc.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\DefaultConnectionSettings = 4600000003000000090000000000000000000000000000000400000000000000000000000000000000000000000000000000000001000000020000000a7f0046000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 mssecsvc.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\0a-fd-43-05-e3-85\WpadDecisionTime = d07c581c439cda01 mssecsvc.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\0a-fd-43-05-e3-85\WpadDecision = "0" mssecsvc.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings mssecsvc.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections mssecsvc.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\DefaultConnectionSettings = 4600000002000000090000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 mssecsvc.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\SavedLegacySettings = 4600000002000000090000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 mssecsvc.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{3F6778D6-6084-4C66-927A-DC2A42130F35}\WpadDecisionTime = d07c581c439cda01 mssecsvc.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{3F6778D6-6084-4C66-927A-DC2A42130F35}\0a-fd-43-05-e3-85 mssecsvc.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Content\CachePrefix mssecsvc.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Cookies\CachePrefix = "Cookie:" mssecsvc.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{3F6778D6-6084-4C66-927A-DC2A42130F35}\WpadDecisionReason = "1" mssecsvc.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{3F6778D6-6084-4C66-927A-DC2A42130F35}\WpadDecision = "0" mssecsvc.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\0a-fd-43-05-e3-85\WpadDecisionReason = "1" mssecsvc.exe -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 2372 wrote to memory of 2544 2372 rundll32.exe 28 PID 2372 wrote to memory of 2544 2372 rundll32.exe 28 PID 2372 wrote to memory of 2544 2372 rundll32.exe 28 PID 2372 wrote to memory of 2544 2372 rundll32.exe 28 PID 2372 wrote to memory of 2544 2372 rundll32.exe 28 PID 2372 wrote to memory of 2544 2372 rundll32.exe 28 PID 2372 wrote to memory of 2544 2372 rundll32.exe 28 PID 2544 wrote to memory of 2684 2544 rundll32.exe 29 PID 2544 wrote to memory of 2684 2544 rundll32.exe 29 PID 2544 wrote to memory of 2684 2544 rundll32.exe 29 PID 2544 wrote to memory of 2684 2544 rundll32.exe 29
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\0d65e35e3f4c02a1f114caa06febcfb9_JaffaCakes118.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:2372 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\0d65e35e3f4c02a1f114caa06febcfb9_JaffaCakes118.dll,#12⤵
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:2544 -
C:\WINDOWS\mssecsvc.exeC:\WINDOWS\mssecsvc.exe3⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:2684 -
C:\WINDOWS\tasksche.exeC:\WINDOWS\tasksche.exe /i4⤵
- Executes dropped EXE
PID:2700
-
-
-
-
C:\WINDOWS\mssecsvc.exeC:\WINDOWS\mssecsvc.exe -m security1⤵
- Executes dropped EXE
- Drops file in System32 directory
- Modifies data under HKEY_USERS
PID:2180
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3.6MB
MD55f11269f8fce0998fc504ba2de6acc57
SHA107c2f0c5d090c0209ba2b6743952bb28ad1cd62e
SHA2565773a2a189ed9ab49cca56f89e041d7aefad67cb0697cae0622402ee7cc67f76
SHA512e8641503f3c31e75d9ff128baf978743af4a4809e45f0d2e8b39014769ac8ba3b5dda3af5ad7df3fa50afe88c9d16b12cee3487df66e4f9a00fd22f67dc97a2e
-
Filesize
3.4MB
MD5c2d664c6898550c21f42a1c2ee6d514c
SHA1e76b59ac51d263cb346aa0eba42022f1e2746a41
SHA256518c5d68c5546c91f4dc37f1589b9c25a39e1e1284af18bc881f8375ca23daad
SHA5124f44755eedeffbff034386f0ddc717169429d0d64b9c9ab912ca0271d42bb889ef2cbe8f3504bda1895be31506d04a65ac67f7dbacd6e045fb84a8c58051b1ba