Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240419-en -
resource tags
arch:x64arch:x86image:win10v2004-20240419-enlocale:en-usos:windows10-2004-x64system -
submitted
07/05/2024, 08:19
Static task
static1
Behavioral task
behavioral1
Sample
200388c26cb013ab659d7c77cfdc0b83_JaffaCakes118.dll
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
200388c26cb013ab659d7c77cfdc0b83_JaffaCakes118.dll
Resource
win10v2004-20240419-en
General
-
Target
200388c26cb013ab659d7c77cfdc0b83_JaffaCakes118.dll
-
Size
5.0MB
-
MD5
200388c26cb013ab659d7c77cfdc0b83
-
SHA1
043143c6e15b1bbbfab1ad5516a0457205d3d913
-
SHA256
3c90f3c70795e8c99bb55c49ddb8180ec3261c615e8b8fc9c0b14a4e58cb51af
-
SHA512
b5b4112bfad9ac2fad3770088471a74332b2298cb6d7d4fb48e894cda7fd520ce8278c7c2f70e82ae6d748fa301b6f4ee8f82cf07af84be1d10a8f4ef807d146
-
SSDEEP
49152:SnAQqMSPbcBVQej/1oxJM0H9PAMEcaEau3R8yAH1plAH:+DqPoBhz1oxWa9P593R8yAVp2H
Malware Config
Signatures
-
Wannacry
WannaCry is a ransomware cryptoworm.
-
Contacts a large (3318) amount of remote hosts 1 TTPs
This may indicate a network scan to discover remotely running services.
-
Executes dropped EXE 3 IoCs
pid Process 1808 mssecsvc.exe 3316 mssecsvc.exe 4448 tasksche.exe -
Creates a large amount of network flows 1 TTPs
This may indicate a network scan to discover remotely running services.
-
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\WINDOWS\mssecsvc.exe rundll32.exe File created C:\WINDOWS\tasksche.exe mssecsvc.exe -
Modifies data under HKEY_USERS 5 IoCs
description ioc Process Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\IntranetName = "1" mssecsvc.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\UNCAsIntranet = "1" mssecsvc.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\AutoDetect = "0" mssecsvc.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ mssecsvc.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ProxyBypass = "1" mssecsvc.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 2636 wrote to memory of 388 2636 rundll32.exe 84 PID 2636 wrote to memory of 388 2636 rundll32.exe 84 PID 2636 wrote to memory of 388 2636 rundll32.exe 84 PID 388 wrote to memory of 1808 388 rundll32.exe 85 PID 388 wrote to memory of 1808 388 rundll32.exe 85 PID 388 wrote to memory of 1808 388 rundll32.exe 85
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\200388c26cb013ab659d7c77cfdc0b83_JaffaCakes118.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:2636 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\200388c26cb013ab659d7c77cfdc0b83_JaffaCakes118.dll,#12⤵
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:388 -
C:\WINDOWS\mssecsvc.exeC:\WINDOWS\mssecsvc.exe3⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:1808 -
C:\WINDOWS\tasksche.exeC:\WINDOWS\tasksche.exe /i4⤵
- Executes dropped EXE
PID:4448
-
-
-
-
C:\WINDOWS\mssecsvc.exeC:\WINDOWS\mssecsvc.exe -m security1⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
PID:3316
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3.6MB
MD577ea16b36102bf3b698299ebed64dbce
SHA153297e7aac45ac27d68e4170323ef02cb117384d
SHA256bef31977a0c504261f9b67bf8dd09ffa6c7a8e4167da8f22cc51be757c5b832a
SHA51220ffc5b41ac8701c561ffe10ca287cbd6b4eb2e838816761f34009cefdaf679c774177be4dc18b59baa06def72454ad99cda721f7d720f9344b3721fd7da0464
-
Filesize
3.4MB
MD540bf8f3b18cd546fe6b8a6e50fdce2e4
SHA1ce11d541947ce7d46c98d3c220e00bf6bbc9faa9
SHA256e2eeb75402025a8cd8ee3a564d404f8fb8096feb44068e1df82445ae51b66185
SHA512dfcbdb9f070edc7b9afdaa46e9002b000224fa1a54afafd28e11ade2227d13b495c4bea9f454505dba9b070adf6ba2f6fbba0396189ed11f569b3d0125333032