Analysis
-
max time kernel
150s -
max time network
150s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
12-05-2024 04:03
Static task
static1
Behavioral task
behavioral1
Sample
382805f9620d3f33a18d371150087a9e_JaffaCakes118.dll
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
382805f9620d3f33a18d371150087a9e_JaffaCakes118.dll
Resource
win10v2004-20240508-en
General
-
Target
382805f9620d3f33a18d371150087a9e_JaffaCakes118.dll
-
Size
5.0MB
-
MD5
382805f9620d3f33a18d371150087a9e
-
SHA1
49496d39044d9028fdb9a203c48646bb5477091a
-
SHA256
7068344e1b0ae0acc5aacbfa277050294c7cb4172bec49b60a93dda551422eed
-
SHA512
af0c492dfbfd4f59f15a614deec18ff02d6f59e988ddb34e3ae8666ca9f3371ab7c7a82443b2929172e0e8d910252beace2ac6d1d116e9c92e231f3b6ddb79a5
-
SSDEEP
98304:+DqPoBhz1aRxcSUDk36SAEdhvxWa9P593RLyAVp2H:+DqPe1Cxcxk3ZAEUadzRLyc4H
Malware Config
Signatures
-
Wannacry
WannaCry is a ransomware cryptoworm.
-
Contacts a large (3219) amount of remote hosts 1 TTPs
This may indicate a network scan to discover remotely running services.
-
Executes dropped EXE 3 IoCs
Processes:
mssecsvc.exemssecsvc.exetasksche.exepid process 2136 mssecsvc.exe 1596 mssecsvc.exe 2860 tasksche.exe -
Creates a large amount of network flows 1 TTPs
This may indicate a network scan to discover remotely running services.
-
Drops file in System32 directory 1 IoCs
Processes:
mssecsvc.exedescription ioc process File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\Temporary Internet Files\counters.dat mssecsvc.exe -
Drops file in Windows directory 2 IoCs
Processes:
rundll32.exemssecsvc.exedescription ioc process File created C:\WINDOWS\mssecsvc.exe rundll32.exe File created C:\WINDOWS\tasksche.exe mssecsvc.exe -
Modifies data under HKEY_USERS 24 IoCs
Processes:
mssecsvc.exedescription ioc process Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\SavedLegacySettings = 4600000002000000090000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 mssecsvc.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ mssecsvc.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\AutoDetect = "1" mssecsvc.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Content\CachePrefix mssecsvc.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{822F5F2E-9447-4FC2-9826-69DCB4956D38}\WpadDecisionTime = 307e986721a4da01 mssecsvc.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{822F5F2E-9447-4FC2-9826-69DCB4956D38}\WpadDecision = "0" mssecsvc.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\06-bc-26-6c-29-8a mssecsvc.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings mssecsvc.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{822F5F2E-9447-4FC2-9826-69DCB4956D38}\06-bc-26-6c-29-8a mssecsvc.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\06-bc-26-6c-29-8a\WpadDecisionReason = "1" mssecsvc.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\06-bc-26-6c-29-8a\WpadDecisionTime = 307e986721a4da01 mssecsvc.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{822F5F2E-9447-4FC2-9826-69DCB4956D38}\WpadNetworkName = "Network 3" mssecsvc.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ProxyEnable = "0" mssecsvc.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Cookies\CachePrefix = "Cookie:" mssecsvc.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\History\CachePrefix = "Visited:" mssecsvc.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad mssecsvc.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\DefaultConnectionSettings = 4600000003000000090000000000000000000000000000000400000000000000000000000000000000000000000000000000000001000000020000000a7f0109000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 mssecsvc.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{822F5F2E-9447-4FC2-9826-69DCB4956D38}\WpadDecisionReason = "1" mssecsvc.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings mssecsvc.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\DefaultConnectionSettings = 4600000002000000090000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 mssecsvc.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\UNCAsIntranet = "0" mssecsvc.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{822F5F2E-9447-4FC2-9826-69DCB4956D38} mssecsvc.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\06-bc-26-6c-29-8a\WpadDecision = "0" mssecsvc.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections mssecsvc.exe -
Suspicious use of WriteProcessMemory 11 IoCs
Processes:
rundll32.exerundll32.exedescription pid process target process PID 1652 wrote to memory of 1696 1652 rundll32.exe rundll32.exe PID 1652 wrote to memory of 1696 1652 rundll32.exe rundll32.exe PID 1652 wrote to memory of 1696 1652 rundll32.exe rundll32.exe PID 1652 wrote to memory of 1696 1652 rundll32.exe rundll32.exe PID 1652 wrote to memory of 1696 1652 rundll32.exe rundll32.exe PID 1652 wrote to memory of 1696 1652 rundll32.exe rundll32.exe PID 1652 wrote to memory of 1696 1652 rundll32.exe rundll32.exe PID 1696 wrote to memory of 2136 1696 rundll32.exe mssecsvc.exe PID 1696 wrote to memory of 2136 1696 rundll32.exe mssecsvc.exe PID 1696 wrote to memory of 2136 1696 rundll32.exe mssecsvc.exe PID 1696 wrote to memory of 2136 1696 rundll32.exe mssecsvc.exe
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\382805f9620d3f33a18d371150087a9e_JaffaCakes118.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1652 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\382805f9620d3f33a18d371150087a9e_JaffaCakes118.dll,#12⤵
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:1696 -
C:\WINDOWS\mssecsvc.exeC:\WINDOWS\mssecsvc.exe3⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:2136 -
C:\WINDOWS\tasksche.exeC:\WINDOWS\tasksche.exe /i4⤵
- Executes dropped EXE
PID:2860
-
C:\WINDOWS\mssecsvc.exeC:\WINDOWS\mssecsvc.exe -m security1⤵
- Executes dropped EXE
- Drops file in System32 directory
- Modifies data under HKEY_USERS
PID:1596
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Windows\mssecsvc.exeFilesize
3.6MB
MD5c835db2d7fe1b37c862321a41c6f6afe
SHA1792d71d2e63fdc3b194845c2b669ff3208616f23
SHA25651589762cac08a47aa359f2d427663c8044b30425ed90edffaddeff2bb67e9fc
SHA512194fe1fe82bfcdb1498cb622b21da450e2442ab5fb573c3ea7c81934481cd19bc74838c9e9e161075dc8573f7288bd2b331e3a38d776fbb9edee544a0d8e7639
-
C:\Windows\tasksche.exeFilesize
3.4MB
MD52156875d718aded2f22d8c756348a823
SHA13645f5af7ced9865b6c98eecb20121e13e2ecdb6
SHA2567060365d5de29a22723648b17c6c83014fabebd768b8203cec6e5864cbfe66ce
SHA512aaab463755b0e81f9aa6c32c5b25ee062bab020536c90d59e5abd9a178482547346c3967e4b651572f20cfc687828daf27d0d97569385bf86a03f8bd3995bfab