Analysis
-
max time kernel
150s -
max time network
150s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
14/05/2024, 05:42
Static task
static1
Behavioral task
behavioral1
Sample
3e142c642b1d1e6a01ae319ccbe487a3_JaffaCakes118.dll
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
3e142c642b1d1e6a01ae319ccbe487a3_JaffaCakes118.dll
Resource
win10v2004-20240508-en
General
-
Target
3e142c642b1d1e6a01ae319ccbe487a3_JaffaCakes118.dll
-
Size
5.0MB
-
MD5
3e142c642b1d1e6a01ae319ccbe487a3
-
SHA1
5653bf6e1613bfab68d6d05111b312ed0dceb448
-
SHA256
6f282c0df25a61bef8bd83b317d7c9493b575717b691e30d63da8cb5ec898e7b
-
SHA512
e1215c551e96f2f6e3b5266ef845853fb11e3699ae554bbbec51a8e4c6c91763df1242290dc167b129e96aa33665edd5d3d350d59479c1060f1837052e811640
-
SSDEEP
98304:TDqPoBhz1aRxcSUDk36SAEdhvxWaN3R8yAVp2H:TDqPe1Cxcxk3ZAEUaNR8yc4H
Malware Config
Signatures
-
Wannacry
WannaCry is a ransomware cryptoworm.
-
Contacts a large (3151) amount of remote hosts 1 TTPs
This may indicate a network scan to discover remotely running services.
-
Executes dropped EXE 3 IoCs
pid Process 2056 mssecsvc.exe 2616 mssecsvc.exe 2744 tasksche.exe -
Creates a large amount of network flows 1 TTPs
This may indicate a network scan to discover remotely running services.
-
Drops file in System32 directory 1 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\Temporary Internet Files\counters.dat mssecsvc.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\WINDOWS\mssecsvc.exe rundll32.exe File created C:\WINDOWS\tasksche.exe mssecsvc.exe -
Modifies data under HKEY_USERS 24 IoCs
description ioc Process Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{68758131-F71B-4337-B149-E3D21C707BFB}\WpadDecision = "0" mssecsvc.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\7a-ac-0b-2e-eb-57\WpadDecision = "0" mssecsvc.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings mssecsvc.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\SavedLegacySettings = 4600000002000000090000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 mssecsvc.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\AutoDetect = "1" mssecsvc.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\DefaultConnectionSettings = 4600000002000000090000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 mssecsvc.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ProxyEnable = "0" mssecsvc.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad mssecsvc.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{68758131-F71B-4337-B149-E3D21C707BFB} mssecsvc.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{68758131-F71B-4337-B149-E3D21C707BFB}\WpadDecisionTime = 80b38495c1a5da01 mssecsvc.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{68758131-F71B-4337-B149-E3D21C707BFB}\WpadNetworkName = "Network 3" mssecsvc.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{68758131-F71B-4337-B149-E3D21C707BFB}\7a-ac-0b-2e-eb-57 mssecsvc.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\7a-ac-0b-2e-eb-57\WpadDecisionReason = "1" mssecsvc.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings mssecsvc.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections mssecsvc.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\UNCAsIntranet = "0" mssecsvc.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\7a-ac-0b-2e-eb-57\WpadDecisionTime = 80b38495c1a5da01 mssecsvc.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\History\CachePrefix = "Visited:" mssecsvc.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\DefaultConnectionSettings = 4600000003000000090000000000000000000000000000000400000000000000000000000000000000000000000000000000000001000000020000000a7f00a8000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 mssecsvc.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{68758131-F71B-4337-B149-E3D21C707BFB}\WpadDecisionReason = "1" mssecsvc.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\7a-ac-0b-2e-eb-57 mssecsvc.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ mssecsvc.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Content\CachePrefix mssecsvc.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Cookies\CachePrefix = "Cookie:" mssecsvc.exe -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 1688 wrote to memory of 2984 1688 rundll32.exe 28 PID 1688 wrote to memory of 2984 1688 rundll32.exe 28 PID 1688 wrote to memory of 2984 1688 rundll32.exe 28 PID 1688 wrote to memory of 2984 1688 rundll32.exe 28 PID 1688 wrote to memory of 2984 1688 rundll32.exe 28 PID 1688 wrote to memory of 2984 1688 rundll32.exe 28 PID 1688 wrote to memory of 2984 1688 rundll32.exe 28 PID 2984 wrote to memory of 2056 2984 rundll32.exe 29 PID 2984 wrote to memory of 2056 2984 rundll32.exe 29 PID 2984 wrote to memory of 2056 2984 rundll32.exe 29 PID 2984 wrote to memory of 2056 2984 rundll32.exe 29
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\3e142c642b1d1e6a01ae319ccbe487a3_JaffaCakes118.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1688 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\3e142c642b1d1e6a01ae319ccbe487a3_JaffaCakes118.dll,#12⤵
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:2984 -
C:\WINDOWS\mssecsvc.exeC:\WINDOWS\mssecsvc.exe3⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:2056 -
C:\WINDOWS\tasksche.exeC:\WINDOWS\tasksche.exe /i4⤵
- Executes dropped EXE
PID:2744
-
-
-
-
C:\WINDOWS\mssecsvc.exeC:\WINDOWS\mssecsvc.exe -m security1⤵
- Executes dropped EXE
- Drops file in System32 directory
- Modifies data under HKEY_USERS
PID:2616
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3.6MB
MD57e8224b83706096a14573b5a1a411314
SHA189bf59ccdbde5de5d1eaeac797470afa6c19cfb6
SHA256d8ad2b8c468d3262291f2a86a453a2fef3dbd0600faf85b4df7a3978140ef4b3
SHA512895ac90515670a435482af2b3dd6d348c31443d4a1fef625c278936e3636875f7a315645d1b31670a938a4dbce34cb032f4acae7ab9f43910369d981ec510b2b
-
Filesize
3.4MB
MD566705a0978e9146d15b753dd2293c2ef
SHA13e132c60046917618e080ea8e0d477ae91fd4d73
SHA256547ed4d6e8392eebe30c2f755f529c1079bb17907d32a532261a1fe2dd1dc9c0
SHA5126b9cde50b901c297b4d783bf23c59202c7a45d94f6cc2545575a8f374f43673534883ce627edc990d7b1cd14c4130b1a400624df1bde923896a535da0cb82e16