Analysis
-
max time kernel
150s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
17-05-2024 16:50
Static task
static1
Behavioral task
behavioral1
Sample
507f2fa6d27d5a03234adf269e9ab90d_JaffaCakes118.dll
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
507f2fa6d27d5a03234adf269e9ab90d_JaffaCakes118.dll
Resource
win10v2004-20240426-en
General
-
Target
507f2fa6d27d5a03234adf269e9ab90d_JaffaCakes118.dll
-
Size
5.0MB
-
MD5
507f2fa6d27d5a03234adf269e9ab90d
-
SHA1
b18c4f4b9fb02d1c174ff892bcb842ccbf71f00a
-
SHA256
2265ebb7935691bf627c6e0d23d95b43400ef549409216a8cba4f2885a29c67c
-
SHA512
7af0e464d9a9d201fab18f15a0714da804e80bbe029f80729b14740dd05f3be5393d2cde75974b0df93984fab5950494db52e951513064b07920fe33f1e8adc6
-
SSDEEP
98304:TDqPoBhz1aRxcSUDk36SAEdhvxWa9P593R8y42:TDqPe1Cxcxk3ZAEUadzR8y3
Malware Config
Signatures
-
Wannacry
WannaCry is a ransomware cryptoworm.
-
Contacts a large (3270) amount of remote hosts 1 TTPs
This may indicate a network scan to discover remotely running services.
-
Executes dropped EXE 3 IoCs
Processes:
mssecsvc.exemssecsvc.exetasksche.exepid process 548 mssecsvc.exe 2584 mssecsvc.exe 1520 tasksche.exe -
Creates a large amount of network flows 1 TTPs
This may indicate a network scan to discover remotely running services.
-
Drops file in Windows directory 2 IoCs
Processes:
rundll32.exemssecsvc.exedescription ioc process File created C:\WINDOWS\mssecsvc.exe rundll32.exe File created C:\WINDOWS\tasksche.exe mssecsvc.exe -
Modifies data under HKEY_USERS 5 IoCs
Processes:
mssecsvc.exedescription ioc process Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\IntranetName = "1" mssecsvc.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\UNCAsIntranet = "1" mssecsvc.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\AutoDetect = "0" mssecsvc.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ mssecsvc.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ProxyBypass = "1" mssecsvc.exe -
Suspicious use of WriteProcessMemory 6 IoCs
Processes:
rundll32.exerundll32.exedescription pid process target process PID 4068 wrote to memory of 3224 4068 rundll32.exe rundll32.exe PID 4068 wrote to memory of 3224 4068 rundll32.exe rundll32.exe PID 4068 wrote to memory of 3224 4068 rundll32.exe rundll32.exe PID 3224 wrote to memory of 548 3224 rundll32.exe mssecsvc.exe PID 3224 wrote to memory of 548 3224 rundll32.exe mssecsvc.exe PID 3224 wrote to memory of 548 3224 rundll32.exe mssecsvc.exe
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\507f2fa6d27d5a03234adf269e9ab90d_JaffaCakes118.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:4068 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\507f2fa6d27d5a03234adf269e9ab90d_JaffaCakes118.dll,#12⤵
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:3224 -
C:\WINDOWS\mssecsvc.exeC:\WINDOWS\mssecsvc.exe3⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:548 -
C:\WINDOWS\tasksche.exeC:\WINDOWS\tasksche.exe /i4⤵
- Executes dropped EXE
PID:1520
-
C:\WINDOWS\mssecsvc.exeC:\WINDOWS\mssecsvc.exe -m security1⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
PID:2584
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3.6MB
MD5c7ca832ee769a29defbe66e5798a896b
SHA11e310e8d36220063338f1a51bab7c4e306429818
SHA256c5f17382cf943bee060cdd62c6b2bc22811d2878d4f125a8655675c1ef52a8fc
SHA512a5796f861f2e4f4efe021ce471bef48983fa1045fc046124515eb021e814e8fd9e03855f6e951272f2ff70d961feb58dd305346972c2b91aaca86a63382767a7
-
Filesize
3.4MB
MD51c1c7c7dde876d6a59c343e63edef566
SHA1d2ca52ef0f8b21b68c4949f0d53155182b55e38d
SHA256edfb91543fe1e2dd3b8d7f09abb05515f697310dc7536cf86b4b8666be3efcf5
SHA512da17e34b39a7231168224e7d944d3a9b9289b07f6d116645c959e7d692e3ac45f235ad26be2ab62d6391f4f746f2d21f345e2b17f1b625a640a95e55a6ddd3d8