Analysis
-
max time kernel
150s -
max time network
151s -
platform
windows7_x64 -
resource
win7-20240419-en -
resource tags
arch:x64arch:x86image:win7-20240419-enlocale:en-usos:windows7-x64system -
submitted
21-05-2024 08:17
Static task
static1
Behavioral task
behavioral1
Sample
62a0aaca659062139dec2f9742995d8f_JaffaCakes118.dll
Resource
win7-20240419-en
Behavioral task
behavioral2
Sample
62a0aaca659062139dec2f9742995d8f_JaffaCakes118.dll
Resource
win10v2004-20240508-en
General
-
Target
62a0aaca659062139dec2f9742995d8f_JaffaCakes118.dll
-
Size
5.0MB
-
MD5
62a0aaca659062139dec2f9742995d8f
-
SHA1
b8851c3d99ccc12dac0e106dec265db324c3f141
-
SHA256
291e79ceced63d7f5261e133ae6f8956db51acaba0406c47979684595170c55a
-
SHA512
81a13c083cb83a82de51cbc71f2b3f66e2a0b8797732cc36f4a6fff7f51188a7c365e4e80569981df8813a61999838639d7bf38149969d13194145b8034aebca
-
SSDEEP
98304:TDqPoBhz1aRxcSUDk36SAEdhvxWa9P593R8yAVp2:TDqPe1Cxcxk3ZAEUadzR8yc4
Malware Config
Signatures
-
Wannacry
WannaCry is a ransomware cryptoworm.
-
Contacts a large (3170) amount of remote hosts 1 TTPs
This may indicate a network scan to discover remotely running services.
-
Executes dropped EXE 3 IoCs
Processes:
mssecsvc.exemssecsvc.exetasksche.exepid process 2464 mssecsvc.exe 3068 mssecsvc.exe 2880 tasksche.exe -
Creates a large amount of network flows 1 TTPs
This may indicate a network scan to discover remotely running services.
-
Drops file in System32 directory 1 IoCs
Processes:
mssecsvc.exedescription ioc process File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\Temporary Internet Files\counters.dat mssecsvc.exe -
Drops file in Windows directory 2 IoCs
Processes:
rundll32.exemssecsvc.exedescription ioc process File created C:\WINDOWS\mssecsvc.exe rundll32.exe File created C:\WINDOWS\tasksche.exe mssecsvc.exe -
Modifies data under HKEY_USERS 24 IoCs
Processes:
mssecsvc.exedescription ioc process Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\AutoDetect = "1" mssecsvc.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Cookies\CachePrefix = "Cookie:" mssecsvc.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\DefaultConnectionSettings = 4600000003000000090000000000000000000000000000000400000000000000000000000000000000000000000000000000000001000000020000000a7f00c9000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 mssecsvc.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{37BAAEC5-C191-4C28-BB0F-E325833E4815}\WpadDecisionReason = "1" mssecsvc.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{37BAAEC5-C191-4C28-BB0F-E325833E4815}\WpadDecisionTime = 109d65ff5babda01 mssecsvc.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\46-47-65-7c-a1-d4\WpadDecisionTime = 109d65ff5babda01 mssecsvc.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings mssecsvc.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ mssecsvc.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Content\CachePrefix mssecsvc.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\History\CachePrefix = "Visited:" mssecsvc.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{37BAAEC5-C191-4C28-BB0F-E325833E4815}\WpadDecision = "0" mssecsvc.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\46-47-65-7c-a1-d4 mssecsvc.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{37BAAEC5-C191-4C28-BB0F-E325833E4815}\46-47-65-7c-a1-d4 mssecsvc.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections mssecsvc.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\DefaultConnectionSettings = 4600000002000000090000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 mssecsvc.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings mssecsvc.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ProxyEnable = "0" mssecsvc.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\SavedLegacySettings = 4600000002000000090000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 mssecsvc.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\UNCAsIntranet = "0" mssecsvc.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\46-47-65-7c-a1-d4\WpadDecision = "0" mssecsvc.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad mssecsvc.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{37BAAEC5-C191-4C28-BB0F-E325833E4815} mssecsvc.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{37BAAEC5-C191-4C28-BB0F-E325833E4815}\WpadNetworkName = "Network 3" mssecsvc.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\46-47-65-7c-a1-d4\WpadDecisionReason = "1" mssecsvc.exe -
Suspicious use of WriteProcessMemory 11 IoCs
Processes:
rundll32.exerundll32.exedescription pid process target process PID 2028 wrote to memory of 2316 2028 rundll32.exe rundll32.exe PID 2028 wrote to memory of 2316 2028 rundll32.exe rundll32.exe PID 2028 wrote to memory of 2316 2028 rundll32.exe rundll32.exe PID 2028 wrote to memory of 2316 2028 rundll32.exe rundll32.exe PID 2028 wrote to memory of 2316 2028 rundll32.exe rundll32.exe PID 2028 wrote to memory of 2316 2028 rundll32.exe rundll32.exe PID 2028 wrote to memory of 2316 2028 rundll32.exe rundll32.exe PID 2316 wrote to memory of 2464 2316 rundll32.exe mssecsvc.exe PID 2316 wrote to memory of 2464 2316 rundll32.exe mssecsvc.exe PID 2316 wrote to memory of 2464 2316 rundll32.exe mssecsvc.exe PID 2316 wrote to memory of 2464 2316 rundll32.exe mssecsvc.exe
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\62a0aaca659062139dec2f9742995d8f_JaffaCakes118.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:2028 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\62a0aaca659062139dec2f9742995d8f_JaffaCakes118.dll,#12⤵
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:2316 -
C:\WINDOWS\mssecsvc.exeC:\WINDOWS\mssecsvc.exe3⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:2464 -
C:\WINDOWS\tasksche.exeC:\WINDOWS\tasksche.exe /i4⤵
- Executes dropped EXE
PID:2880
-
C:\WINDOWS\mssecsvc.exeC:\WINDOWS\mssecsvc.exe -m security1⤵
- Executes dropped EXE
- Drops file in System32 directory
- Modifies data under HKEY_USERS
PID:3068
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3.6MB
MD5b2d1a374e0e0f925104fc873dad60860
SHA13568e1cb70800b6f90fb20baf7ab2001e74965f8
SHA256d972e80a36c7b5de43d9fc67328408e31fef54bfdf65a347a97cbf9f58721117
SHA512cf2219cf964fd2053e7da65f4e547773a2977bb8de5d3362945c096124febb29b7d1003455ce90315f834c2a0940e17e2ddbe07dbc9cdb8a2b865e029ba0584b
-
Filesize
3.4MB
MD5a5947eeab8ebb06b7d52aa18af302bd8
SHA186d87502721c7524a429069fe1737887487b8ddb
SHA256a701ac320e17aea9bf5f74f063613eda241336a3ed534909c557395045ebca4d
SHA512c8c38e0727c3aba179ec4234224cd16af334ad9ee822882249bc797b3cfe1c3892f84f68e6754f2dd36d61f8e4c4055c5c927b326f4a88c855b2ab61d297f0f4