Analysis
-
max time kernel
150s -
max time network
151s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
21-05-2024 13:55
Static task
static1
Behavioral task
behavioral1
Sample
63869762e9a696591b2cf549cd0566f8_JaffaCakes118.dll
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
63869762e9a696591b2cf549cd0566f8_JaffaCakes118.dll
Resource
win10v2004-20240508-en
General
-
Target
63869762e9a696591b2cf549cd0566f8_JaffaCakes118.dll
-
Size
5.0MB
-
MD5
63869762e9a696591b2cf549cd0566f8
-
SHA1
564f3dc0e995eb7b5892e9dfb35a078cb0ad26aa
-
SHA256
cb790481afa62af1f197b2b87c268f38cfd875bf26de9baa191c50654a0d7014
-
SHA512
8d261ab8db902b1f3f4f4e6cdb3ef7d37f42438fe85ac9dbd6c29205d69f0047a70280d4052384a6b86c11e2d7a598e0020b69fe24c0984c6e86d89277597c2a
-
SSDEEP
98304:TDqPoBhz1aRxcSUDk36SAEdhvxWa9P593R8yAVp2:TDqPe1Cxcxk3ZAEUadzR8yc4
Malware Config
Signatures
-
Wannacry
WannaCry is a ransomware cryptoworm.
-
Contacts a large (3257) amount of remote hosts 1 TTPs
This may indicate a network scan to discover remotely running services.
-
Executes dropped EXE 3 IoCs
Processes:
mssecsvc.exemssecsvc.exetasksche.exepid process 1636 mssecsvc.exe 2128 mssecsvc.exe 2880 tasksche.exe -
Creates a large amount of network flows 1 TTPs
This may indicate a network scan to discover remotely running services.
-
Drops file in System32 directory 1 IoCs
Processes:
mssecsvc.exedescription ioc process File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\Temporary Internet Files\counters.dat mssecsvc.exe -
Drops file in Windows directory 2 IoCs
Processes:
rundll32.exemssecsvc.exedescription ioc process File created C:\WINDOWS\mssecsvc.exe rundll32.exe File created C:\WINDOWS\tasksche.exe mssecsvc.exe -
Modifies data under HKEY_USERS 24 IoCs
Processes:
mssecsvc.exedescription ioc process Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ mssecsvc.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Content\CachePrefix mssecsvc.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\History\CachePrefix = "Visited:" mssecsvc.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad mssecsvc.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{F1BEEA6A-E618-495A-8269-162956B5203E} mssecsvc.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{F1BEEA6A-E618-495A-8269-162956B5203E}\WpadDecisionReason = "1" mssecsvc.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{F1BEEA6A-E618-495A-8269-162956B5203E}\WpadDecision = "0" mssecsvc.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ProxyEnable = "0" mssecsvc.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\ea-d1-1c-00-6d-56\WpadDecisionReason = "1" mssecsvc.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\ea-d1-1c-00-6d-56\WpadDecisionTime = 904ba08986abda01 mssecsvc.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\ea-d1-1c-00-6d-56\WpadDecision = "0" mssecsvc.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{F1BEEA6A-E618-495A-8269-162956B5203E}\WpadNetworkName = "Network 3" mssecsvc.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Cookies\CachePrefix = "Cookie:" mssecsvc.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\AutoDetect = "1" mssecsvc.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings mssecsvc.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\SavedLegacySettings = 4600000002000000090000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 mssecsvc.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\DefaultConnectionSettings = 4600000003000000090000000000000000000000000000000400000000000000000000000000000000000000000000000000000001000000020000000a7f00e5000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 mssecsvc.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{F1BEEA6A-E618-495A-8269-162956B5203E}\ea-d1-1c-00-6d-56 mssecsvc.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings mssecsvc.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\DefaultConnectionSettings = 4600000002000000090000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 mssecsvc.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\UNCAsIntranet = "0" mssecsvc.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{F1BEEA6A-E618-495A-8269-162956B5203E}\WpadDecisionTime = 904ba08986abda01 mssecsvc.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\ea-d1-1c-00-6d-56 mssecsvc.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections mssecsvc.exe -
Suspicious use of WriteProcessMemory 11 IoCs
Processes:
rundll32.exerundll32.exedescription pid process target process PID 2928 wrote to memory of 2980 2928 rundll32.exe rundll32.exe PID 2928 wrote to memory of 2980 2928 rundll32.exe rundll32.exe PID 2928 wrote to memory of 2980 2928 rundll32.exe rundll32.exe PID 2928 wrote to memory of 2980 2928 rundll32.exe rundll32.exe PID 2928 wrote to memory of 2980 2928 rundll32.exe rundll32.exe PID 2928 wrote to memory of 2980 2928 rundll32.exe rundll32.exe PID 2928 wrote to memory of 2980 2928 rundll32.exe rundll32.exe PID 2980 wrote to memory of 1636 2980 rundll32.exe mssecsvc.exe PID 2980 wrote to memory of 1636 2980 rundll32.exe mssecsvc.exe PID 2980 wrote to memory of 1636 2980 rundll32.exe mssecsvc.exe PID 2980 wrote to memory of 1636 2980 rundll32.exe mssecsvc.exe
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\63869762e9a696591b2cf549cd0566f8_JaffaCakes118.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:2928 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\63869762e9a696591b2cf549cd0566f8_JaffaCakes118.dll,#12⤵
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:2980 -
C:\WINDOWS\mssecsvc.exeC:\WINDOWS\mssecsvc.exe3⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:1636 -
C:\WINDOWS\tasksche.exeC:\WINDOWS\tasksche.exe /i4⤵
- Executes dropped EXE
PID:2880
-
-
-
-
C:\WINDOWS\mssecsvc.exeC:\WINDOWS\mssecsvc.exe -m security1⤵
- Executes dropped EXE
- Drops file in System32 directory
- Modifies data under HKEY_USERS
PID:2128
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3.6MB
MD59bd9348496f5e2487b04d6326d7007e1
SHA123fb7dbb33c10decd1cbbe821b8f8dd074fff507
SHA25634f131319dd9db9088813bb554ff5de1fc16abedd3aa25dceaf41fc86f2e5677
SHA512551b10d596f90b8e375faa8a9cf04fc2c681505fcb15853c22bfd4e287d5d895e729499018e0b26dd109eef9d21ed1bf6bd7d391c5bf3c0aeaa15141bbb6cc3a
-
Filesize
3.4MB
MD5fb545ed0a9af74118683c8f4855a7327
SHA12c30159f42e119bd16a6057292b2cc17157494c6
SHA256be7a04540d3d4bffdc295f0cf0b6767582570d7f9443e46ae20426511ad3cb18
SHA512f7a34b47c4e23a45ac33744f656e52e2a5c07360d43e01d68d0d577bb735d911f9310772cba89b3d5d0caaa41e4bbd5a626d3673ccc2c74a0de69d9f809360bf