Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
150s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
22/05/2024, 07:17
Static task
static1
Behavioral task
behavioral1
Sample
6671a8c1f7db3f146f562b114219a57b_JaffaCakes118.dll
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
6671a8c1f7db3f146f562b114219a57b_JaffaCakes118.dll
Resource
win10v2004-20240426-en
General
-
Target
6671a8c1f7db3f146f562b114219a57b_JaffaCakes118.dll
-
Size
5.0MB
-
MD5
6671a8c1f7db3f146f562b114219a57b
-
SHA1
871c6d5567b8b0999be568f23672915836cd8c41
-
SHA256
9209b7bf78a3e064358626d59b608cf90e4913e3ed6cc0482b845c14ed8837db
-
SHA512
71236eca5b638952c2084020547596edbded3f1c4ca5e12bf0ce5cd6d56b38cf46746d0c2cc21c8c16b86770067c92e701f8973883ffa2d73dee68c17299573d
-
SSDEEP
49152:SnAQqMSPbcBVQCj/1INUusG5VoEYVrG2SY7Vp/XNg:+DqPoBtz1aUZLFy2V1
Malware Config
Signatures
-
Wannacry
WannaCry is a ransomware cryptoworm.
-
Contacts a large (3221) amount of remote hosts 1 TTPs
This may indicate a network scan to discover remotely running services.
-
Executes dropped EXE 3 IoCs
pid Process 1032 mssecsvc.exe 2800 mssecsvc.exe 2720 tasksche.exe -
Creates a large amount of network flows 1 TTPs
This may indicate a network scan to discover remotely running services.
-
Drops file in System32 directory 1 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\Temporary Internet Files\counters.dat mssecsvc.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\WINDOWS\mssecsvc.exe rundll32.exe File created C:\WINDOWS\tasksche.exe mssecsvc.exe -
Modifies data under HKEY_USERS 24 IoCs
description ioc Process Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\76-1b-05-84-a7-92 mssecsvc.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\76-1b-05-84-a7-92\WpadDecision = "0" mssecsvc.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\SavedLegacySettings = 4600000002000000090000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 mssecsvc.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ mssecsvc.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\AutoDetect = "1" mssecsvc.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\History\CachePrefix = "Visited:" mssecsvc.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{E9E71E7C-1F31-456B-B5F6-6B3A05B96363}\WpadDecision = "0" mssecsvc.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\76-1b-05-84-a7-92\WpadDecisionTime = 40b1522f18acda01 mssecsvc.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections mssecsvc.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ProxyEnable = "0" mssecsvc.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Content\CachePrefix mssecsvc.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{E9E71E7C-1F31-456B-B5F6-6B3A05B96363} mssecsvc.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Cookies\CachePrefix = "Cookie:" mssecsvc.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{E9E71E7C-1F31-456B-B5F6-6B3A05B96363}\WpadDecisionTime = 40b1522f18acda01 mssecsvc.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{E9E71E7C-1F31-456B-B5F6-6B3A05B96363}\WpadNetworkName = "Network 3" mssecsvc.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad mssecsvc.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\DefaultConnectionSettings = 4600000003000000090000000000000000000000000000000400000000000000000000000000000000000000000000000000000001000000020000000a7f0038000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 mssecsvc.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{E9E71E7C-1F31-456B-B5F6-6B3A05B96363}\WpadDecisionReason = "1" mssecsvc.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{E9E71E7C-1F31-456B-B5F6-6B3A05B96363}\76-1b-05-84-a7-92 mssecsvc.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings mssecsvc.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\DefaultConnectionSettings = 4600000002000000090000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 mssecsvc.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings mssecsvc.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\UNCAsIntranet = "0" mssecsvc.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\76-1b-05-84-a7-92\WpadDecisionReason = "1" mssecsvc.exe -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 1372 wrote to memory of 1916 1372 rundll32.exe 28 PID 1372 wrote to memory of 1916 1372 rundll32.exe 28 PID 1372 wrote to memory of 1916 1372 rundll32.exe 28 PID 1372 wrote to memory of 1916 1372 rundll32.exe 28 PID 1372 wrote to memory of 1916 1372 rundll32.exe 28 PID 1372 wrote to memory of 1916 1372 rundll32.exe 28 PID 1372 wrote to memory of 1916 1372 rundll32.exe 28 PID 1916 wrote to memory of 1032 1916 rundll32.exe 29 PID 1916 wrote to memory of 1032 1916 rundll32.exe 29 PID 1916 wrote to memory of 1032 1916 rundll32.exe 29 PID 1916 wrote to memory of 1032 1916 rundll32.exe 29
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\6671a8c1f7db3f146f562b114219a57b_JaffaCakes118.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1372 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\6671a8c1f7db3f146f562b114219a57b_JaffaCakes118.dll,#12⤵
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:1916 -
C:\WINDOWS\mssecsvc.exeC:\WINDOWS\mssecsvc.exe3⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:1032 -
C:\WINDOWS\tasksche.exeC:\WINDOWS\tasksche.exe /i4⤵
- Executes dropped EXE
PID:2720
-
-
-
-
C:\WINDOWS\mssecsvc.exeC:\WINDOWS\mssecsvc.exe -m security1⤵
- Executes dropped EXE
- Drops file in System32 directory
- Modifies data under HKEY_USERS
PID:2800
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3.6MB
MD5ef9f8ed3b1c339e065b76ac3593b9871
SHA19337bc12ce8cced55220ecc6a105ce6f9ccc84a4
SHA256b0a0f1283bb69ea489a7a912c5b9b6d72b216ae90e5020c7a07a6b5ad3cfa715
SHA51282891893b1d6cf2050ad7847deb2cb798f0018954ba4f1379bd7350c4a96e6ec04f659dc8fd7c6337709fa3bebf4e38949d3854dccd9a7700bb26411bab55dad
-
Filesize
3.4MB
MD52b98ecc02a83f9cd1aa8e2153fd894e7
SHA14ebddd9090dedb303c719cdce269f3045fb10932
SHA25618eee15a89750d98e9e3ca6ae5a4effea0d2f0ed0cef9fcd65d1731461aaa92a
SHA51265e45b68d5979e7c7caf58b29b4708b4972fbc7723322ca4209c7d15208923ef5396bfa65511ce216609b4a4adf282ddde302429766a5b8b32f235fa1dc17b4b