Analysis
-
max time kernel
150s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
22-05-2024 07:17
Static task
static1
Behavioral task
behavioral1
Sample
6671a8c1f7db3f146f562b114219a57b_JaffaCakes118.dll
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
6671a8c1f7db3f146f562b114219a57b_JaffaCakes118.dll
Resource
win10v2004-20240426-en
General
-
Target
6671a8c1f7db3f146f562b114219a57b_JaffaCakes118.dll
-
Size
5.0MB
-
MD5
6671a8c1f7db3f146f562b114219a57b
-
SHA1
871c6d5567b8b0999be568f23672915836cd8c41
-
SHA256
9209b7bf78a3e064358626d59b608cf90e4913e3ed6cc0482b845c14ed8837db
-
SHA512
71236eca5b638952c2084020547596edbded3f1c4ca5e12bf0ce5cd6d56b38cf46746d0c2cc21c8c16b86770067c92e701f8973883ffa2d73dee68c17299573d
-
SSDEEP
49152:SnAQqMSPbcBVQCj/1INUusG5VoEYVrG2SY7Vp/XNg:+DqPoBtz1aUZLFy2V1
Malware Config
Signatures
-
Wannacry
WannaCry is a ransomware cryptoworm.
-
Contacts a large (3144) amount of remote hosts 1 TTPs
This may indicate a network scan to discover remotely running services.
-
Executes dropped EXE 3 IoCs
pid Process 1572 mssecsvc.exe 2120 mssecsvc.exe 2056 tasksche.exe -
Creates a large amount of network flows 1 TTPs
This may indicate a network scan to discover remotely running services.
-
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\WINDOWS\mssecsvc.exe rundll32.exe File created C:\WINDOWS\tasksche.exe mssecsvc.exe -
Modifies data under HKEY_USERS 5 IoCs
description ioc Process Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ mssecsvc.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ProxyBypass = "1" mssecsvc.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\IntranetName = "1" mssecsvc.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\UNCAsIntranet = "1" mssecsvc.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\AutoDetect = "0" mssecsvc.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 464 wrote to memory of 3712 464 rundll32.exe 83 PID 464 wrote to memory of 3712 464 rundll32.exe 83 PID 464 wrote to memory of 3712 464 rundll32.exe 83 PID 3712 wrote to memory of 1572 3712 rundll32.exe 84 PID 3712 wrote to memory of 1572 3712 rundll32.exe 84 PID 3712 wrote to memory of 1572 3712 rundll32.exe 84
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\6671a8c1f7db3f146f562b114219a57b_JaffaCakes118.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:464 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\6671a8c1f7db3f146f562b114219a57b_JaffaCakes118.dll,#12⤵
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:3712 -
C:\WINDOWS\mssecsvc.exeC:\WINDOWS\mssecsvc.exe3⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:1572 -
C:\WINDOWS\tasksche.exeC:\WINDOWS\tasksche.exe /i4⤵
- Executes dropped EXE
PID:2056
-
-
-
-
C:\WINDOWS\mssecsvc.exeC:\WINDOWS\mssecsvc.exe -m security1⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
PID:2120
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3.6MB
MD5ef9f8ed3b1c339e065b76ac3593b9871
SHA19337bc12ce8cced55220ecc6a105ce6f9ccc84a4
SHA256b0a0f1283bb69ea489a7a912c5b9b6d72b216ae90e5020c7a07a6b5ad3cfa715
SHA51282891893b1d6cf2050ad7847deb2cb798f0018954ba4f1379bd7350c4a96e6ec04f659dc8fd7c6337709fa3bebf4e38949d3854dccd9a7700bb26411bab55dad
-
Filesize
3.4MB
MD52b98ecc02a83f9cd1aa8e2153fd894e7
SHA14ebddd9090dedb303c719cdce269f3045fb10932
SHA25618eee15a89750d98e9e3ca6ae5a4effea0d2f0ed0cef9fcd65d1731461aaa92a
SHA51265e45b68d5979e7c7caf58b29b4708b4972fbc7723322ca4209c7d15208923ef5396bfa65511ce216609b4a4adf282ddde302429766a5b8b32f235fa1dc17b4b