Analysis
-
max time kernel
150s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
22-05-2024 20:31
Static task
static1
Behavioral task
behavioral1
Sample
6887821d151dc76e97740655d040af67_JaffaCakes118.dll
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
6887821d151dc76e97740655d040af67_JaffaCakes118.dll
Resource
win10v2004-20240508-en
General
-
Target
6887821d151dc76e97740655d040af67_JaffaCakes118.dll
-
Size
5.0MB
-
MD5
6887821d151dc76e97740655d040af67
-
SHA1
0d7915053db68cf89ac984975fe5eebcf4c0dbc7
-
SHA256
f5e0b725d2fb35c1b4a9a2ac6efb3d4a3e7aa9fb9422022bc19082ef8190128e
-
SHA512
bc1b6362d6f018cc43cf2f52a178ee20251d1099169c498e37216c82961291d3be91dc667866067a7cd809f6e9cbb39a1a9b0773b09c726136f6743597137218
-
SSDEEP
24576:SbLgddQhfdmMSirYbcMNgef0qMEcpcL7nEaut/8uME7A4kqAH1pNZtA0p+9XEk:SnAQqMSPbcBVqMEcaEau3R8yAH1plAH
Malware Config
Signatures
-
Wannacry
WannaCry is a ransomware cryptoworm.
-
Contacts a large (3324) amount of remote hosts 1 TTPs
This may indicate a network scan to discover remotely running services.
-
Executes dropped EXE 3 IoCs
Processes:
mssecsvc.exemssecsvc.exetasksche.exepid process 2580 mssecsvc.exe 3552 mssecsvc.exe 4948 tasksche.exe -
Creates a large amount of network flows 1 TTPs
This may indicate a network scan to discover remotely running services.
-
Drops file in Windows directory 2 IoCs
Processes:
rundll32.exemssecsvc.exedescription ioc process File created C:\WINDOWS\mssecsvc.exe rundll32.exe File created C:\WINDOWS\tasksche.exe mssecsvc.exe -
Modifies data under HKEY_USERS 5 IoCs
Processes:
mssecsvc.exedescription ioc process Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\AutoDetect = "0" mssecsvc.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ mssecsvc.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ProxyBypass = "1" mssecsvc.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\IntranetName = "1" mssecsvc.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\UNCAsIntranet = "1" mssecsvc.exe -
Suspicious use of WriteProcessMemory 6 IoCs
Processes:
rundll32.exerundll32.exedescription pid process target process PID 5104 wrote to memory of 4032 5104 rundll32.exe rundll32.exe PID 5104 wrote to memory of 4032 5104 rundll32.exe rundll32.exe PID 5104 wrote to memory of 4032 5104 rundll32.exe rundll32.exe PID 4032 wrote to memory of 2580 4032 rundll32.exe mssecsvc.exe PID 4032 wrote to memory of 2580 4032 rundll32.exe mssecsvc.exe PID 4032 wrote to memory of 2580 4032 rundll32.exe mssecsvc.exe
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\6887821d151dc76e97740655d040af67_JaffaCakes118.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:5104 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\6887821d151dc76e97740655d040af67_JaffaCakes118.dll,#12⤵
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:4032 -
C:\WINDOWS\mssecsvc.exeC:\WINDOWS\mssecsvc.exe3⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:2580 -
C:\WINDOWS\tasksche.exeC:\WINDOWS\tasksche.exe /i4⤵
- Executes dropped EXE
PID:4948
-
-
-
-
C:\WINDOWS\mssecsvc.exeC:\WINDOWS\mssecsvc.exe -m security1⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
PID:3552
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3.6MB
MD59d33bfa57dea52c3d1d21c2a0bb2bfc3
SHA11711cd3bbb91d1f82a5d9a465171343046f1f6bf
SHA256e130372fc98f52cc794788940b75c8fb11017bbb64d1df9849752c23060ccd41
SHA51238e431417bb941ccb21c29ad02068d5b6c6ec5bee451b4193cfdc6753b3332fe4bc8f9ea54a46b503fa8220e1d02d28d13b380b81ce3e4ee4d1436bf23ee4c7a
-
Filesize
3.4MB
MD519cbe6b8c799727886ca99a69a320004
SHA1da6f79f66ee82ca61c36d2b29ff09f6d474eabc6
SHA25666d93625cd977147c28dc0bd091586fe6d5149ac9b8da6c89eba0b849f19bb62
SHA512e70312e1cf2de6f5267aeb5e0a1572c2bc3fd436c1770d9d8c046cd08521e903baac9d3d650d255d968741de6b52ac33f99cedd069ab560f1ec5cf5feca2620e