Analysis
-
max time kernel
150s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
23-05-2024 07:26
Static task
static1
Behavioral task
behavioral1
Sample
6a300f7511bc43a6aab995f038f7a823_JaffaCakes118.dll
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
6a300f7511bc43a6aab995f038f7a823_JaffaCakes118.dll
Resource
win10v2004-20240426-en
General
-
Target
6a300f7511bc43a6aab995f038f7a823_JaffaCakes118.dll
-
Size
5.0MB
-
MD5
6a300f7511bc43a6aab995f038f7a823
-
SHA1
b019d883a036fa07443bedce3370765817c9b0d3
-
SHA256
e82c1e6faa4031163ac5859fa08f1950fd6c9d54f600bd589447b03017de8492
-
SHA512
f0315ab0dc75b0e89af526e811a4addd8d9d515d713ebb66954720f320499290bc490b3e954985882c3268c0843031b1f820a74fe10130e1df10d7a4ee02d894
-
SSDEEP
49152:znAQqMSPbcBVQej/1INRx+TSqTdX1HkQo6SAARdhnvxJM0H9P:TDqPoBhz1aRxcSUDk36SAEdhvxWa9P
Malware Config
Signatures
-
Wannacry
WannaCry is a ransomware cryptoworm.
-
Contacts a large (3304) amount of remote hosts 1 TTPs
This may indicate a network scan to discover remotely running services.
-
Executes dropped EXE 3 IoCs
Processes:
mssecsvc.exemssecsvc.exetasksche.exepid process 1572 mssecsvc.exe 2232 mssecsvc.exe 1804 tasksche.exe -
Creates a large amount of network flows 1 TTPs
This may indicate a network scan to discover remotely running services.
-
Drops file in Windows directory 2 IoCs
Processes:
rundll32.exemssecsvc.exedescription ioc process File created C:\WINDOWS\mssecsvc.exe rundll32.exe File created C:\WINDOWS\tasksche.exe mssecsvc.exe -
Modifies data under HKEY_USERS 5 IoCs
Processes:
mssecsvc.exedescription ioc process Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\AutoDetect = "0" mssecsvc.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ mssecsvc.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ProxyBypass = "1" mssecsvc.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\IntranetName = "1" mssecsvc.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\UNCAsIntranet = "1" mssecsvc.exe -
Suspicious use of WriteProcessMemory 6 IoCs
Processes:
rundll32.exerundll32.exedescription pid process target process PID 3944 wrote to memory of 388 3944 rundll32.exe rundll32.exe PID 3944 wrote to memory of 388 3944 rundll32.exe rundll32.exe PID 3944 wrote to memory of 388 3944 rundll32.exe rundll32.exe PID 388 wrote to memory of 1572 388 rundll32.exe mssecsvc.exe PID 388 wrote to memory of 1572 388 rundll32.exe mssecsvc.exe PID 388 wrote to memory of 1572 388 rundll32.exe mssecsvc.exe
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\6a300f7511bc43a6aab995f038f7a823_JaffaCakes118.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:3944 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\6a300f7511bc43a6aab995f038f7a823_JaffaCakes118.dll,#12⤵
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:388 -
C:\WINDOWS\mssecsvc.exeC:\WINDOWS\mssecsvc.exe3⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:1572 -
C:\WINDOWS\tasksche.exeC:\WINDOWS\tasksche.exe /i4⤵
- Executes dropped EXE
PID:1804
-
C:\WINDOWS\mssecsvc.exeC:\WINDOWS\mssecsvc.exe -m security1⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
PID:2232
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3.6MB
MD563b59275de88afa772427f77601b2ad3
SHA198a73f0253aeec76180f14d8a7947bcd17f47189
SHA256c904ee55ed12e44e6eee61d4d0a052b66c610892a328c14b3a3b5001553b6545
SHA51283014d827b59641dcc7910c2d63730c194a7345d55843bcd987b39e79ab894433f71bb86c493d20f85c7909bd7a9204e9443f2a282d7889179b474d93642db81
-
Filesize
3.4MB
MD544fd2345869884ef62ef1b66796f7ba9
SHA1919fc5058ca61ab4595cf08413f9aa561b8e233d
SHA256189936f9262dc8b9284f3c8aee23f106dbffa908609a483d758aa73c57203306
SHA512b5b23dc4016f61d37aab61b8bad6b15108af6b161830ba03557c6d3c0b4ebe076f92f5dd2f7e4376b9e169d25d88d4e4fb5b42db44db786fc3469a7cdc2559b1