Analysis
-
max time kernel
150s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
23/05/2024, 18:56
Static task
static1
Behavioral task
behavioral1
Sample
6bf20cfa4ba80e648542102fb81914f4_JaffaCakes118.dll
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
6bf20cfa4ba80e648542102fb81914f4_JaffaCakes118.dll
Resource
win10v2004-20240508-en
General
-
Target
6bf20cfa4ba80e648542102fb81914f4_JaffaCakes118.dll
-
Size
5.0MB
-
MD5
6bf20cfa4ba80e648542102fb81914f4
-
SHA1
9bc1ce68754127c6981ae6d4f0b496ef12d98ca8
-
SHA256
f6445c6a8137ec33bea9f9d0be33d5a57358d93bf0a5f803f2d09772cccb9460
-
SHA512
9a9440b7d44ce79cc26f022e1d641e18ff9e52fe97229465531aafeb4f6127daaa8c42d796b4d7ebe5524ab4ce5f3f7aa468381a132d8c0de7e337155a3a38b7
-
SSDEEP
98304:TDqPoBhbxcSUDk36SAEdhlxWa9P593zp2R:TDqPCxcxk3ZAEaadzz4R
Malware Config
Signatures
-
Wannacry
WannaCry is a ransomware cryptoworm.
-
Contacts a large (3301) amount of remote hosts 1 TTPs
This may indicate a network scan to discover remotely running services.
-
Executes dropped EXE 3 IoCs
pid Process 4444 mssecsvc.exe 4996 mssecsvc.exe 1776 tasksche.exe -
Creates a large amount of network flows 1 TTPs
This may indicate a network scan to discover remotely running services.
-
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\WINDOWS\mssecsvc.exe rundll32.exe File created C:\WINDOWS\tasksche.exe mssecsvc.exe -
Modifies data under HKEY_USERS 5 IoCs
description ioc Process Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\AutoDetect = "0" mssecsvc.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ mssecsvc.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ProxyBypass = "1" mssecsvc.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\IntranetName = "1" mssecsvc.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\UNCAsIntranet = "1" mssecsvc.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 1788 wrote to memory of 2116 1788 rundll32.exe 82 PID 1788 wrote to memory of 2116 1788 rundll32.exe 82 PID 1788 wrote to memory of 2116 1788 rundll32.exe 82 PID 2116 wrote to memory of 4444 2116 rundll32.exe 83 PID 2116 wrote to memory of 4444 2116 rundll32.exe 83 PID 2116 wrote to memory of 4444 2116 rundll32.exe 83
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\6bf20cfa4ba80e648542102fb81914f4_JaffaCakes118.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1788 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\6bf20cfa4ba80e648542102fb81914f4_JaffaCakes118.dll,#12⤵
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:2116 -
C:\WINDOWS\mssecsvc.exeC:\WINDOWS\mssecsvc.exe3⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:4444 -
C:\WINDOWS\tasksche.exeC:\WINDOWS\tasksche.exe /i4⤵
- Executes dropped EXE
PID:1776
-
-
-
-
C:\WINDOWS\mssecsvc.exeC:\WINDOWS\mssecsvc.exe -m security1⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
PID:4996
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3.6MB
MD544f09253b9216e4e04beddaa89f73d8f
SHA1e46471de8a0e97151333799bffbf84c6e58eb185
SHA25685648e5aa9a3d437918ae146a46bb076d1d8aee30dc61db191a44d4fc61a91b8
SHA5128b8d8e55ed93e737bd023eae6a42cc32c0d1099e049719cba09f4eccdb50648293f1173f676631873c61ce99d28a5206583173c7dec4942aade8678cc78c636d
-
Filesize
3.4MB
MD5ad84fae2599defac30e2271bf9509e7a
SHA1b91f077d4d5c9e03da30a795047dcc252013767b
SHA2567ca5828c9e097bbb34b736778e9e91a54bd2b91486ceb17848a5aaff5bab3eed
SHA512dfe8aaaeaf143fa11082dde1d930a483a4ae151a35be197f367ac8e0e827b1ca6e392aa3d1112b2735c46374ccb9cacd7dc720b102b0b6c8ebc07a8cde0374db