Analysis
-
max time kernel
150s -
max time network
150s -
platform
windows7_x64 -
resource
win7-20240419-en -
resource tags
arch:x64arch:x86image:win7-20240419-enlocale:en-usos:windows7-x64system -
submitted
24-05-2024 05:19
Static task
static1
Behavioral task
behavioral1
Sample
6d72a26ac1f70167935613dfc6ed93bf_JaffaCakes118.dll
Resource
win7-20240419-en
Behavioral task
behavioral2
Sample
6d72a26ac1f70167935613dfc6ed93bf_JaffaCakes118.dll
Resource
win10v2004-20240508-en
General
-
Target
6d72a26ac1f70167935613dfc6ed93bf_JaffaCakes118.dll
-
Size
5.0MB
-
MD5
6d72a26ac1f70167935613dfc6ed93bf
-
SHA1
e95d1b452a8188f313ffb1336d7407a70a826dd5
-
SHA256
9433714c0f9c4ee4345f8c9c239bc0070ccc62aacc87760a1e8379726f258979
-
SHA512
811dbe47c9a8127c261f4994e9ff56f43c8b2cefbfa4cece38c5d83077cec282a26a24602d63c342e56b8cc0b746d6211db560e3fc5473d015bcd42005ffc926
-
SSDEEP
98304:TDqPoBhz1aRxcSUDk36SAEdhvxWa9X8yAVp2H:TDqPe1Cxcxk3ZAEUaR8yc4H
Malware Config
Signatures
-
Wannacry
WannaCry is a ransomware cryptoworm.
-
Contacts a large (3335) amount of remote hosts 1 TTPs
This may indicate a network scan to discover remotely running services.
-
Executes dropped EXE 3 IoCs
Processes:
mssecsvc.exemssecsvc.exetasksche.exepid process 3020 mssecsvc.exe 2284 mssecsvc.exe 2652 tasksche.exe -
Creates a large amount of network flows 1 TTPs
This may indicate a network scan to discover remotely running services.
-
Drops file in System32 directory 1 IoCs
Processes:
mssecsvc.exedescription ioc process File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\Temporary Internet Files\counters.dat mssecsvc.exe -
Drops file in Windows directory 2 IoCs
Processes:
rundll32.exemssecsvc.exedescription ioc process File created C:\WINDOWS\mssecsvc.exe rundll32.exe File created C:\WINDOWS\tasksche.exe mssecsvc.exe -
Modifies data under HKEY_USERS 24 IoCs
Processes:
mssecsvc.exedescription ioc process Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\DefaultConnectionSettings = 4600000002000000090000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 mssecsvc.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\UNCAsIntranet = "0" mssecsvc.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad mssecsvc.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{7F15AAE7-4121-4599-B42B-A705620238FD} mssecsvc.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{7F15AAE7-4121-4599-B42B-A705620238FD}\WpadDecisionTime = b02285f799adda01 mssecsvc.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\7e-0a-eb-d5-dc-fb\WpadDecisionTime = b02285f799adda01 mssecsvc.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\7e-0a-eb-d5-dc-fb\WpadDecisionReason = "1" mssecsvc.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings mssecsvc.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ProxyEnable = "0" mssecsvc.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ mssecsvc.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\History\CachePrefix = "Visited:" mssecsvc.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{7F15AAE7-4121-4599-B42B-A705620238FD}\WpadDecisionReason = "1" mssecsvc.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{7F15AAE7-4121-4599-B42B-A705620238FD}\WpadDecision = "0" mssecsvc.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections mssecsvc.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\DefaultConnectionSettings = 4600000003000000090000000000000000000000000000000400000000000000000000000000000000000000000000000000000001000000020000000a7f00db000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 mssecsvc.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\7e-0a-eb-d5-dc-fb\WpadDecision = "0" mssecsvc.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\7e-0a-eb-d5-dc-fb mssecsvc.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{7F15AAE7-4121-4599-B42B-A705620238FD}\7e-0a-eb-d5-dc-fb mssecsvc.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings mssecsvc.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\SavedLegacySettings = 4600000002000000090000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 mssecsvc.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\AutoDetect = "1" mssecsvc.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Content\CachePrefix mssecsvc.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Cookies\CachePrefix = "Cookie:" mssecsvc.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{7F15AAE7-4121-4599-B42B-A705620238FD}\WpadNetworkName = "Network 3" mssecsvc.exe -
Suspicious use of WriteProcessMemory 11 IoCs
Processes:
rundll32.exerundll32.exedescription pid process target process PID 2944 wrote to memory of 2964 2944 rundll32.exe rundll32.exe PID 2944 wrote to memory of 2964 2944 rundll32.exe rundll32.exe PID 2944 wrote to memory of 2964 2944 rundll32.exe rundll32.exe PID 2944 wrote to memory of 2964 2944 rundll32.exe rundll32.exe PID 2944 wrote to memory of 2964 2944 rundll32.exe rundll32.exe PID 2944 wrote to memory of 2964 2944 rundll32.exe rundll32.exe PID 2944 wrote to memory of 2964 2944 rundll32.exe rundll32.exe PID 2964 wrote to memory of 3020 2964 rundll32.exe mssecsvc.exe PID 2964 wrote to memory of 3020 2964 rundll32.exe mssecsvc.exe PID 2964 wrote to memory of 3020 2964 rundll32.exe mssecsvc.exe PID 2964 wrote to memory of 3020 2964 rundll32.exe mssecsvc.exe
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\6d72a26ac1f70167935613dfc6ed93bf_JaffaCakes118.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:2944 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\6d72a26ac1f70167935613dfc6ed93bf_JaffaCakes118.dll,#12⤵
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:2964 -
C:\WINDOWS\mssecsvc.exeC:\WINDOWS\mssecsvc.exe3⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:3020 -
C:\WINDOWS\tasksche.exeC:\WINDOWS\tasksche.exe /i4⤵
- Executes dropped EXE
PID:2652
-
-
-
-
C:\WINDOWS\mssecsvc.exeC:\WINDOWS\mssecsvc.exe -m security1⤵
- Executes dropped EXE
- Drops file in System32 directory
- Modifies data under HKEY_USERS
PID:2284
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3.6MB
MD53f3393a94965480637f611a523caf0de
SHA103805196d601f25c613dc882d6d6ab833296e967
SHA256936d74fd89ddf4736979d9da96a37a22a0cb513480d9449999f730f1c006046f
SHA51243316970e2b5315cd3856d9d1f6ed25ec4a0c26e927b6b87f376a84bfe227faad93d77b76f045ae04eede1d3ea1176e436ff47c066ad75e231e2e792f7fc8f39
-
Filesize
3.4MB
MD534fc62dc858e3c87fa5040e9bc9bf08c
SHA16c6c0e3bc6882ba6dc58f3275b9a326b705b39b0
SHA256c89b3dbc3001836dc13103e56b4731c3d7e589090753517c88fbe35a76d66eec
SHA5123232c7b01636222092e2a98151174585dba1c98fe77bf4cf5b867079477e706b4381501d85cb7ff9808f572ee7417e03d1150760769ae616f5b261917795fa35