Analysis
-
max time kernel
150s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
25-05-2024 02:04
Static task
static1
Behavioral task
behavioral1
Sample
7086808c7c91e32ed4516e7a0875ded7_JaffaCakes118.dll
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
7086808c7c91e32ed4516e7a0875ded7_JaffaCakes118.dll
Resource
win10v2004-20240508-en
General
-
Target
7086808c7c91e32ed4516e7a0875ded7_JaffaCakes118.dll
-
Size
5.0MB
-
MD5
7086808c7c91e32ed4516e7a0875ded7
-
SHA1
57a46df867d7edd63f4cd65aeac2b64cf686ebfa
-
SHA256
b4ce551d5c51cfaca6376addb4bf1d8dbfa591cd8ed30b0ed7e6b5404256c711
-
SHA512
c2f118f72a42bc66fdc210b5e162359851b9472862533b71a6ab076ac11ac7f94d14fd679d1a36164532ea435a91f0ff2d3efdc976b2926b1edc67953a5ec3be
-
SSDEEP
98304:+DqPoBhz1aRxcSUDk36SAEdhvxWa9P593RRI:+DqPe1Cxcxk3ZAEUadzRR
Malware Config
Signatures
-
Wannacry
WannaCry is a ransomware cryptoworm.
-
Contacts a large (3334) amount of remote hosts 1 TTPs
This may indicate a network scan to discover remotely running services.
-
Executes dropped EXE 3 IoCs
Processes:
mssecsvc.exemssecsvc.exetasksche.exepid process 4016 mssecsvc.exe 3692 mssecsvc.exe 3256 tasksche.exe -
Creates a large amount of network flows 1 TTPs
This may indicate a network scan to discover remotely running services.
-
Drops file in Windows directory 2 IoCs
Processes:
rundll32.exemssecsvc.exedescription ioc process File created C:\WINDOWS\mssecsvc.exe rundll32.exe File created C:\WINDOWS\tasksche.exe mssecsvc.exe -
Modifies data under HKEY_USERS 5 IoCs
Processes:
mssecsvc.exedescription ioc process Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\IntranetName = "1" mssecsvc.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\UNCAsIntranet = "1" mssecsvc.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\AutoDetect = "0" mssecsvc.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ mssecsvc.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ProxyBypass = "1" mssecsvc.exe -
Suspicious use of WriteProcessMemory 6 IoCs
Processes:
rundll32.exerundll32.exedescription pid process target process PID 1724 wrote to memory of 5032 1724 rundll32.exe rundll32.exe PID 1724 wrote to memory of 5032 1724 rundll32.exe rundll32.exe PID 1724 wrote to memory of 5032 1724 rundll32.exe rundll32.exe PID 5032 wrote to memory of 4016 5032 rundll32.exe mssecsvc.exe PID 5032 wrote to memory of 4016 5032 rundll32.exe mssecsvc.exe PID 5032 wrote to memory of 4016 5032 rundll32.exe mssecsvc.exe
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\7086808c7c91e32ed4516e7a0875ded7_JaffaCakes118.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1724 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\7086808c7c91e32ed4516e7a0875ded7_JaffaCakes118.dll,#12⤵
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:5032 -
C:\WINDOWS\mssecsvc.exeC:\WINDOWS\mssecsvc.exe3⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:4016 -
C:\WINDOWS\tasksche.exeC:\WINDOWS\tasksche.exe /i4⤵
- Executes dropped EXE
PID:3256
-
-
-
-
C:\WINDOWS\mssecsvc.exeC:\WINDOWS\mssecsvc.exe -m security1⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
PID:3692
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3.6MB
MD52f06a5c0ec2e4b2b44267ff86f69a9f1
SHA1bc3b22ec606a89e68005e12857b660e63e07bf39
SHA25651e8f4371093b45e54e658cc348dca17b9fc06db7f91210ecc9494a36de8ceed
SHA512a9715e24f046b4f401e9ac530b097b15c5ec2c84837a72ddb6894869caadb237e41f715fa7a46a336ba6a6e3122e7af2da0020b8284414b636a05087de4dcdda
-
Filesize
3.4MB
MD5487ebfcdca8b103934e1bf138bac5eab
SHA155df5fa9b3e9ef5896319a32aa5040282fd617fb
SHA2566fc518e70dbb031f47bbe4b101a0c314c318772f4c5230134c5086fdc0d8979c
SHA512d5833f025f6923fd1a1846247c8e70fc840d089859615bc4f6ee4ba42a4365cd2e898700977da5a1bdcc7af46811bf283e1e374bf4d8f7e1555472487dc36d64