Analysis
-
max time kernel
150s -
max time network
150s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
25-05-2024 02:25
Static task
static1
Behavioral task
behavioral1
Sample
7092daf7ceaf7f21660df2f055b702d1_JaffaCakes118.dll
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
7092daf7ceaf7f21660df2f055b702d1_JaffaCakes118.dll
Resource
win10v2004-20240508-en
General
-
Target
7092daf7ceaf7f21660df2f055b702d1_JaffaCakes118.dll
-
Size
5.0MB
-
MD5
7092daf7ceaf7f21660df2f055b702d1
-
SHA1
e7fb1fb580aee76a25f04259d1651de59f39bc19
-
SHA256
89ca97aacb16aa0bb8b312385dfe7148eaf2e02d8a136383b2962fe51c671038
-
SHA512
2a763ece46d873d1229a1a82790beddcef8e71a3cdacf39eb7727a87dfa8dd55a08cf0bff0788860a8da444e44864a58fdc57db1522a308a7f662c5744d01ce6
-
SSDEEP
49152:SnAQqMSPbcBVQej/1INRx+TSqTdX1HkQo6SAARdhnvxJM0H9PAMEc:+DqPoBhz1aRxcSUDk36SAEdhvxWa9P5
Malware Config
Signatures
-
Wannacry
WannaCry is a ransomware cryptoworm.
-
Contacts a large (3309) amount of remote hosts 1 TTPs
This may indicate a network scan to discover remotely running services.
-
Executes dropped EXE 3 IoCs
Processes:
mssecsvc.exemssecsvc.exetasksche.exepid process 3040 mssecsvc.exe 1732 mssecsvc.exe 2776 tasksche.exe -
Creates a large amount of network flows 1 TTPs
This may indicate a network scan to discover remotely running services.
-
Drops file in System32 directory 1 IoCs
Processes:
mssecsvc.exedescription ioc process File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\Temporary Internet Files\counters.dat mssecsvc.exe -
Drops file in Windows directory 2 IoCs
Processes:
mssecsvc.exerundll32.exedescription ioc process File created C:\WINDOWS\tasksche.exe mssecsvc.exe File created C:\WINDOWS\mssecsvc.exe rundll32.exe -
Modifies data under HKEY_USERS 24 IoCs
Processes:
mssecsvc.exedescription ioc process Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings mssecsvc.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\DefaultConnectionSettings = 4600000002000000090000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 mssecsvc.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\History\CachePrefix = "Visited:" mssecsvc.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{2B449418-8E9A-4EC0-9EB4-692E90704461}\WpadDecision = "0" mssecsvc.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections mssecsvc.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\SavedLegacySettings = 4600000002000000090000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 mssecsvc.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\AutoDetect = "1" mssecsvc.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Cookies\CachePrefix = "Cookie:" mssecsvc.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ mssecsvc.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad mssecsvc.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\DefaultConnectionSettings = 4600000003000000090000000000000000000000000000000400000000000000000000000000000000000000000000000000000001000000020000000a7f008e000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 mssecsvc.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\96-50-f9-f5-4c-41 mssecsvc.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\96-50-f9-f5-4c-41\WpadDecisionReason = "1" mssecsvc.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\96-50-f9-f5-4c-41\WpadDecision = "0" mssecsvc.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{2B449418-8E9A-4EC0-9EB4-692E90704461}\WpadNetworkName = "Network 3" mssecsvc.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings mssecsvc.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ProxyEnable = "0" mssecsvc.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\UNCAsIntranet = "0" mssecsvc.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Content\CachePrefix mssecsvc.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{2B449418-8E9A-4EC0-9EB4-692E90704461} mssecsvc.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{2B449418-8E9A-4EC0-9EB4-692E90704461}\WpadDecisionReason = "1" mssecsvc.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{2B449418-8E9A-4EC0-9EB4-692E90704461}\WpadDecisionTime = f0c3e5d64aaeda01 mssecsvc.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{2B449418-8E9A-4EC0-9EB4-692E90704461}\96-50-f9-f5-4c-41 mssecsvc.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\96-50-f9-f5-4c-41\WpadDecisionTime = f0c3e5d64aaeda01 mssecsvc.exe -
Suspicious use of WriteProcessMemory 11 IoCs
Processes:
rundll32.exerundll32.exedescription pid process target process PID 2928 wrote to memory of 2996 2928 rundll32.exe rundll32.exe PID 2928 wrote to memory of 2996 2928 rundll32.exe rundll32.exe PID 2928 wrote to memory of 2996 2928 rundll32.exe rundll32.exe PID 2928 wrote to memory of 2996 2928 rundll32.exe rundll32.exe PID 2928 wrote to memory of 2996 2928 rundll32.exe rundll32.exe PID 2928 wrote to memory of 2996 2928 rundll32.exe rundll32.exe PID 2928 wrote to memory of 2996 2928 rundll32.exe rundll32.exe PID 2996 wrote to memory of 3040 2996 rundll32.exe mssecsvc.exe PID 2996 wrote to memory of 3040 2996 rundll32.exe mssecsvc.exe PID 2996 wrote to memory of 3040 2996 rundll32.exe mssecsvc.exe PID 2996 wrote to memory of 3040 2996 rundll32.exe mssecsvc.exe
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\7092daf7ceaf7f21660df2f055b702d1_JaffaCakes118.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:2928 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\7092daf7ceaf7f21660df2f055b702d1_JaffaCakes118.dll,#12⤵
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:2996 -
C:\WINDOWS\mssecsvc.exeC:\WINDOWS\mssecsvc.exe3⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:3040 -
C:\WINDOWS\tasksche.exeC:\WINDOWS\tasksche.exe /i4⤵
- Executes dropped EXE
PID:2776
-
-
-
-
C:\WINDOWS\mssecsvc.exeC:\WINDOWS\mssecsvc.exe -m security1⤵
- Executes dropped EXE
- Drops file in System32 directory
- Modifies data under HKEY_USERS
PID:1732
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3.6MB
MD59d4dad2e482d5f642d4164880d920c9f
SHA14c1a2b51421a0113f755ef0f4f6a39692436a7bc
SHA256e324457da3dada0fa8ed504729f89f141401b3e3e6f061834d78827da0a3adfa
SHA51227fc81c39cc4d5b3fe7416f0a474b72c0e2ebff095dfde6eae5f7e0b6304cd78ec801c14291b9f56a197e6f3a1b3491dc16634344f83bdf6166871bde3098670
-
Filesize
3.4MB
MD54a0d611d7593c3c9500a3ed2d4219ab0
SHA1209032376184962093112aac15e2bb738e99296d
SHA256068c40a3bd18bf73312b24b70de6d6e2119c0b40b9e4aac3278ab78f38a75b77
SHA5124b4c6cb8c6fa46dadbbd7615506a3362462e50b1bb8d0a8e78bed89bcdae5a9215b80a3773f36f079447d816b29aabb91c3da3089c922a25d9c772c4648be447