Analysis
-
max time kernel
150s -
max time network
155s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
25-05-2024 14:10
Static task
static1
Behavioral task
behavioral1
Sample
72383460b7051da3eea9e7b4dc78908b_JaffaCakes118.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
72383460b7051da3eea9e7b4dc78908b_JaffaCakes118.exe
Resource
win10v2004-20240426-en
General
-
Target
72383460b7051da3eea9e7b4dc78908b_JaffaCakes118.exe
-
Size
3.6MB
-
MD5
72383460b7051da3eea9e7b4dc78908b
-
SHA1
0733b12641f945872ff9889b589ef5010d6e1cc4
-
SHA256
e909911c4be68e1684cbddd9ed59622a148d69d8c0bd209c51bb6472f64ced3f
-
SHA512
84e6cdf449ef4a8aee495a206f8f9d7658b31f6da4b72b50a057c45193c0197eae34929082146fd73b5a2fb08971d9e418609232a73a27b3d99fff9aef04a22b
-
SSDEEP
49152:2nAQqMSPbcBVQej/1INRx+TSqTdX1HkQo6SAA:yDqPoBhz1aRxcSUDk36SA
Malware Config
Signatures
-
Wannacry
WannaCry is a ransomware cryptoworm.
-
Contacts a large (3246) amount of remote hosts 1 TTPs
This may indicate a network scan to discover remotely running services.
-
Executes dropped EXE 1 IoCs
Processes:
tasksche.exepid process 1260 tasksche.exe -
Creates a large amount of network flows 1 TTPs
This may indicate a network scan to discover remotely running services.
-
Drops file in Windows directory 1 IoCs
Processes:
72383460b7051da3eea9e7b4dc78908b_JaffaCakes118.exedescription ioc process File created C:\WINDOWS\tasksche.exe 72383460b7051da3eea9e7b4dc78908b_JaffaCakes118.exe -
Modifies data under HKEY_USERS 5 IoCs
Processes:
72383460b7051da3eea9e7b4dc78908b_JaffaCakes118.exedescription ioc process Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\UNCAsIntranet = "1" 72383460b7051da3eea9e7b4dc78908b_JaffaCakes118.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\AutoDetect = "0" 72383460b7051da3eea9e7b4dc78908b_JaffaCakes118.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ 72383460b7051da3eea9e7b4dc78908b_JaffaCakes118.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ProxyBypass = "1" 72383460b7051da3eea9e7b4dc78908b_JaffaCakes118.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\IntranetName = "1" 72383460b7051da3eea9e7b4dc78908b_JaffaCakes118.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\72383460b7051da3eea9e7b4dc78908b_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\72383460b7051da3eea9e7b4dc78908b_JaffaCakes118.exe"1⤵
- Drops file in Windows directory
-
C:\WINDOWS\tasksche.exeC:\WINDOWS\tasksche.exe /i2⤵
- Executes dropped EXE
-
C:\Users\Admin\AppData\Local\Temp\72383460b7051da3eea9e7b4dc78908b_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\72383460b7051da3eea9e7b4dc78908b_JaffaCakes118.exe -m security1⤵
- Modifies data under HKEY_USERS
Network
MITRE ATT&CK Matrix ATT&CK v13
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Windows\tasksche.exeFilesize
3.4MB
MD50e862fd384caa05d55d569357a54f750
SHA160c1869e5086882e7ac5c81e05708aed9af5aa37
SHA256fe667c4e4f6e32748d3c516a42b5ecb9f26d04f755a66797930458566d365a45
SHA512b9c96076acdfaf7b204902141f7f66b0c92d5be37f4a67b5b84471b94548f7ad95a20a5e7b2987d44b8dd9c2a609d674e26f7779378aec9333115171e46454e8