Analysis
-
max time kernel
150s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
25-05-2024 20:48
Static task
static1
Behavioral task
behavioral1
Sample
73331cde051c30581067620c3eeb6bec_JaffaCakes118.dll
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
73331cde051c30581067620c3eeb6bec_JaffaCakes118.dll
Resource
win10v2004-20240508-en
General
-
Target
73331cde051c30581067620c3eeb6bec_JaffaCakes118.dll
-
Size
5.0MB
-
MD5
73331cde051c30581067620c3eeb6bec
-
SHA1
c93c9b7e810e5d2ce1b577139d5e96802b539cc2
-
SHA256
62fb410164bc67a5c81c285f49c3ae5f89135e7c2ee5330fd502f316af10abfe
-
SHA512
c172a37078f0104e3046c7ba7142512ae6041b8c6041c0cd4427f22a8aeb344989b5f29295862e76f0a9a6bf8e50db77c60166bdee9511c5a751093d93b54557
-
SSDEEP
49152:SnAQqmQejcNRx+TSqTdX1HkQo6SAAIvxJM0H9PAMEcaEau3:+DqiqRxcSUDk36SA5xWa9P593
Malware Config
Signatures
-
Wannacry
WannaCry is a ransomware cryptoworm.
-
Contacts a large (3374) amount of remote hosts 1 TTPs
This may indicate a network scan to discover remotely running services.
-
Executes dropped EXE 3 IoCs
Processes:
mssecsvc.exemssecsvc.exetasksche.exepid process 444 mssecsvc.exe 4484 mssecsvc.exe 3252 tasksche.exe -
Creates a large amount of network flows 1 TTPs
This may indicate a network scan to discover remotely running services.
-
Drops file in Windows directory 2 IoCs
Processes:
rundll32.exemssecsvc.exedescription ioc process File created C:\WINDOWS\mssecsvc.exe rundll32.exe File created C:\WINDOWS\tasksche.exe mssecsvc.exe -
Modifies data under HKEY_USERS 5 IoCs
Processes:
mssecsvc.exedescription ioc process Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\AutoDetect = "0" mssecsvc.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ mssecsvc.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ProxyBypass = "1" mssecsvc.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\IntranetName = "1" mssecsvc.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\UNCAsIntranet = "1" mssecsvc.exe -
Suspicious use of WriteProcessMemory 6 IoCs
Processes:
rundll32.exerundll32.exedescription pid process target process PID 2624 wrote to memory of 952 2624 rundll32.exe rundll32.exe PID 2624 wrote to memory of 952 2624 rundll32.exe rundll32.exe PID 2624 wrote to memory of 952 2624 rundll32.exe rundll32.exe PID 952 wrote to memory of 444 952 rundll32.exe mssecsvc.exe PID 952 wrote to memory of 444 952 rundll32.exe mssecsvc.exe PID 952 wrote to memory of 444 952 rundll32.exe mssecsvc.exe
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\73331cde051c30581067620c3eeb6bec_JaffaCakes118.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:2624 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\73331cde051c30581067620c3eeb6bec_JaffaCakes118.dll,#12⤵
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:952 -
C:\WINDOWS\mssecsvc.exeC:\WINDOWS\mssecsvc.exe3⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:444 -
C:\WINDOWS\tasksche.exeC:\WINDOWS\tasksche.exe /i4⤵
- Executes dropped EXE
PID:3252
-
-
-
-
C:\WINDOWS\mssecsvc.exeC:\WINDOWS\mssecsvc.exe -m security1⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
PID:4484
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3.6MB
MD5ac08f2b382b38e4eb13414dca939c8c1
SHA1c0866c471659b277f4b8dbcf5888a77694894261
SHA256f17029a0781b749050cc56757875232e375459c043ef3b042f2ec32d1d4dbe9f
SHA512c038c2835f8215fd867e669ee076b9dbe98ca81e106b30e75eed821f02680274eb0cb2ced1c8101f281c4e875e0a5075aa9d40f9d847bc3c2b81e9e685584371
-
Filesize
3.4MB
MD57d6ec20aeb4931acd69f970369797149
SHA1fba3f597ddbeab4d540942e5061be45d739d9de7
SHA256f37d14ebc85c29ae9f0dcc5d2522e7ac4590c199868b497938a77644002d717b
SHA5122804021e9484d240cd9e8e3d40118d0568ff317997f5852bb8bad120bcbf1fe163c0c71a6b3ae5e8a323ea4224438c0e524a5f7bd0b5dadb098f89dc49ce216c