Analysis
-
max time kernel
150s -
max time network
150s -
platform
windows7_x64 -
resource
win7-20240419-en -
resource tags
arch:x64arch:x86image:win7-20240419-enlocale:en-usos:windows7-x64system -
submitted
26-05-2024 22:33
Static task
static1
Behavioral task
behavioral1
Sample
77035824023eb4fc733ec1ef27a7a669_JaffaCakes118.dll
Resource
win7-20240419-en
Behavioral task
behavioral2
Sample
77035824023eb4fc733ec1ef27a7a669_JaffaCakes118.dll
Resource
win10v2004-20240508-en
General
-
Target
77035824023eb4fc733ec1ef27a7a669_JaffaCakes118.dll
-
Size
5.0MB
-
MD5
77035824023eb4fc733ec1ef27a7a669
-
SHA1
50dcafea069c6b351a949873a170508dfa71e848
-
SHA256
b7abdb377c1c28b4722d97093e022a8cee120102b7524c0c9f3e2a04d7ac0e95
-
SHA512
edacfa391a18087a51aa3e1a7794cde8622d34d6934047387908177795835b8a5acb41c2884aee1624b95d5ed4ae20e7aa96af3749d58985bf669f35cfe63008
-
SSDEEP
49152:SnAQqMSPbcBVQej/1INRx+TSqTdX1HkQo6SAARdhnvxJM0H95elMKsv:+DqPoBhz1aRxcSUDk36SAEdhvxWa9
Malware Config
Signatures
-
Wannacry
WannaCry is a ransomware cryptoworm.
-
Contacts a large (3311) amount of remote hosts 1 TTPs
This may indicate a network scan to discover remotely running services.
-
Executes dropped EXE 3 IoCs
Processes:
mssecsvc.exemssecsvc.exetasksche.exepid process 2464 mssecsvc.exe 2860 mssecsvc.exe 2764 tasksche.exe -
Creates a large amount of network flows 1 TTPs
This may indicate a network scan to discover remotely running services.
-
Drops file in System32 directory 1 IoCs
Processes:
mssecsvc.exedescription ioc process File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\Temporary Internet Files\counters.dat mssecsvc.exe -
Drops file in Windows directory 2 IoCs
Processes:
rundll32.exemssecsvc.exedescription ioc process File created C:\WINDOWS\mssecsvc.exe rundll32.exe File created C:\WINDOWS\tasksche.exe mssecsvc.exe -
Modifies data under HKEY_USERS 24 IoCs
Processes:
mssecsvc.exedescription ioc process Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{37BAAEC5-C191-4C28-BB0F-E325833E4815}\WpadDecisionReason = "1" mssecsvc.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{37BAAEC5-C191-4C28-BB0F-E325833E4815}\WpadDecision = "0" mssecsvc.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections mssecsvc.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings mssecsvc.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\UNCAsIntranet = "0" mssecsvc.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Cookies\CachePrefix = "Cookie:" mssecsvc.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\DefaultConnectionSettings = 4600000003000000090000000000000000000000000000000400000000000000000000000000000000000000000000000000000001000000020000000a7f00c9000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 mssecsvc.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{37BAAEC5-C191-4C28-BB0F-E325833E4815} mssecsvc.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\46-47-65-7c-a1-d4\WpadDecisionTime = 50ca02b8bcafda01 mssecsvc.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ mssecsvc.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Content\CachePrefix mssecsvc.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{37BAAEC5-C191-4C28-BB0F-E325833E4815}\WpadDecisionTime = 50ca02b8bcafda01 mssecsvc.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{37BAAEC5-C191-4C28-BB0F-E325833E4815}\WpadNetworkName = "Network 3" mssecsvc.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\46-47-65-7c-a1-d4\WpadDecision = "0" mssecsvc.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\DefaultConnectionSettings = 4600000002000000090000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 mssecsvc.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ProxyEnable = "0" mssecsvc.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\SavedLegacySettings = 4600000002000000090000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 mssecsvc.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\46-47-65-7c-a1-d4 mssecsvc.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings mssecsvc.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\AutoDetect = "1" mssecsvc.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\History\CachePrefix = "Visited:" mssecsvc.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad mssecsvc.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{37BAAEC5-C191-4C28-BB0F-E325833E4815}\46-47-65-7c-a1-d4 mssecsvc.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\46-47-65-7c-a1-d4\WpadDecisionReason = "1" mssecsvc.exe -
Suspicious use of WriteProcessMemory 11 IoCs
Processes:
rundll32.exerundll32.exedescription pid process target process PID 2028 wrote to memory of 2316 2028 rundll32.exe rundll32.exe PID 2028 wrote to memory of 2316 2028 rundll32.exe rundll32.exe PID 2028 wrote to memory of 2316 2028 rundll32.exe rundll32.exe PID 2028 wrote to memory of 2316 2028 rundll32.exe rundll32.exe PID 2028 wrote to memory of 2316 2028 rundll32.exe rundll32.exe PID 2028 wrote to memory of 2316 2028 rundll32.exe rundll32.exe PID 2028 wrote to memory of 2316 2028 rundll32.exe rundll32.exe PID 2316 wrote to memory of 2464 2316 rundll32.exe mssecsvc.exe PID 2316 wrote to memory of 2464 2316 rundll32.exe mssecsvc.exe PID 2316 wrote to memory of 2464 2316 rundll32.exe mssecsvc.exe PID 2316 wrote to memory of 2464 2316 rundll32.exe mssecsvc.exe
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\77035824023eb4fc733ec1ef27a7a669_JaffaCakes118.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:2028 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\77035824023eb4fc733ec1ef27a7a669_JaffaCakes118.dll,#12⤵
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:2316 -
C:\WINDOWS\mssecsvc.exeC:\WINDOWS\mssecsvc.exe3⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:2464 -
C:\WINDOWS\tasksche.exeC:\WINDOWS\tasksche.exe /i4⤵
- Executes dropped EXE
PID:2764
-
-
-
-
C:\WINDOWS\mssecsvc.exeC:\WINDOWS\mssecsvc.exe -m security1⤵
- Executes dropped EXE
- Drops file in System32 directory
- Modifies data under HKEY_USERS
PID:2860
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3.6MB
MD56d8ac76fe9d7f6d788d76b869affd933
SHA1da5294f4a79d8f9af29fd15709061ef6843ee940
SHA256beed9c3272e744daf676c3c3a478d9e39b6e6629260549670ea5e7d09bd704ba
SHA51201be687f7de964428e46a185f3381fd735824a6d2249a83d48ad005c3d402098e5e0718ae9110a44f4b2da72117196248ea12c6de38207684c191da934920f5b
-
Filesize
3.4MB
MD552231d8f6092ff9adb61e055607aaf44
SHA19d1d6e24a55a6ee4f26d28bbb7c1549d1b5b358b
SHA2561092297edb12d3025f36bf2c8b23335cc77b963d0984632c86a61854021f3bfb
SHA5123c4fa52df40324e7a9dce764135c30118bace5ed0d3ccb417073e6ba0595120d35eb0e43b5a3b75a1365d6064032d5c901846fbd6c4b0803b8f7fdab1721f062