Analysis
-
max time kernel
150s -
max time network
151s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
26-05-2024 06:37
Static task
static1
Behavioral task
behavioral1
Sample
749de420abee04a2beea5e16348c45ed_JaffaCakes118.dll
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
749de420abee04a2beea5e16348c45ed_JaffaCakes118.dll
Resource
win10v2004-20240508-en
General
-
Target
749de420abee04a2beea5e16348c45ed_JaffaCakes118.dll
-
Size
5.0MB
-
MD5
749de420abee04a2beea5e16348c45ed
-
SHA1
1fe91061b416f53ff6797b469dcf2c52a2ad7a90
-
SHA256
e41b2df5bd99af25544a405025d35e2debebfef8e0d51665d442a05b741f30fe
-
SHA512
3a5b8b426b0f5c54a1f1149c433287f5ab3b07159b2f3fcbbcf479d52e1045fea687bba64f06c69b638b3cd69006d9a96f4e0d8001a68385cc134bb50a8afb5f
-
SSDEEP
98304:TDqPoBhz1aRxcSUDk36SAEdhvxWa9P593R8yAVp2:TDqPe1Cxcxk3ZAEUadzR8yc4
Malware Config
Signatures
-
Wannacry
WannaCry is a ransomware cryptoworm.
-
Contacts a large (3275) amount of remote hosts 1 TTPs
This may indicate a network scan to discover remotely running services.
-
Executes dropped EXE 3 IoCs
Processes:
mssecsvc.exemssecsvc.exetasksche.exepid process 2708 mssecsvc.exe 2592 mssecsvc.exe 2692 tasksche.exe -
Creates a large amount of network flows 1 TTPs
This may indicate a network scan to discover remotely running services.
-
Drops file in System32 directory 1 IoCs
Processes:
mssecsvc.exedescription ioc process File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\Temporary Internet Files\counters.dat mssecsvc.exe -
Drops file in Windows directory 2 IoCs
Processes:
rundll32.exemssecsvc.exedescription ioc process File created C:\WINDOWS\mssecsvc.exe rundll32.exe File created C:\WINDOWS\tasksche.exe mssecsvc.exe -
Modifies data under HKEY_USERS 24 IoCs
Processes:
mssecsvc.exedescription ioc process Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings mssecsvc.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ProxyEnable = "0" mssecsvc.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\History\CachePrefix = "Visited:" mssecsvc.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{18EF7846-4696-419F-A2FA-D996D7DAE5D2} mssecsvc.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{18EF7846-4696-419F-A2FA-D996D7DAE5D2}\WpadDecisionReason = "1" mssecsvc.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\DefaultConnectionSettings = 4600000003000000090000000000000000000000000000000400000000000000000000000000000000000000000000000000000001000000020000000a7f00fd000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 mssecsvc.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{18EF7846-4696-419F-A2FA-D996D7DAE5D2}\WpadDecision = "0" mssecsvc.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{18EF7846-4696-419F-A2FA-D996D7DAE5D2}\WpadNetworkName = "Network 3" mssecsvc.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{18EF7846-4696-419F-A2FA-D996D7DAE5D2}\e6-fb-04-fa-e0-00 mssecsvc.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\DefaultConnectionSettings = 4600000002000000090000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 mssecsvc.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings mssecsvc.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\SavedLegacySettings = 4600000002000000090000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 mssecsvc.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ mssecsvc.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\UNCAsIntranet = "0" mssecsvc.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{18EF7846-4696-419F-A2FA-D996D7DAE5D2}\WpadDecisionTime = 10e53d2837afda01 mssecsvc.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\e6-fb-04-fa-e0-00\WpadDecisionReason = "1" mssecsvc.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\e6-fb-04-fa-e0-00\WpadDecisionTime = 10e53d2837afda01 mssecsvc.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections mssecsvc.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\AutoDetect = "1" mssecsvc.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Content\CachePrefix mssecsvc.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Cookies\CachePrefix = "Cookie:" mssecsvc.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad mssecsvc.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\e6-fb-04-fa-e0-00 mssecsvc.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\e6-fb-04-fa-e0-00\WpadDecision = "0" mssecsvc.exe -
Suspicious use of WriteProcessMemory 11 IoCs
Processes:
rundll32.exerundll32.exedescription pid process target process PID 2476 wrote to memory of 1952 2476 rundll32.exe rundll32.exe PID 2476 wrote to memory of 1952 2476 rundll32.exe rundll32.exe PID 2476 wrote to memory of 1952 2476 rundll32.exe rundll32.exe PID 2476 wrote to memory of 1952 2476 rundll32.exe rundll32.exe PID 2476 wrote to memory of 1952 2476 rundll32.exe rundll32.exe PID 2476 wrote to memory of 1952 2476 rundll32.exe rundll32.exe PID 2476 wrote to memory of 1952 2476 rundll32.exe rundll32.exe PID 1952 wrote to memory of 2708 1952 rundll32.exe mssecsvc.exe PID 1952 wrote to memory of 2708 1952 rundll32.exe mssecsvc.exe PID 1952 wrote to memory of 2708 1952 rundll32.exe mssecsvc.exe PID 1952 wrote to memory of 2708 1952 rundll32.exe mssecsvc.exe
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\749de420abee04a2beea5e16348c45ed_JaffaCakes118.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:2476 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\749de420abee04a2beea5e16348c45ed_JaffaCakes118.dll,#12⤵
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:1952 -
C:\WINDOWS\mssecsvc.exeC:\WINDOWS\mssecsvc.exe3⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:2708 -
C:\WINDOWS\tasksche.exeC:\WINDOWS\tasksche.exe /i4⤵
- Executes dropped EXE
PID:2692
-
C:\WINDOWS\mssecsvc.exeC:\WINDOWS\mssecsvc.exe -m security1⤵
- Executes dropped EXE
- Drops file in System32 directory
- Modifies data under HKEY_USERS
PID:2592
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3.6MB
MD500c604f818ab5b6ac2c1034cf2678f05
SHA1f4b5e3d3663ed310556efd670e3efa976df1ae58
SHA25603af1f85d5bb0680a882380ed23e52b4e1969e7e8004b58bfaacb7ec2abf3f1c
SHA512c5309777db12391275257785ab043d740ad39f38bc9c203a50fa8ffe2f22a4619a0dcd5b15dc464ae0ff0f84140c692b3b02d5484d8f71a519a50703e825f1e1
-
Filesize
3.4MB
MD5459db8c10b02382e4aed54c572d257e9
SHA17829b494cbb1669b81b220bde4207d92b70786ee
SHA256a2d25b3af03d62d7f4cd85a601cfc2d6c2490aa32f8367fa3d2fe55a6670589e
SHA512ca14469520ace51f092d894fb1cb88c5a93787741e9cddb6821e80d75d454ab213e126eabebe3769e4f80d9d3d9f87d1961a3a4ea50f9ca8f028a0b28c19072a