Analysis
-
max time kernel
150s -
max time network
150s -
platform
windows7_x64 -
resource
win7-20240215-en -
resource tags
arch:x64arch:x86image:win7-20240215-enlocale:en-usos:windows7-x64system -
submitted
27-05-2024 02:54
Static task
static1
Behavioral task
behavioral1
Sample
77adef81b91f5f3a660e5e4ad78db29b_JaffaCakes118.dll
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
77adef81b91f5f3a660e5e4ad78db29b_JaffaCakes118.dll
Resource
win10v2004-20240426-en
General
-
Target
77adef81b91f5f3a660e5e4ad78db29b_JaffaCakes118.dll
-
Size
5.0MB
-
MD5
77adef81b91f5f3a660e5e4ad78db29b
-
SHA1
4cf6f088fa42c825193eab2987d6252ac9fd0e69
-
SHA256
f9c019ff5ea8cc534b8d9500e75bfd4e05f477222bbf2e7ece8b8ff24c4a4870
-
SHA512
d5d4a66ba8d2bbe3ae0d4297ebbf8d98ee89a12ce1082da964cbf36eced56ff269c5c2c832bac04ef645d39abee63f68289ed3f0ac534e2da8ea9e4820989d8c
-
SSDEEP
98304:+DqPoBhz1aRlSUDk36SAEdhvxWa9P593R8yAVp2H:+DqPe1Clxk3ZAEUadzR8yc4H
Malware Config
Signatures
-
Wannacry
WannaCry is a ransomware cryptoworm.
-
Contacts a large (3231) amount of remote hosts 1 TTPs
This may indicate a network scan to discover remotely running services.
-
Executes dropped EXE 3 IoCs
pid Process 2180 mssecsvc.exe 2084 mssecsvc.exe 2624 tasksche.exe -
Creates a large amount of network flows 1 TTPs
This may indicate a network scan to discover remotely running services.
-
Drops file in System32 directory 1 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\Temporary Internet Files\counters.dat mssecsvc.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\WINDOWS\mssecsvc.exe rundll32.exe File created C:\WINDOWS\tasksche.exe mssecsvc.exe -
Modifies data under HKEY_USERS 24 IoCs
description ioc Process Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\8a-e7-e3-5d-d5-89 mssecsvc.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\8a-e7-e3-5d-d5-89\WpadDecisionReason = "1" mssecsvc.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ mssecsvc.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\History\CachePrefix = "Visited:" mssecsvc.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad mssecsvc.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{9FD5F9A1-91A5-4761-A78E-BBE4EDF95930}\WpadNetworkName = "Network 3" mssecsvc.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{9FD5F9A1-91A5-4761-A78E-BBE4EDF95930} mssecsvc.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{9FD5F9A1-91A5-4761-A78E-BBE4EDF95930}\WpadDecision = "0" mssecsvc.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings mssecsvc.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\DefaultConnectionSettings = 4600000002000000090000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 mssecsvc.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\SavedLegacySettings = 4600000002000000090000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 mssecsvc.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\AutoDetect = "1" mssecsvc.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{9FD5F9A1-91A5-4761-A78E-BBE4EDF95930}\WpadDecisionTime = b0e1d129e1afda01 mssecsvc.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\8a-e7-e3-5d-d5-89\WpadDecisionTime = b0e1d129e1afda01 mssecsvc.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings mssecsvc.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Content\CachePrefix mssecsvc.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Cookies\CachePrefix = "Cookie:" mssecsvc.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\DefaultConnectionSettings = 4600000003000000090000000000000000000000000000000400000000000000000000000000000000000000000000000000000001000000020000000a7f006b000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 mssecsvc.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{9FD5F9A1-91A5-4761-A78E-BBE4EDF95930}\8a-e7-e3-5d-d5-89 mssecsvc.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\8a-e7-e3-5d-d5-89\WpadDecision = "0" mssecsvc.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections mssecsvc.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ProxyEnable = "0" mssecsvc.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\UNCAsIntranet = "0" mssecsvc.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{9FD5F9A1-91A5-4761-A78E-BBE4EDF95930}\WpadDecisionReason = "1" mssecsvc.exe -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 2232 wrote to memory of 2040 2232 rundll32.exe 28 PID 2232 wrote to memory of 2040 2232 rundll32.exe 28 PID 2232 wrote to memory of 2040 2232 rundll32.exe 28 PID 2232 wrote to memory of 2040 2232 rundll32.exe 28 PID 2232 wrote to memory of 2040 2232 rundll32.exe 28 PID 2232 wrote to memory of 2040 2232 rundll32.exe 28 PID 2232 wrote to memory of 2040 2232 rundll32.exe 28 PID 2040 wrote to memory of 2180 2040 rundll32.exe 29 PID 2040 wrote to memory of 2180 2040 rundll32.exe 29 PID 2040 wrote to memory of 2180 2040 rundll32.exe 29 PID 2040 wrote to memory of 2180 2040 rundll32.exe 29
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\77adef81b91f5f3a660e5e4ad78db29b_JaffaCakes118.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:2232 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\77adef81b91f5f3a660e5e4ad78db29b_JaffaCakes118.dll,#12⤵
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:2040 -
C:\WINDOWS\mssecsvc.exeC:\WINDOWS\mssecsvc.exe3⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:2180 -
C:\WINDOWS\tasksche.exeC:\WINDOWS\tasksche.exe /i4⤵
- Executes dropped EXE
PID:2624
-
-
-
-
C:\WINDOWS\mssecsvc.exeC:\WINDOWS\mssecsvc.exe -m security1⤵
- Executes dropped EXE
- Drops file in System32 directory
- Modifies data under HKEY_USERS
PID:2084
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3.6MB
MD5ffe4f9452ccc8a14ea59e67286d32e45
SHA13338ba18e939fcc070203d92587cd4712abac1b4
SHA25653757ebf3600724db8187cbb4ec0d1a92c03f95d774d1d3d0fb249fdae664034
SHA5126d4296c890dfce14b39a0e77252aa43bb3da5df04cf6771ca4f342a2ab018aa54c6843d5398b4403f74bd837ea26260ccccc85a813cf496c5b5ca45b106c9d14
-
Filesize
3.4MB
MD5e89700b6f79644dd0305ab5d062303e6
SHA1117e3dfc5cf32cde6259a80c020e221fa46d867c
SHA2567266f885014af6e279bf8c7f27896497e6e3ca8fcdd77e414ecf7b27b325ae04
SHA5125a2241ba77e4313e64cc76a2ff18e2e369748a659a5a5f0a50a3eb8b57b8cf892c859882622eec75e9a2aed0fcddc2b83656b126a300bdd9f7c0c96de2a3c784