Analysis
-
max time kernel
150s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
27-05-2024 02:54
Static task
static1
Behavioral task
behavioral1
Sample
77adef81b91f5f3a660e5e4ad78db29b_JaffaCakes118.dll
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
77adef81b91f5f3a660e5e4ad78db29b_JaffaCakes118.dll
Resource
win10v2004-20240426-en
General
-
Target
77adef81b91f5f3a660e5e4ad78db29b_JaffaCakes118.dll
-
Size
5.0MB
-
MD5
77adef81b91f5f3a660e5e4ad78db29b
-
SHA1
4cf6f088fa42c825193eab2987d6252ac9fd0e69
-
SHA256
f9c019ff5ea8cc534b8d9500e75bfd4e05f477222bbf2e7ece8b8ff24c4a4870
-
SHA512
d5d4a66ba8d2bbe3ae0d4297ebbf8d98ee89a12ce1082da964cbf36eced56ff269c5c2c832bac04ef645d39abee63f68289ed3f0ac534e2da8ea9e4820989d8c
-
SSDEEP
98304:+DqPoBhz1aRlSUDk36SAEdhvxWa9P593R8yAVp2H:+DqPe1Clxk3ZAEUadzR8yc4H
Malware Config
Signatures
-
Wannacry
WannaCry is a ransomware cryptoworm.
-
Contacts a large (3220) amount of remote hosts 1 TTPs
This may indicate a network scan to discover remotely running services.
-
Executes dropped EXE 3 IoCs
pid Process 4280 mssecsvc.exe 3532 mssecsvc.exe 2268 tasksche.exe -
Creates a large amount of network flows 1 TTPs
This may indicate a network scan to discover remotely running services.
-
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\WINDOWS\mssecsvc.exe rundll32.exe File created C:\WINDOWS\tasksche.exe mssecsvc.exe -
Modifies data under HKEY_USERS 5 IoCs
description ioc Process Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\IntranetName = "1" mssecsvc.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\UNCAsIntranet = "1" mssecsvc.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\AutoDetect = "0" mssecsvc.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ mssecsvc.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ProxyBypass = "1" mssecsvc.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 2176 wrote to memory of 3152 2176 rundll32.exe 84 PID 2176 wrote to memory of 3152 2176 rundll32.exe 84 PID 2176 wrote to memory of 3152 2176 rundll32.exe 84 PID 3152 wrote to memory of 4280 3152 rundll32.exe 85 PID 3152 wrote to memory of 4280 3152 rundll32.exe 85 PID 3152 wrote to memory of 4280 3152 rundll32.exe 85
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\77adef81b91f5f3a660e5e4ad78db29b_JaffaCakes118.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:2176 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\77adef81b91f5f3a660e5e4ad78db29b_JaffaCakes118.dll,#12⤵
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:3152 -
C:\WINDOWS\mssecsvc.exeC:\WINDOWS\mssecsvc.exe3⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:4280 -
C:\WINDOWS\tasksche.exeC:\WINDOWS\tasksche.exe /i4⤵
- Executes dropped EXE
PID:2268
-
-
-
-
C:\WINDOWS\mssecsvc.exeC:\WINDOWS\mssecsvc.exe -m security1⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
PID:3532
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3.6MB
MD5ffe4f9452ccc8a14ea59e67286d32e45
SHA13338ba18e939fcc070203d92587cd4712abac1b4
SHA25653757ebf3600724db8187cbb4ec0d1a92c03f95d774d1d3d0fb249fdae664034
SHA5126d4296c890dfce14b39a0e77252aa43bb3da5df04cf6771ca4f342a2ab018aa54c6843d5398b4403f74bd837ea26260ccccc85a813cf496c5b5ca45b106c9d14
-
Filesize
3.4MB
MD5e89700b6f79644dd0305ab5d062303e6
SHA1117e3dfc5cf32cde6259a80c020e221fa46d867c
SHA2567266f885014af6e279bf8c7f27896497e6e3ca8fcdd77e414ecf7b27b325ae04
SHA5125a2241ba77e4313e64cc76a2ff18e2e369748a659a5a5f0a50a3eb8b57b8cf892c859882622eec75e9a2aed0fcddc2b83656b126a300bdd9f7c0c96de2a3c784