Analysis
-
max time kernel
150s -
max time network
152s -
platform
windows7_x64 -
resource
win7-20240419-en -
resource tags
arch:x64arch:x86image:win7-20240419-enlocale:en-usos:windows7-x64system -
submitted
27-05-2024 17:50
Static task
static1
Behavioral task
behavioral1
Sample
79fae695ec420cb24556f8e48fce4f24_JaffaCakes118.dll
Resource
win7-20240419-en
Behavioral task
behavioral2
Sample
79fae695ec420cb24556f8e48fce4f24_JaffaCakes118.dll
Resource
win10v2004-20240226-en
General
-
Target
79fae695ec420cb24556f8e48fce4f24_JaffaCakes118.dll
-
Size
5.0MB
-
MD5
79fae695ec420cb24556f8e48fce4f24
-
SHA1
c6f5b0dd87dd36707e9af4fc199f220eddb32f78
-
SHA256
90cb629b6529ce276ad35a7cda1fe72de1cc13ae85606f67042d1c67a0277a29
-
SHA512
ce72e91036693b3d25a6e72161013a5af5b2eef7c43d71e842d382e7c2af5756116217bfed2cbd231a90463b82e501585711f4e6d5b94c578bdb5cb48fb51986
-
SSDEEP
12288:yvbLgPlu+QhMbaIMu7L5NVErCA4z2g6rTcbckPU82900Ve7zw+K+D:SbLgddQhfdmMSirYbcMNgef0
Malware Config
Signatures
-
Wannacry
WannaCry is a ransomware cryptoworm.
-
Contacts a large (3080) amount of remote hosts 1 TTPs
This may indicate a network scan to discover remotely running services.
-
Executes dropped EXE 3 IoCs
Processes:
mssecsvc.exemssecsvc.exetasksche.exepid process 2812 mssecsvc.exe 2368 mssecsvc.exe 2684 tasksche.exe -
Creates a large amount of network flows 1 TTPs
This may indicate a network scan to discover remotely running services.
-
Drops file in System32 directory 1 IoCs
Processes:
mssecsvc.exedescription ioc process File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\Temporary Internet Files\counters.dat mssecsvc.exe -
Drops file in Windows directory 2 IoCs
Processes:
rundll32.exemssecsvc.exedescription ioc process File created C:\WINDOWS\mssecsvc.exe rundll32.exe File created C:\WINDOWS\tasksche.exe mssecsvc.exe -
Modifies data under HKEY_USERS 24 IoCs
Processes:
mssecsvc.exedescription ioc process Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{9EB4FAD6-89F5-40FF-B803-F070AB8F50B4}\WpadNetworkName = "Network 3" mssecsvc.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\82-28-e3-aa-b2-56 mssecsvc.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections mssecsvc.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\SavedLegacySettings = 4600000002000000090000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 mssecsvc.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\AutoDetect = "1" mssecsvc.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\History\CachePrefix = "Visited:" mssecsvc.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\DefaultConnectionSettings = 4600000003000000090000000000000000000000000000000400000000000000000000000000000000000000000000000000000001000000020000000a7f00d5000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 mssecsvc.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{9EB4FAD6-89F5-40FF-B803-F070AB8F50B4} mssecsvc.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{9EB4FAD6-89F5-40FF-B803-F070AB8F50B4}\82-28-e3-aa-b2-56 mssecsvc.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\82-28-e3-aa-b2-56\WpadDecision = "0" mssecsvc.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings mssecsvc.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\DefaultConnectionSettings = 4600000002000000090000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 mssecsvc.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{9EB4FAD6-89F5-40FF-B803-F070AB8F50B4}\WpadDecision = "0" mssecsvc.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ProxyEnable = "0" mssecsvc.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ mssecsvc.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Content\CachePrefix mssecsvc.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\82-28-e3-aa-b2-56\WpadDecisionReason = "1" mssecsvc.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\82-28-e3-aa-b2-56\WpadDecisionTime = e017d6735eb0da01 mssecsvc.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings mssecsvc.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\UNCAsIntranet = "0" mssecsvc.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Cookies\CachePrefix = "Cookie:" mssecsvc.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad mssecsvc.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{9EB4FAD6-89F5-40FF-B803-F070AB8F50B4}\WpadDecisionReason = "1" mssecsvc.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{9EB4FAD6-89F5-40FF-B803-F070AB8F50B4}\WpadDecisionTime = e017d6735eb0da01 mssecsvc.exe -
Suspicious use of WriteProcessMemory 11 IoCs
Processes:
rundll32.exerundll32.exedescription pid process target process PID 2268 wrote to memory of 2156 2268 rundll32.exe rundll32.exe PID 2268 wrote to memory of 2156 2268 rundll32.exe rundll32.exe PID 2268 wrote to memory of 2156 2268 rundll32.exe rundll32.exe PID 2268 wrote to memory of 2156 2268 rundll32.exe rundll32.exe PID 2268 wrote to memory of 2156 2268 rundll32.exe rundll32.exe PID 2268 wrote to memory of 2156 2268 rundll32.exe rundll32.exe PID 2268 wrote to memory of 2156 2268 rundll32.exe rundll32.exe PID 2156 wrote to memory of 2812 2156 rundll32.exe mssecsvc.exe PID 2156 wrote to memory of 2812 2156 rundll32.exe mssecsvc.exe PID 2156 wrote to memory of 2812 2156 rundll32.exe mssecsvc.exe PID 2156 wrote to memory of 2812 2156 rundll32.exe mssecsvc.exe
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\79fae695ec420cb24556f8e48fce4f24_JaffaCakes118.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:2268 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\79fae695ec420cb24556f8e48fce4f24_JaffaCakes118.dll,#12⤵
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:2156 -
C:\WINDOWS\mssecsvc.exeC:\WINDOWS\mssecsvc.exe3⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:2812 -
C:\WINDOWS\tasksche.exeC:\WINDOWS\tasksche.exe /i4⤵
- Executes dropped EXE
PID:2684
-
C:\WINDOWS\mssecsvc.exeC:\WINDOWS\mssecsvc.exe -m security1⤵
- Executes dropped EXE
- Drops file in System32 directory
- Modifies data under HKEY_USERS
PID:2368
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3.6MB
MD5e1dec216bf5527b81ea3d269978bd6e1
SHA1a642f915ab2b3fed7d4ba2d365b8d52704f84a33
SHA256dca6f0ad5f27fe3936069bda200792487ba7d8e3b0b861061faa650296561631
SHA512822034db0f008552361536ccfc1336f168b55be1a0d66125749a03c5af07823e2e28cbfa1e0dfa242ca4ffda6ccb73d7a3806cee59d93c043f06618deef285ba
-
Filesize
3.4MB
MD586ff63cbee71ac8c1524cab76dcc81c3
SHA1b77986e1474e41edde3cec849e6d8389f0b5ade5
SHA256e529858c4c3ade975badfadc5707ad8b77b9e363cb5daa73c0ba4d7244dcb7bb
SHA51258ec7df8d33152572a3106acfeebcb271f5d1493a01a196222552b2e557845282b7da688691360d60fc40994f651e6ef80e519b2f162d0f61a3dd49cba151f16