Analysis
-
max time kernel
151s -
max time network
157s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
28-05-2024 02:27
Static task
static1
Behavioral task
behavioral1
Sample
7b60b6267c703ab645461102a9137529_JaffaCakes118.dll
Resource
win7-20240419-en
Behavioral task
behavioral2
Sample
7b60b6267c703ab645461102a9137529_JaffaCakes118.dll
Resource
win10v2004-20240226-en
General
-
Target
7b60b6267c703ab645461102a9137529_JaffaCakes118.dll
-
Size
5.0MB
-
MD5
7b60b6267c703ab645461102a9137529
-
SHA1
9476270dbd5204a5a9f77ec6bad96ecbfdc27c33
-
SHA256
e2f0cfcd8f18e7933fe13b0f70da0baed36bce3bdea742cd5bd37466459d5c62
-
SHA512
d9d9341640329445f727c51f294ebda7f53e206bd937f9b2b00155abb219e09668c44b5a3ec068e4ea55f8a26990d12e83f7159db9f215cbb2dc97da86b2ff30
-
SSDEEP
49152:SnAQqMSPbcBVQej/1INRx+TSqTdX1HkQo6SAARdh:+DqPoBhz1aRxcSUDk36SAEdh
Malware Config
Signatures
-
Wannacry
WannaCry is a ransomware cryptoworm.
-
Contacts a large (2960) amount of remote hosts 1 TTPs
This may indicate a network scan to discover remotely running services.
-
Executes dropped EXE 3 IoCs
Processes:
mssecsvc.exemssecsvc.exetasksche.exepid process 2376 mssecsvc.exe 2820 mssecsvc.exe 3664 tasksche.exe -
Creates a large amount of network flows 1 TTPs
This may indicate a network scan to discover remotely running services.
-
Drops file in Windows directory 2 IoCs
Processes:
rundll32.exemssecsvc.exedescription ioc process File created C:\WINDOWS\mssecsvc.exe rundll32.exe File created C:\WINDOWS\tasksche.exe mssecsvc.exe -
Modifies data under HKEY_USERS 5 IoCs
Processes:
mssecsvc.exedescription ioc process Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ mssecsvc.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ProxyBypass = "1" mssecsvc.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\IntranetName = "1" mssecsvc.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\UNCAsIntranet = "1" mssecsvc.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\AutoDetect = "0" mssecsvc.exe -
Suspicious use of WriteProcessMemory 6 IoCs
Processes:
rundll32.exerundll32.exedescription pid process target process PID 3420 wrote to memory of 1600 3420 rundll32.exe rundll32.exe PID 3420 wrote to memory of 1600 3420 rundll32.exe rundll32.exe PID 3420 wrote to memory of 1600 3420 rundll32.exe rundll32.exe PID 1600 wrote to memory of 2376 1600 rundll32.exe mssecsvc.exe PID 1600 wrote to memory of 2376 1600 rundll32.exe mssecsvc.exe PID 1600 wrote to memory of 2376 1600 rundll32.exe mssecsvc.exe
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\7b60b6267c703ab645461102a9137529_JaffaCakes118.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:3420 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\7b60b6267c703ab645461102a9137529_JaffaCakes118.dll,#12⤵
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:1600 -
C:\WINDOWS\mssecsvc.exeC:\WINDOWS\mssecsvc.exe3⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:2376 -
C:\WINDOWS\tasksche.exeC:\WINDOWS\tasksche.exe /i4⤵
- Executes dropped EXE
PID:3664
-
C:\WINDOWS\mssecsvc.exeC:\WINDOWS\mssecsvc.exe -m security1⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
PID:2820
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=1344 --field-trial-handle=2284,i,15722001240173834669,15048020084704567542,262144 --variations-seed-version /prefetch:81⤵PID:3404
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3.6MB
MD5c4e71f325e2af6a989f235cbc068504d
SHA17f22a06ef6ee9e21bf4733cfcce35363e9252e53
SHA25640d7c2942b40871980b1ecd33c0baf9952f674de62c209ee2f6def5a88e28a85
SHA5121c5d90f4f74c91af177b00d8a8d2735b047bef056e1eda78f878259ff0bbb8858c29fa8ff0cccf08675948d9a0fb5eba126cbaf6caf9db98fcfecd9fd7aecee1
-
Filesize
3.4MB
MD5244c98f45f700b449f5d3fcf02ee2368
SHA119b00bc6239aaad7b8f29821e943317a2d550889
SHA256ab08e2599f549a12341c1d7305528e37bb2a8800cb05c8df8d67c36de141e9de
SHA51243d385e81ff82a6a3cb633519dadc384bc4fccc5f03dd64d6d248053c1e950e9fd236c664b55202b07cb3b0a4399c2b5e01696e345e1ecdd851b10d250b99974