Analysis
-
max time kernel
150s -
max time network
150s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
28-05-2024 04:59
Static task
static1
Behavioral task
behavioral1
Sample
7bc7e2443d94d8eb1c3a48d66a78df88_JaffaCakes118.dll
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
7bc7e2443d94d8eb1c3a48d66a78df88_JaffaCakes118.dll
Resource
win10v2004-20240226-en
General
-
Target
7bc7e2443d94d8eb1c3a48d66a78df88_JaffaCakes118.dll
-
Size
5.0MB
-
MD5
7bc7e2443d94d8eb1c3a48d66a78df88
-
SHA1
da9a737463498dda2d012c58aabea475b511dfcf
-
SHA256
6fcbdf245cb0454ca3b5c73a8e95b05243943cc41dd953c8b58a4a10fb5927bf
-
SHA512
ea3ae834e1e0a3564f620c82243f063545e4147830d1242c0ef945c1b962494ebac8050c58400fef55f7011366f7c3eceaa51e773cde8a207e524d9629894c0c
-
SSDEEP
49152:SnAQqMSPbcBVQej/1INRx+TSqTdX1HkQo6SAAsAMEcaEaue:+DqPoBhz1aRxcSUDk36SAn59
Malware Config
Signatures
-
Wannacry
WannaCry is a ransomware cryptoworm.
-
Contacts a large (3328) amount of remote hosts 1 TTPs
This may indicate a network scan to discover remotely running services.
-
Executes dropped EXE 3 IoCs
Processes:
mssecsvc.exemssecsvc.exetasksche.exepid process 2956 mssecsvc.exe 2076 mssecsvc.exe 2644 tasksche.exe -
Creates a large amount of network flows 1 TTPs
This may indicate a network scan to discover remotely running services.
-
Drops file in System32 directory 1 IoCs
Processes:
mssecsvc.exedescription ioc process File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\Temporary Internet Files\counters.dat mssecsvc.exe -
Drops file in Windows directory 2 IoCs
Processes:
rundll32.exemssecsvc.exedescription ioc process File created C:\WINDOWS\mssecsvc.exe rundll32.exe File created C:\WINDOWS\tasksche.exe mssecsvc.exe -
Modifies data under HKEY_USERS 24 IoCs
Processes:
mssecsvc.exedescription ioc process Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings mssecsvc.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ mssecsvc.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\DefaultConnectionSettings = 4600000003000000090000000000000000000000000000000400000000000000000000000000000000000000000000000000000001000000020000000a7f00aa000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 mssecsvc.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{285CEA55-DED8-4E9A-915A-2BD2A0D69538}\WpadNetworkName = "Network 3" mssecsvc.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{285CEA55-DED8-4E9A-915A-2BD2A0D69538}\96-32-83-09-e1-3f mssecsvc.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections mssecsvc.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Content\CachePrefix mssecsvc.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Cookies\CachePrefix = "Cookie:" mssecsvc.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad mssecsvc.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{285CEA55-DED8-4E9A-915A-2BD2A0D69538} mssecsvc.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\96-32-83-09-e1-3f mssecsvc.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\96-32-83-09-e1-3f\WpadDecisionReason = "1" mssecsvc.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\SavedLegacySettings = 4600000002000000090000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 mssecsvc.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\AutoDetect = "1" mssecsvc.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{285CEA55-DED8-4E9A-915A-2BD2A0D69538}\WpadDecisionReason = "1" mssecsvc.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{285CEA55-DED8-4E9A-915A-2BD2A0D69538}\WpadDecision = "0" mssecsvc.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings mssecsvc.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ProxyEnable = "0" mssecsvc.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\UNCAsIntranet = "0" mssecsvc.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\History\CachePrefix = "Visited:" mssecsvc.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{285CEA55-DED8-4E9A-915A-2BD2A0D69538}\WpadDecisionTime = a03bf6d5bbb0da01 mssecsvc.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\96-32-83-09-e1-3f\WpadDecisionTime = a03bf6d5bbb0da01 mssecsvc.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\96-32-83-09-e1-3f\WpadDecision = "0" mssecsvc.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\DefaultConnectionSettings = 4600000002000000090000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 mssecsvc.exe -
Suspicious use of WriteProcessMemory 11 IoCs
Processes:
rundll32.exerundll32.exedescription pid process target process PID 2180 wrote to memory of 848 2180 rundll32.exe rundll32.exe PID 2180 wrote to memory of 848 2180 rundll32.exe rundll32.exe PID 2180 wrote to memory of 848 2180 rundll32.exe rundll32.exe PID 2180 wrote to memory of 848 2180 rundll32.exe rundll32.exe PID 2180 wrote to memory of 848 2180 rundll32.exe rundll32.exe PID 2180 wrote to memory of 848 2180 rundll32.exe rundll32.exe PID 2180 wrote to memory of 848 2180 rundll32.exe rundll32.exe PID 848 wrote to memory of 2956 848 rundll32.exe mssecsvc.exe PID 848 wrote to memory of 2956 848 rundll32.exe mssecsvc.exe PID 848 wrote to memory of 2956 848 rundll32.exe mssecsvc.exe PID 848 wrote to memory of 2956 848 rundll32.exe mssecsvc.exe
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\7bc7e2443d94d8eb1c3a48d66a78df88_JaffaCakes118.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:2180 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\7bc7e2443d94d8eb1c3a48d66a78df88_JaffaCakes118.dll,#12⤵
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:848 -
C:\WINDOWS\mssecsvc.exeC:\WINDOWS\mssecsvc.exe3⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:2956 -
C:\WINDOWS\tasksche.exeC:\WINDOWS\tasksche.exe /i4⤵
- Executes dropped EXE
PID:2644
-
C:\WINDOWS\mssecsvc.exeC:\WINDOWS\mssecsvc.exe -m security1⤵
- Executes dropped EXE
- Drops file in System32 directory
- Modifies data under HKEY_USERS
PID:2076
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3.6MB
MD5dbc9f4c22769d7341b844c24f7fbcf16
SHA1fd371a370c13f104264368d9a53ab79fb089b01b
SHA2562306c803072b84cf34deae75fbd88fd5e3c3315c701820bd4b095c9c2387e447
SHA5126d1df9bed9ece167a421ba0d7a35064d689cd72c1555d1125feb328770f366d88ba0a5d5c97580a3e382c1ffcf64649f63826364125a7c363a346f6599039353
-
Filesize
3.4MB
MD5c9ba6f9bac3799b172c71a168f59bcf5
SHA1ecbbc0b1e5b6f2e009cc2cfee1f211bc51dfe59c
SHA2568ff5a3629982e23658f1ee8e5cc1ec06ee0eecd5d9f26c93d791477f5b177bbf
SHA512a2a8bf7d4adba348f68215ed2228f2cf9f60f5e5cb6f9bd836b2f37ebbbab16d4e1df4f6782b9eb2a4aa2194d594cafe5dbfeb1127b17f826887247efc0c58c3