Analysis
-
max time kernel
150s -
max time network
156s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
28-05-2024 07:06
Static task
static1
Behavioral task
behavioral1
Sample
7c1d428d81c25f0d3b20b1fa594c93f7_JaffaCakes118.dll
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
7c1d428d81c25f0d3b20b1fa594c93f7_JaffaCakes118.dll
Resource
win10v2004-20240226-en
General
-
Target
7c1d428d81c25f0d3b20b1fa594c93f7_JaffaCakes118.dll
-
Size
5.0MB
-
MD5
7c1d428d81c25f0d3b20b1fa594c93f7
-
SHA1
9b94bfaca93b0def8b476dd2e71f3b5cb6712986
-
SHA256
6c3a04f3cd9ad73bd113b6436d10f0b8aae1ad9c4dfc1d432131c2295f1c74c4
-
SHA512
c74eb1e8b141a776ca1d921bf7e570d4f41e3d8b9f772f3787dd1097bdd743a98e048164f3b3cee1f56f2df5500fda63e7df9f6fe11065b4d5060da7b27ae340
-
SSDEEP
49152:SnAQqMSPbcBVQej/1INRx+TSqTdX1HkQo6SAARdhnv/ME:+DqPoBhz1aRxcSUDk36SAEdhvU
Malware Config
Signatures
-
Wannacry
WannaCry is a ransomware cryptoworm.
-
Contacts a large (2894) amount of remote hosts 1 TTPs
This may indicate a network scan to discover remotely running services.
-
Executes dropped EXE 3 IoCs
Processes:
mssecsvc.exemssecsvc.exetasksche.exepid process 3972 mssecsvc.exe 2496 mssecsvc.exe 3480 tasksche.exe -
Creates a large amount of network flows 1 TTPs
This may indicate a network scan to discover remotely running services.
-
Drops file in Windows directory 2 IoCs
Processes:
rundll32.exemssecsvc.exedescription ioc process File created C:\WINDOWS\mssecsvc.exe rundll32.exe File created C:\WINDOWS\tasksche.exe mssecsvc.exe -
Modifies data under HKEY_USERS 5 IoCs
Processes:
mssecsvc.exedescription ioc process Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ mssecsvc.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ProxyBypass = "1" mssecsvc.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\IntranetName = "1" mssecsvc.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\UNCAsIntranet = "1" mssecsvc.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\AutoDetect = "0" mssecsvc.exe -
Suspicious use of WriteProcessMemory 6 IoCs
Processes:
rundll32.exerundll32.exedescription pid process target process PID 4860 wrote to memory of 1384 4860 rundll32.exe rundll32.exe PID 4860 wrote to memory of 1384 4860 rundll32.exe rundll32.exe PID 4860 wrote to memory of 1384 4860 rundll32.exe rundll32.exe PID 1384 wrote to memory of 3972 1384 rundll32.exe mssecsvc.exe PID 1384 wrote to memory of 3972 1384 rundll32.exe mssecsvc.exe PID 1384 wrote to memory of 3972 1384 rundll32.exe mssecsvc.exe
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\7c1d428d81c25f0d3b20b1fa594c93f7_JaffaCakes118.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:4860 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\7c1d428d81c25f0d3b20b1fa594c93f7_JaffaCakes118.dll,#12⤵
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:1384 -
C:\WINDOWS\mssecsvc.exeC:\WINDOWS\mssecsvc.exe3⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:3972 -
C:\WINDOWS\tasksche.exeC:\WINDOWS\tasksche.exe /i4⤵
- Executes dropped EXE
PID:3480
-
C:\WINDOWS\mssecsvc.exeC:\WINDOWS\mssecsvc.exe -m security1⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
PID:2496
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=1028 --field-trial-handle=2280,i,716736634476467098,11449718822158202904,262144 --variations-seed-version /prefetch:81⤵PID:564
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3.6MB
MD5c450c928977812e6a52c2b50c215a3bd
SHA16995ed002e07926ddd92a25be37660a3f3021328
SHA256454e397eb8bd87e7d4d26827b56a9b96412c6008cc03b7821cf1150d91e6c3aa
SHA512a7171666547db8bd919e5a73a0edd0d02e8cc9ff3231fff987be89e30f254d9017ce75a21b7651731b1ddee060d21dc4361971ee18fca85d20e4d4353831ee48
-
Filesize
3.4MB
MD5a86262b4801f9ffba4a632f5c2c74629
SHA1e9329c38d9d5384e00c282ccb374814f92f849a3
SHA256d82a7e20a277a2efcf387a573b64074c442edf8d72b6f473821c0a0343402d6f
SHA5129edb51c8bca6dbeb8895414bff71687f371113833c3e9d9db2e9509561545a9fff85312a16ad4254ff9bbf7fd855b32f292fa368859121fb07a47a8de84041b5