Analysis
-
max time kernel
150s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
30-05-2024 15:20
Static task
static1
Behavioral task
behavioral1
Sample
849fafc139d1c8b2c5a8e22f0cb05dc1_JaffaCakes118.dll
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
849fafc139d1c8b2c5a8e22f0cb05dc1_JaffaCakes118.dll
Resource
win10v2004-20240508-en
General
-
Target
849fafc139d1c8b2c5a8e22f0cb05dc1_JaffaCakes118.dll
-
Size
5.0MB
-
MD5
849fafc139d1c8b2c5a8e22f0cb05dc1
-
SHA1
edc4da225d1890f951da0e458909d62240591020
-
SHA256
0329156707492a0b250aeb47da6d3301b64ce5b9c3c4756db7c729715d8c2f87
-
SHA512
6e392a7b7d6ccd2a95159d3370eeaf0209c410644e220e8bc6907f6eeea55fb3204aa0a5515413c95f6d3f25aaa2f7a08be405dcab03db703cc91d6134c1c64c
-
SSDEEP
49152:SnAQqMSPbcBVQej/1INRx+TSqTdOxJM0H9PAMEcaEau3R:+DqPoBhz1aRxcSUwxWa9P593R
Malware Config
Signatures
-
Wannacry
WannaCry is a ransomware cryptoworm.
-
Contacts a large (3240) amount of remote hosts 1 TTPs
This may indicate a network scan to discover remotely running services.
-
Executes dropped EXE 3 IoCs
Processes:
mssecsvc.exemssecsvc.exetasksche.exepid process 2476 mssecsvc.exe 1984 mssecsvc.exe 640 tasksche.exe -
Creates a large amount of network flows 1 TTPs
This may indicate a network scan to discover remotely running services.
-
Drops file in Windows directory 2 IoCs
Processes:
rundll32.exemssecsvc.exedescription ioc process File created C:\WINDOWS\mssecsvc.exe rundll32.exe File created C:\WINDOWS\tasksche.exe mssecsvc.exe -
Modifies data under HKEY_USERS 5 IoCs
Processes:
mssecsvc.exedescription ioc process Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ProxyBypass = "1" mssecsvc.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\IntranetName = "1" mssecsvc.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\UNCAsIntranet = "1" mssecsvc.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\AutoDetect = "0" mssecsvc.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ mssecsvc.exe -
Suspicious use of WriteProcessMemory 6 IoCs
Processes:
rundll32.exerundll32.exedescription pid process target process PID 4520 wrote to memory of 3860 4520 rundll32.exe rundll32.exe PID 4520 wrote to memory of 3860 4520 rundll32.exe rundll32.exe PID 4520 wrote to memory of 3860 4520 rundll32.exe rundll32.exe PID 3860 wrote to memory of 2476 3860 rundll32.exe mssecsvc.exe PID 3860 wrote to memory of 2476 3860 rundll32.exe mssecsvc.exe PID 3860 wrote to memory of 2476 3860 rundll32.exe mssecsvc.exe
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\849fafc139d1c8b2c5a8e22f0cb05dc1_JaffaCakes118.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:4520 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\849fafc139d1c8b2c5a8e22f0cb05dc1_JaffaCakes118.dll,#12⤵
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:3860 -
C:\WINDOWS\mssecsvc.exeC:\WINDOWS\mssecsvc.exe3⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:2476 -
C:\WINDOWS\tasksche.exeC:\WINDOWS\tasksche.exe /i4⤵
- Executes dropped EXE
PID:640
-
C:\WINDOWS\mssecsvc.exeC:\WINDOWS\mssecsvc.exe -m security1⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
PID:1984
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Windows\mssecsvc.exeFilesize
3.6MB
MD5e0fd19ae1134a5e9e19d4607faec7b74
SHA1598f50737d562974697edf0001efeed15764ddc8
SHA256139d99e66250012da2e3f1a88919372f9bbe11a64a3c005142f1aaac24c458a4
SHA5122737660e30cc7f634d6f6ac5f162a830b7de3174c7f09e4d7d360040ca00776fce81bc72db878f110adc9e19f839c140f4807256972cd792aa500d0e62c152d7
-
C:\Windows\tasksche.exeFilesize
3.4MB
MD5131ca8785de9fb9b53b3a1670eda7f11
SHA14b3007510849ed6ec02187511dc9fef5d7b64a1b
SHA2569afb2653c3ec17136c26e894428c4cfe93af04241f28e49bb0029a0f3b2b4581
SHA51299bd525cb1779348099caa188af0082e349811f327c730a709af3ace740d3fb9fc23096e7d47351f69f6f761cd400a3e43a5bb0dbe175cd759c44849930e7766