Analysis
-
max time kernel
150s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
05-06-2024 00:38
Static task
static1
Behavioral task
behavioral1
Sample
96c927e42636d10e5a2ee217e833bb19_JaffaCakes118.dll
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
96c927e42636d10e5a2ee217e833bb19_JaffaCakes118.dll
Resource
win10v2004-20240426-en
General
-
Target
96c927e42636d10e5a2ee217e833bb19_JaffaCakes118.dll
-
Size
5.0MB
-
MD5
96c927e42636d10e5a2ee217e833bb19
-
SHA1
db390da6e675e11aa995fa87112d61239a80ca8a
-
SHA256
0ff6948dd36eb324ccc264f122d728f92814dccfb734b555cde28f9a63217c11
-
SHA512
813d5e9df5e6d9ca24ac422a587e0ba751da4d3ef238fc22fe628927be5df972d518f7ab0429681aab644a1100fc252b34df23014d6697125e40d4de01dd3f23
-
SSDEEP
98304:+DqPoBhz1aRxcSUDk36SAEdhvxWa9P5N3R8yAVp2H:+DqPe1Cxcxk3ZAEUadrR8yc4H
Malware Config
Signatures
-
Wannacry
WannaCry is a ransomware cryptoworm.
-
Contacts a large (3167) amount of remote hosts 1 TTPs
This may indicate a network scan to discover remotely running services.
-
Executes dropped EXE 3 IoCs
pid Process 2660 mssecsvc.exe 348 mssecsvc.exe 5112 tasksche.exe -
Creates a large amount of network flows 1 TTPs
This may indicate a network scan to discover remotely running services.
-
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\WINDOWS\mssecsvc.exe rundll32.exe File created C:\WINDOWS\tasksche.exe mssecsvc.exe -
Modifies data under HKEY_USERS 5 IoCs
description ioc Process Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ProxyBypass = "1" mssecsvc.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\IntranetName = "1" mssecsvc.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\UNCAsIntranet = "1" mssecsvc.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\AutoDetect = "0" mssecsvc.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ mssecsvc.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 3892 wrote to memory of 3216 3892 rundll32.exe 82 PID 3892 wrote to memory of 3216 3892 rundll32.exe 82 PID 3892 wrote to memory of 3216 3892 rundll32.exe 82 PID 3216 wrote to memory of 2660 3216 rundll32.exe 83 PID 3216 wrote to memory of 2660 3216 rundll32.exe 83 PID 3216 wrote to memory of 2660 3216 rundll32.exe 83
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\96c927e42636d10e5a2ee217e833bb19_JaffaCakes118.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:3892 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\96c927e42636d10e5a2ee217e833bb19_JaffaCakes118.dll,#12⤵
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:3216 -
C:\WINDOWS\mssecsvc.exeC:\WINDOWS\mssecsvc.exe3⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:2660 -
C:\WINDOWS\tasksche.exeC:\WINDOWS\tasksche.exe /i4⤵
- Executes dropped EXE
PID:5112
-
-
-
-
C:\WINDOWS\mssecsvc.exeC:\WINDOWS\mssecsvc.exe -m security1⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
PID:348
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3.6MB
MD5f45ea5d81267a5ffe25e128d0ade57c9
SHA182046dec901ab7cf8442797384e2c1808050d0f4
SHA256ad222892c719fcdddc7ad0b3178305b084ad52737a4496baebc7d92d2df6e6e3
SHA512b2cc7fca36b76e19481bbf0b6777598d1c9d34ebdc2090a011ce30353299d2f98b15428cffd7d3bd6d44cba79fb8fa30e4f65114507f49d338ed9f6c5f036bca
-
Filesize
3.4MB
MD59e8d5f659c435f7a525008d1b5b133f0
SHA102380c2c5f1342e0c183960513801f3d4acd2d75
SHA256b4324573ee7af3df8b20fb287839e785353fbc1ed7368dd6e38cb9e35e2fc052
SHA512b4f78e8a208da8f0cffeaae4d6008dd6fad32acce866e0d27de7a0a18a2b60f2dc725b88f376cc8835ae9453d11927340b9a9d99f58a70cde6dbb133a8190829