Analysis
-
max time kernel
150s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20240611-en -
resource tags
arch:x64arch:x86image:win10v2004-20240611-enlocale:en-usos:windows10-2004-x64system -
submitted
12-06-2024 13:53
Static task
static1
Behavioral task
behavioral1
Sample
a0e5f06a2bf894bd733b81249f53e504_JaffaCakes118.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
a0e5f06a2bf894bd733b81249f53e504_JaffaCakes118.exe
Resource
win10v2004-20240611-en
General
-
Target
a0e5f06a2bf894bd733b81249f53e504_JaffaCakes118.exe
-
Size
3.6MB
-
MD5
a0e5f06a2bf894bd733b81249f53e504
-
SHA1
06f397e6e1340323dd82763dc2906eb6230b183e
-
SHA256
2c59fb1f223f5d05460ee74e62fe66e4a13f9e0a6fb45b3da1b6448804e9db44
-
SHA512
06fb339117c80a66a26d65b33618cd7d04c971e62d5cc2dc69f5993978c778174625a6be45e0c175d5c08cb29cd8512c258f1722c68691b3f5b62b7aecd7a910
-
SSDEEP
49152:2nAQqMSPbcBVQej/1cOQ77JU+3qxAMEcaEau3R8yAH1plAHI:yDqPoBhz1GU+3+593R8yAVp2HI
Malware Config
Signatures
-
Wannacry
WannaCry is a ransomware cryptoworm.
-
Contacts a large (3312) amount of remote hosts 1 TTPs
This may indicate a network scan to discover remotely running services.
-
Executes dropped EXE 1 IoCs
Processes:
tasksche.exepid process 4520 tasksche.exe -
Creates a large amount of network flows 1 TTPs
This may indicate a network scan to discover remotely running services.
-
Drops file in Windows directory 1 IoCs
Processes:
a0e5f06a2bf894bd733b81249f53e504_JaffaCakes118.exedescription ioc process File created C:\WINDOWS\tasksche.exe a0e5f06a2bf894bd733b81249f53e504_JaffaCakes118.exe -
Modifies data under HKEY_USERS 5 IoCs
Processes:
a0e5f06a2bf894bd733b81249f53e504_JaffaCakes118.exedescription ioc process Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ a0e5f06a2bf894bd733b81249f53e504_JaffaCakes118.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ProxyBypass = "1" a0e5f06a2bf894bd733b81249f53e504_JaffaCakes118.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\IntranetName = "1" a0e5f06a2bf894bd733b81249f53e504_JaffaCakes118.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\UNCAsIntranet = "1" a0e5f06a2bf894bd733b81249f53e504_JaffaCakes118.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\AutoDetect = "0" a0e5f06a2bf894bd733b81249f53e504_JaffaCakes118.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\a0e5f06a2bf894bd733b81249f53e504_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\a0e5f06a2bf894bd733b81249f53e504_JaffaCakes118.exe"1⤵
- Drops file in Windows directory
PID:2832 -
C:\WINDOWS\tasksche.exeC:\WINDOWS\tasksche.exe /i2⤵
- Executes dropped EXE
PID:4520
-
C:\Users\Admin\AppData\Local\Temp\a0e5f06a2bf894bd733b81249f53e504_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\a0e5f06a2bf894bd733b81249f53e504_JaffaCakes118.exe -m security1⤵
- Modifies data under HKEY_USERS
PID:2616
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3.4MB
MD5dace64b71570c57b04092d5be360ac92
SHA1ce035eab6998a07edaafbf2b7655c629d6918ed6
SHA2566041931b806727d60c6eb0ac7adfdadc6aa9432bb8e5baf0573f07b054ecf199
SHA512f26ce7be1a4e4b4a025f10e4fb12a745c7878a7cc4c068d4528ca41aa1ddb55c7929e224e14d83176a7700a8629e118dffbfc4a05f21680803d56cbadbc997ee