Analysis
-
max time kernel
150s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
14-06-2024 06:30
Static task
static1
Behavioral task
behavioral1
Sample
a8560220ab72fd6b040ce0d2a0894acd_JaffaCakes118.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
a8560220ab72fd6b040ce0d2a0894acd_JaffaCakes118.exe
Resource
win10v2004-20240508-en
General
-
Target
a8560220ab72fd6b040ce0d2a0894acd_JaffaCakes118.exe
-
Size
3.6MB
-
MD5
a8560220ab72fd6b040ce0d2a0894acd
-
SHA1
42cf562a4a05d7f4f2dae6c567886c16f78452ac
-
SHA256
e6a139f3aadb8ca03bab8502a216489f6571b033a90cd975669fb58ed9b349e9
-
SHA512
2c20393d1f94cf404505db9e8ffd5ed36e4c1a8eb41a54adfbe2465f99f3dc62bdd99453a4477cf1db3a1ced555439ba3db335c2447741358726d1bc369df619
-
SSDEEP
49152:XnAQqMSPbcBVQej/1INRx+TSqTdX1HkQo6SAARdhnvxJM0H:XDqPoBhz1aRxcSUDk36SAEdhvxWa
Malware Config
Signatures
-
Wannacry
WannaCry is a ransomware cryptoworm.
-
Contacts a large (2700) amount of remote hosts 1 TTPs
This may indicate a network scan to discover remotely running services.
-
Executes dropped EXE 1 IoCs
Processes:
tasksche.exepid process 4384 tasksche.exe -
Creates a large amount of network flows 1 TTPs
This may indicate a network scan to discover remotely running services.
-
Drops file in Windows directory 1 IoCs
Processes:
a8560220ab72fd6b040ce0d2a0894acd_JaffaCakes118.exedescription ioc process File created C:\WINDOWS\tasksche.exe a8560220ab72fd6b040ce0d2a0894acd_JaffaCakes118.exe -
Modifies data under HKEY_USERS 5 IoCs
Processes:
a8560220ab72fd6b040ce0d2a0894acd_JaffaCakes118.exedescription ioc process Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ a8560220ab72fd6b040ce0d2a0894acd_JaffaCakes118.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ProxyBypass = "1" a8560220ab72fd6b040ce0d2a0894acd_JaffaCakes118.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\IntranetName = "1" a8560220ab72fd6b040ce0d2a0894acd_JaffaCakes118.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\UNCAsIntranet = "1" a8560220ab72fd6b040ce0d2a0894acd_JaffaCakes118.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\AutoDetect = "0" a8560220ab72fd6b040ce0d2a0894acd_JaffaCakes118.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\a8560220ab72fd6b040ce0d2a0894acd_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\a8560220ab72fd6b040ce0d2a0894acd_JaffaCakes118.exe"1⤵
- Drops file in Windows directory
PID:1892 -
C:\WINDOWS\tasksche.exeC:\WINDOWS\tasksche.exe /i2⤵
- Executes dropped EXE
PID:4384
-
C:\Users\Admin\AppData\Local\Temp\a8560220ab72fd6b040ce0d2a0894acd_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\a8560220ab72fd6b040ce0d2a0894acd_JaffaCakes118.exe -m security1⤵
- Modifies data under HKEY_USERS
PID:4764
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3.4MB
MD5ede7c366d27a8e4849d67313dffae521
SHA12940d5f6fb3275d947acf6c63674ec60f75ad3a0
SHA25628fdcfb1e0408c112e1cce460cb1d8816184574e3e0df0d8ac35cb8f9420a13c
SHA5123e9a2e060134fb9f71dc8b843bbee64c770f5cbe358bffab3e1c76dc68902048c46e3553f9de031746d68c92c5c854470c6b833e124eca45b31dd11f7b0776ef