Analysis
-
max time kernel
150s -
max time network
150s -
platform
windows7_x64 -
resource
win7-20240220-en -
resource tags
arch:x64arch:x86image:win7-20240220-enlocale:en-usos:windows7-x64system -
submitted
14-06-2024 17:52
Static task
static1
Behavioral task
behavioral1
Sample
ab0048b9856d6fb658eb8e042be8c4bd_JaffaCakes118.dll
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
ab0048b9856d6fb658eb8e042be8c4bd_JaffaCakes118.dll
Resource
win10v2004-20240226-en
General
-
Target
ab0048b9856d6fb658eb8e042be8c4bd_JaffaCakes118.dll
-
Size
5.0MB
-
MD5
ab0048b9856d6fb658eb8e042be8c4bd
-
SHA1
99d0077d459fd6760aa5e531ec4978c79260ff1e
-
SHA256
6b215ba58f2847b525c44f3302ad51177512fcdfc2af82d5d2d64bf447d86edc
-
SHA512
f8262a984d58b07d8802abaa59bfe2fe25edc42ea2f7655da0cee30beb43528bdc590a88f95f31f1a71818721b174f2d7a0ce5137f06c6a15df6b69bbe319abd
-
SSDEEP
12288:yvbLgPlu+QhMbaIMu7L5NVErCA4z2g6rTcbckPU82900:SbLgddQhfdmMSirYbcMN
Malware Config
Signatures
-
Wannacry
WannaCry is a ransomware cryptoworm.
-
Contacts a large (3155) amount of remote hosts 1 TTPs
This may indicate a network scan to discover remotely running services.
-
Executes dropped EXE 3 IoCs
Processes:
mssecsvc.exemssecsvc.exetasksche.exepid process 2224 mssecsvc.exe 2520 mssecsvc.exe 2432 tasksche.exe -
Creates a large amount of network flows 1 TTPs
This may indicate a network scan to discover remotely running services.
-
Drops file in System32 directory 1 IoCs
Processes:
mssecsvc.exedescription ioc process File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\Temporary Internet Files\counters.dat mssecsvc.exe -
Drops file in Windows directory 2 IoCs
Processes:
rundll32.exemssecsvc.exedescription ioc process File created C:\WINDOWS\mssecsvc.exe rundll32.exe File created C:\WINDOWS\tasksche.exe mssecsvc.exe -
Modifies data under HKEY_USERS 24 IoCs
Processes:
mssecsvc.exedescription ioc process Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\History\CachePrefix = "Visited:" mssecsvc.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{34447DAD-C7FA-4577-89CC-D35CA78B8802}\WpadDecisionReason = "1" mssecsvc.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\62-c7-b8-aa-c0-d1\WpadDecisionTime = d0657da183beda01 mssecsvc.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\DefaultConnectionSettings = 4600000002000000090000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 mssecsvc.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Content\CachePrefix mssecsvc.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ProxyEnable = "0" mssecsvc.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\SavedLegacySettings = 4600000002000000090000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 mssecsvc.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{34447DAD-C7FA-4577-89CC-D35CA78B8802}\WpadDecisionTime = d0657da183beda01 mssecsvc.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{34447DAD-C7FA-4577-89CC-D35CA78B8802}\WpadDecision = "0" mssecsvc.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections mssecsvc.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings mssecsvc.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\DefaultConnectionSettings = 4600000003000000090000000000000000000000000000000400000000000000000000000000000000000000000000000000000001000000020000000a7f0132000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 mssecsvc.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\62-c7-b8-aa-c0-d1 mssecsvc.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{34447DAD-C7FA-4577-89CC-D35CA78B8802}\62-c7-b8-aa-c0-d1 mssecsvc.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\AutoDetect = "1" mssecsvc.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Cookies\CachePrefix = "Cookie:" mssecsvc.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\UNCAsIntranet = "0" mssecsvc.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad mssecsvc.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{34447DAD-C7FA-4577-89CC-D35CA78B8802} mssecsvc.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{34447DAD-C7FA-4577-89CC-D35CA78B8802}\WpadNetworkName = "Network 3" mssecsvc.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\62-c7-b8-aa-c0-d1\WpadDecisionReason = "1" mssecsvc.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\62-c7-b8-aa-c0-d1\WpadDecision = "0" mssecsvc.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings mssecsvc.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ mssecsvc.exe -
Suspicious use of WriteProcessMemory 11 IoCs
Processes:
rundll32.exerundll32.exedescription pid process target process PID 2908 wrote to memory of 1668 2908 rundll32.exe rundll32.exe PID 2908 wrote to memory of 1668 2908 rundll32.exe rundll32.exe PID 2908 wrote to memory of 1668 2908 rundll32.exe rundll32.exe PID 2908 wrote to memory of 1668 2908 rundll32.exe rundll32.exe PID 2908 wrote to memory of 1668 2908 rundll32.exe rundll32.exe PID 2908 wrote to memory of 1668 2908 rundll32.exe rundll32.exe PID 2908 wrote to memory of 1668 2908 rundll32.exe rundll32.exe PID 1668 wrote to memory of 2224 1668 rundll32.exe mssecsvc.exe PID 1668 wrote to memory of 2224 1668 rundll32.exe mssecsvc.exe PID 1668 wrote to memory of 2224 1668 rundll32.exe mssecsvc.exe PID 1668 wrote to memory of 2224 1668 rundll32.exe mssecsvc.exe
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\ab0048b9856d6fb658eb8e042be8c4bd_JaffaCakes118.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:2908 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\ab0048b9856d6fb658eb8e042be8c4bd_JaffaCakes118.dll,#12⤵
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:1668 -
C:\WINDOWS\mssecsvc.exeC:\WINDOWS\mssecsvc.exe3⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:2224 -
C:\WINDOWS\tasksche.exeC:\WINDOWS\tasksche.exe /i4⤵
- Executes dropped EXE
PID:2432
-
C:\WINDOWS\mssecsvc.exeC:\WINDOWS\mssecsvc.exe -m security1⤵
- Executes dropped EXE
- Drops file in System32 directory
- Modifies data under HKEY_USERS
PID:2520
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3.6MB
MD5c8258c48cbeef8f95df45452de3a4799
SHA1ebaf8e324c6129b00f708480c4677467ceaa8c06
SHA256ec4d6c08fc843b9f1c00d6e0c70e8732e54f85818a107c397b53d5f66e5f8356
SHA512dfaeb9f336ea6f107bc90c8f49a65a78729de311dc7f4adbf3c826a7a09e48834ab4a331405080a0c1ac8f2a42a38df4954c175660cdfa0d7e7642381f48667f
-
Filesize
3.4MB
MD50983e10da094d242ab67b2eb84c03dd1
SHA182725733486da4b36b8467b30d96b170a0dce764
SHA256ae26fb52093752b3abbbcf86849dc01fcf0a0d83bc09443275a6964769437c66
SHA512b9a31ecf66bc159f4b3049c2628400e8a7ad731478560302901d64311e380eff0cd2acf2fc6cde26a7969ba749754c699ceabe40eb4931445e96fd14ef7dccfe