Analysis
-
max time kernel
150s -
max time network
150s -
platform
windows7_x64 -
resource
win7-20240611-en -
resource tags
arch:x64arch:x86image:win7-20240611-enlocale:en-usos:windows7-x64system -
submitted
16-06-2024 09:15
Static task
static1
Behavioral task
behavioral1
Sample
b2bcb5d052bd5c01f273d23ca1bd03f8_JaffaCakes118.dll
Resource
win7-20240611-en
Behavioral task
behavioral2
Sample
b2bcb5d052bd5c01f273d23ca1bd03f8_JaffaCakes118.dll
Resource
win10v2004-20240611-en
General
-
Target
b2bcb5d052bd5c01f273d23ca1bd03f8_JaffaCakes118.dll
-
Size
5.0MB
-
MD5
b2bcb5d052bd5c01f273d23ca1bd03f8
-
SHA1
9fbc6b7a778bfe6175bfabf5bcbabb1b93c39db3
-
SHA256
ee0e94f9bf17c7c0491cd22dec56da8030b7e2ecfdfc334b29f8a0983d16b4a6
-
SHA512
bafa8dc0e290e12831b83ff2694ccc5c53650e1a50fd89c3c64ee5f55d5c1401063b1f3cb6516db0890b7501fa563706f07f93175a36c8179c29a5406c449050
-
SSDEEP
98304:TDqPoBhz1aRxcSUDkzAdhvxWa9v593R8yAVp2H:TDqPe1CxcxksUaVzR8yc4H
Malware Config
Signatures
-
Wannacry
WannaCry is a ransomware cryptoworm.
-
Contacts a large (3191) amount of remote hosts 1 TTPs
This may indicate a network scan to discover remotely running services.
-
Executes dropped EXE 3 IoCs
Processes:
mssecsvc.exemssecsvc.exetasksche.exepid process 380 mssecsvc.exe 2360 mssecsvc.exe 2732 tasksche.exe -
Creates a large amount of network flows 1 TTPs
This may indicate a network scan to discover remotely running services.
-
Drops file in System32 directory 1 IoCs
Processes:
mssecsvc.exedescription ioc process File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\Temporary Internet Files\counters.dat mssecsvc.exe -
Drops file in Windows directory 2 IoCs
Processes:
rundll32.exemssecsvc.exedescription ioc process File created C:\WINDOWS\mssecsvc.exe rundll32.exe File created C:\WINDOWS\tasksche.exe mssecsvc.exe -
Modifies data under HKEY_USERS 24 IoCs
Processes:
mssecsvc.exedescription ioc process Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\SavedLegacySettings = 4600000002000000090000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 mssecsvc.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\AutoDetect = "1" mssecsvc.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Content\CachePrefix mssecsvc.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{D2724626-9EBC-4E34-BB4F-08979FD48BC3} mssecsvc.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{D2724626-9EBC-4E34-BB4F-08979FD48BC3}\WpadDecisionReason = "1" mssecsvc.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{D2724626-9EBC-4E34-BB4F-08979FD48BC3}\WpadDecisionTime = 70ce5ed0cdbfda01 mssecsvc.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{D2724626-9EBC-4E34-BB4F-08979FD48BC3}\32-80-2d-56-1b-1c mssecsvc.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings mssecsvc.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\32-80-2d-56-1b-1c\WpadDecision = "0" mssecsvc.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\32-80-2d-56-1b-1c\WpadDecisionReason = "1" mssecsvc.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Cookies\CachePrefix = "Cookie:" mssecsvc.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\History\CachePrefix = "Visited:" mssecsvc.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\32-80-2d-56-1b-1c mssecsvc.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ProxyEnable = "0" mssecsvc.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings mssecsvc.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\UNCAsIntranet = "0" mssecsvc.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad mssecsvc.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\DefaultConnectionSettings = 4600000003000000090000000000000000000000000000000400000000000000000000000000000000000000000000000000000001000000020000000a7f0052000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 mssecsvc.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{D2724626-9EBC-4E34-BB4F-08979FD48BC3}\WpadNetworkName = "Network 3" mssecsvc.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\32-80-2d-56-1b-1c\WpadDecisionTime = 70ce5ed0cdbfda01 mssecsvc.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\DefaultConnectionSettings = 4600000002000000090000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 mssecsvc.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ mssecsvc.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{D2724626-9EBC-4E34-BB4F-08979FD48BC3}\WpadDecision = "0" mssecsvc.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections mssecsvc.exe -
Suspicious use of WriteProcessMemory 11 IoCs
Processes:
rundll32.exerundll32.exedescription pid process target process PID 2484 wrote to memory of 2232 2484 rundll32.exe rundll32.exe PID 2484 wrote to memory of 2232 2484 rundll32.exe rundll32.exe PID 2484 wrote to memory of 2232 2484 rundll32.exe rundll32.exe PID 2484 wrote to memory of 2232 2484 rundll32.exe rundll32.exe PID 2484 wrote to memory of 2232 2484 rundll32.exe rundll32.exe PID 2484 wrote to memory of 2232 2484 rundll32.exe rundll32.exe PID 2484 wrote to memory of 2232 2484 rundll32.exe rundll32.exe PID 2232 wrote to memory of 380 2232 rundll32.exe mssecsvc.exe PID 2232 wrote to memory of 380 2232 rundll32.exe mssecsvc.exe PID 2232 wrote to memory of 380 2232 rundll32.exe mssecsvc.exe PID 2232 wrote to memory of 380 2232 rundll32.exe mssecsvc.exe
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\b2bcb5d052bd5c01f273d23ca1bd03f8_JaffaCakes118.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:2484 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\b2bcb5d052bd5c01f273d23ca1bd03f8_JaffaCakes118.dll,#12⤵
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:2232 -
C:\WINDOWS\mssecsvc.exeC:\WINDOWS\mssecsvc.exe3⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:380 -
C:\WINDOWS\tasksche.exeC:\WINDOWS\tasksche.exe /i4⤵
- Executes dropped EXE
PID:2732
-
C:\WINDOWS\mssecsvc.exeC:\WINDOWS\mssecsvc.exe -m security1⤵
- Executes dropped EXE
- Drops file in System32 directory
- Modifies data under HKEY_USERS
PID:2360
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3.6MB
MD58177d1aa276d80dd1ad8e8b5de6ae796
SHA1776f471f28df141ee2d5cf365d4b51be53d06fa8
SHA2562a80d4519e5d2c9c19214e2e833b223a99451fc3d63851b53a37bb3d71b1af6c
SHA5124c970eb85d98fc9e64a3a80c43d82be2bbb3225c46f539588369b7c7b46263dc21bb74599dcb9794f6a1595f4956adf5f84577a56d64bbab1e2bc0cb5160e4ed
-
Filesize
3.4MB
MD5c41b977104d3e5ee765b56aac42ba1be
SHA16eeabfaeb9cd0fe5965a20469a15106e07f69265
SHA2564371e5a5f6814f1e40a584cf3302434382d5ba22da1f2a27f629aea9b992894d
SHA5120f743be8137999ec5fe098660dfb07658bdd60062b439956b6a41adcef3f2876a175f54b0beb214c14e489196705fca6466d18d26f71bee8dc75c1dd03a1e97c