Analysis
-
max time kernel
150s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240611-en -
resource tags
arch:x64arch:x86image:win10v2004-20240611-enlocale:en-usos:windows10-2004-x64system -
submitted
16-06-2024 09:15
Static task
static1
Behavioral task
behavioral1
Sample
b2bcb5d052bd5c01f273d23ca1bd03f8_JaffaCakes118.dll
Resource
win7-20240611-en
Behavioral task
behavioral2
Sample
b2bcb5d052bd5c01f273d23ca1bd03f8_JaffaCakes118.dll
Resource
win10v2004-20240611-en
General
-
Target
b2bcb5d052bd5c01f273d23ca1bd03f8_JaffaCakes118.dll
-
Size
5.0MB
-
MD5
b2bcb5d052bd5c01f273d23ca1bd03f8
-
SHA1
9fbc6b7a778bfe6175bfabf5bcbabb1b93c39db3
-
SHA256
ee0e94f9bf17c7c0491cd22dec56da8030b7e2ecfdfc334b29f8a0983d16b4a6
-
SHA512
bafa8dc0e290e12831b83ff2694ccc5c53650e1a50fd89c3c64ee5f55d5c1401063b1f3cb6516db0890b7501fa563706f07f93175a36c8179c29a5406c449050
-
SSDEEP
98304:TDqPoBhz1aRxcSUDkzAdhvxWa9v593R8yAVp2H:TDqPe1CxcxksUaVzR8yc4H
Malware Config
Signatures
-
Wannacry
WannaCry is a ransomware cryptoworm.
-
Contacts a large (3174) amount of remote hosts 1 TTPs
This may indicate a network scan to discover remotely running services.
-
Executes dropped EXE 3 IoCs
Processes:
mssecsvc.exemssecsvc.exetasksche.exepid process 4756 mssecsvc.exe 4256 mssecsvc.exe 2016 tasksche.exe -
Creates a large amount of network flows 1 TTPs
This may indicate a network scan to discover remotely running services.
-
Drops file in Windows directory 2 IoCs
Processes:
rundll32.exemssecsvc.exedescription ioc process File created C:\WINDOWS\mssecsvc.exe rundll32.exe File created C:\WINDOWS\tasksche.exe mssecsvc.exe -
Modifies data under HKEY_USERS 5 IoCs
Processes:
mssecsvc.exedescription ioc process Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\UNCAsIntranet = "1" mssecsvc.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\AutoDetect = "0" mssecsvc.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ mssecsvc.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ProxyBypass = "1" mssecsvc.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\IntranetName = "1" mssecsvc.exe -
Suspicious use of WriteProcessMemory 6 IoCs
Processes:
rundll32.exerundll32.exedescription pid process target process PID 4176 wrote to memory of 4164 4176 rundll32.exe rundll32.exe PID 4176 wrote to memory of 4164 4176 rundll32.exe rundll32.exe PID 4176 wrote to memory of 4164 4176 rundll32.exe rundll32.exe PID 4164 wrote to memory of 4756 4164 rundll32.exe mssecsvc.exe PID 4164 wrote to memory of 4756 4164 rundll32.exe mssecsvc.exe PID 4164 wrote to memory of 4756 4164 rundll32.exe mssecsvc.exe
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\b2bcb5d052bd5c01f273d23ca1bd03f8_JaffaCakes118.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:4176 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\b2bcb5d052bd5c01f273d23ca1bd03f8_JaffaCakes118.dll,#12⤵
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:4164 -
C:\WINDOWS\mssecsvc.exeC:\WINDOWS\mssecsvc.exe3⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:4756 -
C:\WINDOWS\tasksche.exeC:\WINDOWS\tasksche.exe /i4⤵
- Executes dropped EXE
PID:2016
-
C:\WINDOWS\mssecsvc.exeC:\WINDOWS\mssecsvc.exe -m security1⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
PID:4256
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3.6MB
MD58177d1aa276d80dd1ad8e8b5de6ae796
SHA1776f471f28df141ee2d5cf365d4b51be53d06fa8
SHA2562a80d4519e5d2c9c19214e2e833b223a99451fc3d63851b53a37bb3d71b1af6c
SHA5124c970eb85d98fc9e64a3a80c43d82be2bbb3225c46f539588369b7c7b46263dc21bb74599dcb9794f6a1595f4956adf5f84577a56d64bbab1e2bc0cb5160e4ed
-
Filesize
3.4MB
MD5c41b977104d3e5ee765b56aac42ba1be
SHA16eeabfaeb9cd0fe5965a20469a15106e07f69265
SHA2564371e5a5f6814f1e40a584cf3302434382d5ba22da1f2a27f629aea9b992894d
SHA5120f743be8137999ec5fe098660dfb07658bdd60062b439956b6a41adcef3f2876a175f54b0beb214c14e489196705fca6466d18d26f71bee8dc75c1dd03a1e97c