Analysis
-
max time kernel
150s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
12-07-2024 16:48
Static task
static1
Behavioral task
behavioral1
Sample
3e1f1ab7eb22b54d451f764377d869ab_JaffaCakes118.dll
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
3e1f1ab7eb22b54d451f764377d869ab_JaffaCakes118.dll
Resource
win10v2004-20240709-en
General
-
Target
3e1f1ab7eb22b54d451f764377d869ab_JaffaCakes118.dll
-
Size
5.0MB
-
MD5
3e1f1ab7eb22b54d451f764377d869ab
-
SHA1
0ef805454a7aeb92e5be18457fe430f22186fbc4
-
SHA256
a4c7022dd7d4aa7eb066676179e5bfe818cdf0a6c4da9d5122d9be6156e7fe51
-
SHA512
16c237558076cdc622281a76f541ab28ca56d24ccdc63538d104c3acf51db9323d374051f4ba5a637cb39bf1cd8c85374fec6ae6181806e025020f9705735022
-
SSDEEP
49152:SnAQqMSPbcBVQej/1INRx+TSqTdX1HkQo6SAA:+DqPoBhz1aRxcSUDk36SA
Malware Config
Signatures
-
Wannacry
WannaCry is a ransomware cryptoworm.
-
Contacts a large (3308) amount of remote hosts 1 TTPs
This may indicate a network scan to discover remotely running services.
-
Executes dropped EXE 3 IoCs
pid Process 4232 mssecsvc.exe 1056 mssecsvc.exe 4400 tasksche.exe -
Creates a large amount of network flows 1 TTPs
This may indicate a network scan to discover remotely running services.
-
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\WINDOWS\mssecsvc.exe rundll32.exe File created C:\WINDOWS\tasksche.exe mssecsvc.exe -
Modifies data under HKEY_USERS 5 IoCs
description ioc Process Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\AutoDetect = "0" mssecsvc.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ mssecsvc.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ProxyBypass = "1" mssecsvc.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\IntranetName = "1" mssecsvc.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\UNCAsIntranet = "1" mssecsvc.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 1144 wrote to memory of 1508 1144 rundll32.exe 83 PID 1144 wrote to memory of 1508 1144 rundll32.exe 83 PID 1144 wrote to memory of 1508 1144 rundll32.exe 83 PID 1508 wrote to memory of 4232 1508 rundll32.exe 86 PID 1508 wrote to memory of 4232 1508 rundll32.exe 86 PID 1508 wrote to memory of 4232 1508 rundll32.exe 86
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\3e1f1ab7eb22b54d451f764377d869ab_JaffaCakes118.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1144 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\3e1f1ab7eb22b54d451f764377d869ab_JaffaCakes118.dll,#12⤵
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:1508 -
C:\WINDOWS\mssecsvc.exeC:\WINDOWS\mssecsvc.exe3⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:4232 -
C:\WINDOWS\tasksche.exeC:\WINDOWS\tasksche.exe /i4⤵
- Executes dropped EXE
PID:4400
-
-
-
-
C:\WINDOWS\mssecsvc.exeC:\WINDOWS\mssecsvc.exe -m security1⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
PID:1056
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3.6MB
MD56023bb9604c82902e33abaad4053a6e2
SHA1486557ea1f58f88f464419cfda8b18b6ffa15a95
SHA2564b80a8b70c6747147dcda5fde12cc8902b3718b170eb980946bb86fa13d8ba2f
SHA512bc6509fee9f95d5ba21d3113b2d9f49cb16bdd5d0c9418e7dc330b687749bc8102e9c6d3f8cab60aebad982a4472712d37fa28cd9b00340af1d3378d52723f6e
-
Filesize
3.4MB
MD5b0b1b2ce3d7548b46841b09560f9b1f2
SHA15f05a88a74eb2c47078e6c41c25ebda484b45db4
SHA25678af6438e64841ed977e12fccb2e875bfc6b9a7efdf4bca82f6f32606fb87561
SHA5125c29203a0ad41efe4b9ced47b322b81d3a3b44950f9ca0bc936f6699ea2837794fe5e7cf59fd22b5b1b00b5145e372c3f2b82cc9c54795e3fd95b0664fce4943