Analysis
-
max time kernel
150s -
max time network
150s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
13-07-2024 19:25
Static task
static1
Behavioral task
behavioral1
Sample
430599e85618bd750b5bbfb21cb5f857_JaffaCakes118.dll
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
430599e85618bd750b5bbfb21cb5f857_JaffaCakes118.dll
Resource
win10v2004-20240704-en
General
-
Target
430599e85618bd750b5bbfb21cb5f857_JaffaCakes118.dll
-
Size
5.0MB
-
MD5
430599e85618bd750b5bbfb21cb5f857
-
SHA1
c9ff0c824d324d6047a31eb07da54ba43a0a8b86
-
SHA256
ec2a990e5ceea72eec6128d38e8debedffbe6cac244f7ee5e5e3d58e2ad0b202
-
SHA512
579734a994750f09d3cd6feb1d6e5f2793bce1eca37f65cb4fef50c0c908b18248e143a85cbf3d62bf5d0af1e5a4b48faa94dc3e92846e615215276b9322c1f7
-
SSDEEP
49152:RnpE/bcBVQej/1INRx+TSqTdX1HkQo6SAARdhnv:1p4oBhz1aRxcSUDk36SAEdhv
Malware Config
Signatures
-
Wannacry
WannaCry is a ransomware cryptoworm.
-
Contacts a large (2148) amount of remote hosts 1 TTPs
This may indicate a network scan to discover remotely running services.
-
Executes dropped EXE 3 IoCs
pid Process 1628 mssecsvr.exe 2660 mssecsvr.exe 2068 tasksche.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\Temporary Internet Files\counters.dat mssecsvr.exe -
Drops file in Windows directory 4 IoCs
description ioc Process File created C:\WINDOWS\mssecsvr.exe rundll32.exe File created C:\WINDOWS\tasksche.exe mssecsvr.exe File created C:\Windows\__tmp_rar_sfx_access_check_259506383 tasksche.exe File created C:\Windows\eee.exe tasksche.exe -
Modifies data under HKEY_USERS 24 IoCs
description ioc Process Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings mssecsvr.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ProxyEnable = "0" mssecsvr.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\History\CachePrefix = "Visited:" mssecsvr.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{9C944B6F-C6C4-4CB4-979A-06573300125A}\WpadDecisionTime = 304f91795ad5da01 mssecsvr.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{9C944B6F-C6C4-4CB4-979A-06573300125A}\WpadNetworkName = "Network 3" mssecsvr.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{9C944B6F-C6C4-4CB4-979A-06573300125A}\76-b8-9e-78-c0-a3 mssecsvr.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\DefaultConnectionSettings = 4600000002000000090000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 mssecsvr.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\AutoDetect = "1" mssecsvr.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{9C944B6F-C6C4-4CB4-979A-06573300125A}\WpadDecision = "0" mssecsvr.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\76-b8-9e-78-c0-a3\WpadDecision = "0" mssecsvr.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections mssecsvr.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Content\CachePrefix mssecsvr.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Cookies\CachePrefix = "Cookie:" mssecsvr.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\76-b8-9e-78-c0-a3 mssecsvr.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings mssecsvr.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\SavedLegacySettings = 4600000002000000090000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 mssecsvr.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ mssecsvr.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\UNCAsIntranet = "0" mssecsvr.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad mssecsvr.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\DefaultConnectionSettings = 4600000003000000090000000000000000000000000000000400000000000000000000000000000000000000000000000000000001000000020000000a7f0032000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 mssecsvr.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{9C944B6F-C6C4-4CB4-979A-06573300125A} mssecsvr.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{9C944B6F-C6C4-4CB4-979A-06573300125A}\WpadDecisionReason = "1" mssecsvr.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\76-b8-9e-78-c0-a3\WpadDecisionReason = "1" mssecsvr.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\76-b8-9e-78-c0-a3\WpadDecisionTime = 304f91795ad5da01 mssecsvr.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2068 tasksche.exe -
Suspicious use of WriteProcessMemory 18 IoCs
description pid Process procid_target PID 1596 wrote to memory of 1708 1596 rundll32.exe 30 PID 1596 wrote to memory of 1708 1596 rundll32.exe 30 PID 1596 wrote to memory of 1708 1596 rundll32.exe 30 PID 1596 wrote to memory of 1708 1596 rundll32.exe 30 PID 1596 wrote to memory of 1708 1596 rundll32.exe 30 PID 1596 wrote to memory of 1708 1596 rundll32.exe 30 PID 1596 wrote to memory of 1708 1596 rundll32.exe 30 PID 1708 wrote to memory of 1628 1708 rundll32.exe 31 PID 1708 wrote to memory of 1628 1708 rundll32.exe 31 PID 1708 wrote to memory of 1628 1708 rundll32.exe 31 PID 1708 wrote to memory of 1628 1708 rundll32.exe 31 PID 1628 wrote to memory of 2068 1628 mssecsvr.exe 34 PID 1628 wrote to memory of 2068 1628 mssecsvr.exe 34 PID 1628 wrote to memory of 2068 1628 mssecsvr.exe 34 PID 1628 wrote to memory of 2068 1628 mssecsvr.exe 34 PID 1628 wrote to memory of 2068 1628 mssecsvr.exe 34 PID 1628 wrote to memory of 2068 1628 mssecsvr.exe 34 PID 1628 wrote to memory of 2068 1628 mssecsvr.exe 34
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\430599e85618bd750b5bbfb21cb5f857_JaffaCakes118.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1596 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\430599e85618bd750b5bbfb21cb5f857_JaffaCakes118.dll,#12⤵
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:1708 -
C:\WINDOWS\mssecsvr.exeC:\WINDOWS\mssecsvr.exe3⤵
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:1628 -
C:\WINDOWS\tasksche.exeC:\WINDOWS\tasksche.exe /i4⤵
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious behavior: GetForegroundWindowSpam
PID:2068
-
-
-
-
C:\WINDOWS\mssecsvr.exeC:\WINDOWS\mssecsvr.exe -m security1⤵
- Executes dropped EXE
- Drops file in System32 directory
- Modifies data under HKEY_USERS
PID:2660
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2.2MB
MD503e8741684a2ea2aa24bad8da574435e
SHA19cc3be4e47aa9f1df05c1fdb8d528cfd09b8b88c
SHA2564128abf9efa8bca93aede9b4a44aab78fab27d634f4c9581c64fa54d3bb8993e
SHA512ff6d7dcc2242f316e31b073a9f662ad6d7bc7c31c6eedfde75e1b16109a1f8c3c70e1de92ee67db62e0561572d53c118240a3a5ec2004c12ed1d54cc3aa693d5
-
Filesize
2.0MB
MD51ff321de9e6b8a865048789e18bb4232
SHA167a548cf33d086c224058ab30c631c04f5dad29d
SHA256ead0300a439be8ea26abc28944d1d3eb3b111ba1b3cad76b3b0f00b26dadd97a
SHA512ab57e6bdce2dd71c49affb8c093384e27d2cec6b4165a0089617098ac30ab00715e0251cc5f96f5710a74215c9eb8804113c177df7deef046d895ac733bba0bc