Analysis
-
max time kernel
150s -
max time network
150s -
platform
windows7_x64 -
resource
win7-20240705-en -
resource tags
arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system -
submitted
14-07-2024 06:26
Static task
static1
Behavioral task
behavioral1
Sample
44ade454a487822f1c9d75aa7d8df907_JaffaCakes118.dll
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
44ade454a487822f1c9d75aa7d8df907_JaffaCakes118.dll
Resource
win10v2004-20240709-en
General
-
Target
44ade454a487822f1c9d75aa7d8df907_JaffaCakes118.dll
-
Size
5.0MB
-
MD5
44ade454a487822f1c9d75aa7d8df907
-
SHA1
c0df6b4099072a7ba157f1fb5f5cdaa763501382
-
SHA256
60dbd1084ec5ea6c826039b159aee2a561dd1229d7814328d4c501117a62fbde
-
SHA512
910655b47bd5795955f05750c08b88705381d001fe935c77bd426b760491e2b84070e1aebafc0233f7d3df19e2dc0109982cbd8f6dd1bc5cf69d699caa297027
-
SSDEEP
24576:RbLgurihdmMSirYbcMNgef0QeQjGqD8kIqaXmiHkdhAdmv:RnnMSPbcBVQejqGX1Hkdhnv
Malware Config
Signatures
-
Wannacry
WannaCry is a ransomware cryptoworm.
-
Contacts a large (2064) amount of remote hosts 1 TTPs
This may indicate a network scan to discover remotely running services.
-
Executes dropped EXE 2 IoCs
pid Process 2516 mssecsvr.exe 2752 mssecsvr.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\Temporary Internet Files\counters.dat mssecsvr.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\WINDOWS\mssecsvr.exe rundll32.exe File created C:\WINDOWS\tasksche.exe mssecsvr.exe -
Modifies data under HKEY_USERS 24 IoCs
description ioc Process Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\DefaultConnectionSettings = 4600000002000000090000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 mssecsvr.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{033C53F2-54BC-4024-B9B3-0B7E2CB177AB} mssecsvr.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{033C53F2-54BC-4024-B9B3-0B7E2CB177AB}\42-d1-14-cc-14-a8 mssecsvr.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections mssecsvr.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ProxyEnable = "0" mssecsvr.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\UNCAsIntranet = "0" mssecsvr.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Content\CachePrefix mssecsvr.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\History\CachePrefix = "Visited:" mssecsvr.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{033C53F2-54BC-4024-B9B3-0B7E2CB177AB}\WpadNetworkName = "Network 3" mssecsvr.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings mssecsvr.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\AutoDetect = "1" mssecsvr.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Cookies\CachePrefix = "Cookie:" mssecsvr.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad mssecsvr.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\DefaultConnectionSettings = 4600000003000000090000000000000000000000000000000400000000000000000000000000000000000000000000000000000001000000020000000a7f007b000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 mssecsvr.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{033C53F2-54BC-4024-B9B3-0B7E2CB177AB}\WpadDecisionReason = "1" mssecsvr.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{033C53F2-54BC-4024-B9B3-0B7E2CB177AB}\WpadDecisionTime = 80c691d2b6d5da01 mssecsvr.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\42-d1-14-cc-14-a8 mssecsvr.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ mssecsvr.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\42-d1-14-cc-14-a8\WpadDecision = "0" mssecsvr.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\42-d1-14-cc-14-a8\WpadDecisionReason = "1" mssecsvr.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\SavedLegacySettings = 4600000002000000090000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 mssecsvr.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{033C53F2-54BC-4024-B9B3-0B7E2CB177AB}\WpadDecision = "0" mssecsvr.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\42-d1-14-cc-14-a8\WpadDecisionTime = 80c691d2b6d5da01 mssecsvr.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings mssecsvr.exe -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 1732 wrote to memory of 988 1732 rundll32.exe 29 PID 1732 wrote to memory of 988 1732 rundll32.exe 29 PID 1732 wrote to memory of 988 1732 rundll32.exe 29 PID 1732 wrote to memory of 988 1732 rundll32.exe 29 PID 1732 wrote to memory of 988 1732 rundll32.exe 29 PID 1732 wrote to memory of 988 1732 rundll32.exe 29 PID 1732 wrote to memory of 988 1732 rundll32.exe 29 PID 988 wrote to memory of 2516 988 rundll32.exe 30 PID 988 wrote to memory of 2516 988 rundll32.exe 30 PID 988 wrote to memory of 2516 988 rundll32.exe 30 PID 988 wrote to memory of 2516 988 rundll32.exe 30
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\44ade454a487822f1c9d75aa7d8df907_JaffaCakes118.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1732 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\44ade454a487822f1c9d75aa7d8df907_JaffaCakes118.dll,#12⤵
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:988 -
C:\WINDOWS\mssecsvr.exeC:\WINDOWS\mssecsvr.exe3⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:2516
-
-
-
C:\WINDOWS\mssecsvr.exeC:\WINDOWS\mssecsvr.exe -m security1⤵
- Executes dropped EXE
- Drops file in System32 directory
- Modifies data under HKEY_USERS
PID:2752
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2.2MB
MD5b5fad87d8da4d6a0343601c66693d3ac
SHA1cfe60a2cd6cd5ad10976ca9c4728d80bfe6feaa4
SHA256bfe0a67ccf3b227c2835bf90e0708cf37a092ef51aac2557509ce167da8a47bf
SHA5124dfc77c7a889214fa1ec8c0fb3625c9092631b70ebd28811d7b5e4727ffdccabbca10b6aa1cf0ebb2985f22c43cf7083aa887210cee6acf45127f62ef38c4161