Analysis
-
max time kernel
151s -
max time network
162s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
23-07-2024 12:00
Static task
static1
Behavioral task
behavioral1
Sample
678323b12f8ae74c7bf406efced5f476_JaffaCakes118.dll
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
678323b12f8ae74c7bf406efced5f476_JaffaCakes118.dll
Resource
win10v2004-20240709-en
General
-
Target
678323b12f8ae74c7bf406efced5f476_JaffaCakes118.dll
-
Size
5.0MB
-
MD5
678323b12f8ae74c7bf406efced5f476
-
SHA1
f9ec0e2e5a679934e18d78f7924cce8f1f324b01
-
SHA256
44533af9de63dd3fac4a9fbba9b6831496b9121eb3ce221145926c3d6b37310e
-
SHA512
f6f84783d9965318ae82547bea16289ff63910f8181ab223dc9d9dab45f55f6431c7ae9a6ee46621ee7e545db2be99d2db201a4e94d414acee1e115c4786a3ec
-
SSDEEP
98304:+DqPoBG1aRxcSUDk36SAEdhWxWa9P593R8yAVp2H:+DqPR1Cxcxk3ZAEFadzR8yc4H
Malware Config
Signatures
-
Wannacry
WannaCry is a ransomware cryptoworm.
-
Contacts a large (3193) amount of remote hosts 1 TTPs
This may indicate a network scan to discover remotely running services.
-
Executes dropped EXE 3 IoCs
pid Process 2248 mssecsvc.exe 2820 mssecsvc.exe 2920 tasksche.exe -
Creates a large amount of network flows 1 TTPs
This may indicate a network scan to discover remotely running services.
-
Drops file in System32 directory 1 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\Temporary Internet Files\counters.dat mssecsvc.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\WINDOWS\mssecsvc.exe rundll32.exe File created C:\WINDOWS\tasksche.exe mssecsvc.exe -
Modifies data under HKEY_USERS 24 IoCs
description ioc Process Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Cookies\CachePrefix = "Cookie:" mssecsvc.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{F96BC78A-B766-4F1F-A22B-BCD6A54DACD2}\WpadDecisionTime = f07d1ce6f8dcda01 mssecsvc.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\SavedLegacySettings = 4600000002000000090000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 mssecsvc.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections mssecsvc.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\DefaultConnectionSettings = 4600000002000000090000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 mssecsvc.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\UNCAsIntranet = "0" mssecsvc.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\History\CachePrefix = "Visited:" mssecsvc.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\DefaultConnectionSettings = 4600000003000000090000000000000000000000000000000400000000000000000000000000000000000000000000000000000001000000020000000a7f0083000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 mssecsvc.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{F96BC78A-B766-4F1F-A22B-BCD6A54DACD2}\WpadDecisionReason = "1" mssecsvc.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\56-95-48-66-79-a5 mssecsvc.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings mssecsvc.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\56-95-48-66-79-a5\WpadDecisionReason = "1" mssecsvc.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ mssecsvc.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\AutoDetect = "1" mssecsvc.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Content\CachePrefix mssecsvc.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{F96BC78A-B766-4F1F-A22B-BCD6A54DACD2} mssecsvc.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ProxyEnable = "0" mssecsvc.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad mssecsvc.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{F96BC78A-B766-4F1F-A22B-BCD6A54DACD2}\WpadDecision = "0" mssecsvc.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{F96BC78A-B766-4F1F-A22B-BCD6A54DACD2}\WpadNetworkName = "Network 3" mssecsvc.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{F96BC78A-B766-4F1F-A22B-BCD6A54DACD2}\56-95-48-66-79-a5 mssecsvc.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\56-95-48-66-79-a5\WpadDecisionTime = f07d1ce6f8dcda01 mssecsvc.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\56-95-48-66-79-a5\WpadDecision = "0" mssecsvc.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings mssecsvc.exe -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 2468 wrote to memory of 2416 2468 rundll32.exe 29 PID 2468 wrote to memory of 2416 2468 rundll32.exe 29 PID 2468 wrote to memory of 2416 2468 rundll32.exe 29 PID 2468 wrote to memory of 2416 2468 rundll32.exe 29 PID 2468 wrote to memory of 2416 2468 rundll32.exe 29 PID 2468 wrote to memory of 2416 2468 rundll32.exe 29 PID 2468 wrote to memory of 2416 2468 rundll32.exe 29 PID 2416 wrote to memory of 2248 2416 rundll32.exe 30 PID 2416 wrote to memory of 2248 2416 rundll32.exe 30 PID 2416 wrote to memory of 2248 2416 rundll32.exe 30 PID 2416 wrote to memory of 2248 2416 rundll32.exe 30
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\678323b12f8ae74c7bf406efced5f476_JaffaCakes118.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:2468 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\678323b12f8ae74c7bf406efced5f476_JaffaCakes118.dll,#12⤵
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:2416 -
C:\WINDOWS\mssecsvc.exeC:\WINDOWS\mssecsvc.exe3⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:2248 -
C:\WINDOWS\tasksche.exeC:\WINDOWS\tasksche.exe /i4⤵
- Executes dropped EXE
PID:2920
-
-
-
-
C:\WINDOWS\mssecsvc.exeC:\WINDOWS\mssecsvc.exe -m security1⤵
- Executes dropped EXE
- Drops file in System32 directory
- Modifies data under HKEY_USERS
PID:2820
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3.6MB
MD513ef6033987c39be76b70837347cec3b
SHA163287b86bcd9486b67beae844742bae5ae17399e
SHA256cf810ce50adb1fa79ad76b2bc0d572d11e5896c2b8ca430d286b06d0e7ca379d
SHA5128cc06baca364ae9e2923938440ab3ffaa3c968b4fd56f9ef000a3177fdf31adbba30f23b9e28bd149181b47ef4c310ac3c49623ac023bb9d479d05905f2abf18
-
Filesize
3.4MB
MD5c3c3cf66c0bf945b6033c6a94f78b2c9
SHA1c8371fd0b5a9107eda3cdadd08673c17e02e3ea9
SHA2564276baeb09c9eeecc34530311b806442cba2a9c7d7f2ad2aca3aba1fe8435465
SHA5125082353dbb52bfad84fb20211b0ca209a6f6bae95d76919378d699049bf9f593188ad0c82fc790725a6b85aa007b158ca9ae4f4b307e34ac7182bed8a14424d9