Analysis
-
max time kernel
150s -
max time network
157s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
23-07-2024 12:00
Static task
static1
Behavioral task
behavioral1
Sample
678323b12f8ae74c7bf406efced5f476_JaffaCakes118.dll
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
678323b12f8ae74c7bf406efced5f476_JaffaCakes118.dll
Resource
win10v2004-20240709-en
General
-
Target
678323b12f8ae74c7bf406efced5f476_JaffaCakes118.dll
-
Size
5.0MB
-
MD5
678323b12f8ae74c7bf406efced5f476
-
SHA1
f9ec0e2e5a679934e18d78f7924cce8f1f324b01
-
SHA256
44533af9de63dd3fac4a9fbba9b6831496b9121eb3ce221145926c3d6b37310e
-
SHA512
f6f84783d9965318ae82547bea16289ff63910f8181ab223dc9d9dab45f55f6431c7ae9a6ee46621ee7e545db2be99d2db201a4e94d414acee1e115c4786a3ec
-
SSDEEP
98304:+DqPoBG1aRxcSUDk36SAEdhWxWa9P593R8yAVp2H:+DqPR1Cxcxk3ZAEFadzR8yc4H
Malware Config
Signatures
-
Wannacry
WannaCry is a ransomware cryptoworm.
-
Contacts a large (3361) amount of remote hosts 1 TTPs
This may indicate a network scan to discover remotely running services.
-
Executes dropped EXE 3 IoCs
pid Process 1484 mssecsvc.exe 1384 mssecsvc.exe 2836 tasksche.exe -
Creates a large amount of network flows 1 TTPs
This may indicate a network scan to discover remotely running services.
-
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\WINDOWS\tasksche.exe mssecsvc.exe File created C:\WINDOWS\mssecsvc.exe rundll32.exe -
Modifies data under HKEY_USERS 5 IoCs
description ioc Process Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ mssecsvc.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ProxyBypass = "1" mssecsvc.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\IntranetName = "1" mssecsvc.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\UNCAsIntranet = "1" mssecsvc.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\AutoDetect = "0" mssecsvc.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 908 wrote to memory of 4848 908 rundll32.exe 84 PID 908 wrote to memory of 4848 908 rundll32.exe 84 PID 908 wrote to memory of 4848 908 rundll32.exe 84 PID 4848 wrote to memory of 1484 4848 rundll32.exe 85 PID 4848 wrote to memory of 1484 4848 rundll32.exe 85 PID 4848 wrote to memory of 1484 4848 rundll32.exe 85
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\678323b12f8ae74c7bf406efced5f476_JaffaCakes118.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:908 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\678323b12f8ae74c7bf406efced5f476_JaffaCakes118.dll,#12⤵
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:4848 -
C:\WINDOWS\mssecsvc.exeC:\WINDOWS\mssecsvc.exe3⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:1484 -
C:\WINDOWS\tasksche.exeC:\WINDOWS\tasksche.exe /i4⤵
- Executes dropped EXE
PID:2836
-
-
-
-
C:\WINDOWS\mssecsvc.exeC:\WINDOWS\mssecsvc.exe -m security1⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
PID:1384
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3.6MB
MD513ef6033987c39be76b70837347cec3b
SHA163287b86bcd9486b67beae844742bae5ae17399e
SHA256cf810ce50adb1fa79ad76b2bc0d572d11e5896c2b8ca430d286b06d0e7ca379d
SHA5128cc06baca364ae9e2923938440ab3ffaa3c968b4fd56f9ef000a3177fdf31adbba30f23b9e28bd149181b47ef4c310ac3c49623ac023bb9d479d05905f2abf18
-
Filesize
3.4MB
MD5c3c3cf66c0bf945b6033c6a94f78b2c9
SHA1c8371fd0b5a9107eda3cdadd08673c17e02e3ea9
SHA2564276baeb09c9eeecc34530311b806442cba2a9c7d7f2ad2aca3aba1fe8435465
SHA5125082353dbb52bfad84fb20211b0ca209a6f6bae95d76919378d699049bf9f593188ad0c82fc790725a6b85aa007b158ca9ae4f4b307e34ac7182bed8a14424d9