Analysis
-
max time kernel
150s -
max time network
151s -
platform
windows7_x64 -
resource
win7-20240705-en -
resource tags
arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system -
submitted
23-07-2024 15:37
Static task
static1
Behavioral task
behavioral1
Sample
682aa64b91690c7f4908f8f1412630d7_JaffaCakes118.dll
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
682aa64b91690c7f4908f8f1412630d7_JaffaCakes118.dll
Resource
win10v2004-20240709-en
General
-
Target
682aa64b91690c7f4908f8f1412630d7_JaffaCakes118.dll
-
Size
5.0MB
-
MD5
682aa64b91690c7f4908f8f1412630d7
-
SHA1
1dac4dac8fa5ec026452950acd63dfdbfeb60f8c
-
SHA256
ed6591d07ced85dc04186bd0b17b8641aaede71ccd4d1551193055f2090459f8
-
SHA512
6b693591493521a42049b333821f4fd5190cb984259e3ed33f8419ddb48322bd13204847db25124567985ee1b6d4940f3769c08d6452a9df78a8b45b676dfcf8
-
SSDEEP
49152:unNQYMSPbcBV6j/TNRxe6SAARdhnvoVv:aWYPoB4z5Rxe6SAEdhv
Malware Config
Signatures
-
Wannacry
WannaCry is a ransomware cryptoworm.
-
Contacts a large (3333) amount of remote hosts 1 TTPs
This may indicate a network scan to discover remotely running services.
-
Executes dropped EXE 3 IoCs
pid Process 1884 mssecsvr.exe 2508 mssecsvr.exe 2788 tasksche.exe -
Creates a large amount of network flows 1 TTPs
This may indicate a network scan to discover remotely running services.
-
Drops file in System32 directory 1 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\Temporary Internet Files\counters.dat mssecsvr.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\WINDOWS\mssecsvr.exe rundll32.exe File created C:\WINDOWS\tasksche.exe mssecsvr.exe -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mssecsvr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mssecsvr.exe -
Modifies data under HKEY_USERS 24 IoCs
description ioc Process Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{0A06E097-652D-4C39-9A88-75B6F918D44C}\WpadNetworkName = "Network 3" mssecsvr.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{0A06E097-652D-4C39-9A88-75B6F918D44C}\b6-4c-c6-9c-3d-3a mssecsvr.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\DefaultConnectionSettings = 4600000002000000090000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 mssecsvr.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ProxyEnable = "0" mssecsvr.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Cookies\CachePrefix = "Cookie:" mssecsvr.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{0A06E097-652D-4C39-9A88-75B6F918D44C}\WpadDecisionReason = "1" mssecsvr.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections mssecsvr.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\AutoDetect = "1" mssecsvr.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\History\CachePrefix = "Visited:" mssecsvr.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad mssecsvr.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{0A06E097-652D-4C39-9A88-75B6F918D44C}\WpadDecisionTime = d0a4db4316ddda01 mssecsvr.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\b6-4c-c6-9c-3d-3a\WpadDecisionReason = "1" mssecsvr.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings mssecsvr.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ mssecsvr.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\UNCAsIntranet = "0" mssecsvr.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Content\CachePrefix mssecsvr.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{0A06E097-652D-4C39-9A88-75B6F918D44C}\WpadDecision = "0" mssecsvr.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\b6-4c-c6-9c-3d-3a mssecsvr.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\b6-4c-c6-9c-3d-3a\WpadDecisionTime = d0a4db4316ddda01 mssecsvr.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\b6-4c-c6-9c-3d-3a\WpadDecision = "0" mssecsvr.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings mssecsvr.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\SavedLegacySettings = 4600000002000000090000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 mssecsvr.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\DefaultConnectionSettings = 4600000003000000090000000000000000000000000000000400000000000000000000000000000000000000000000000000000001000000020000000a7f007e000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 mssecsvr.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{0A06E097-652D-4C39-9A88-75B6F918D44C} mssecsvr.exe -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 448 wrote to memory of 1696 448 rundll32.exe 29 PID 448 wrote to memory of 1696 448 rundll32.exe 29 PID 448 wrote to memory of 1696 448 rundll32.exe 29 PID 448 wrote to memory of 1696 448 rundll32.exe 29 PID 448 wrote to memory of 1696 448 rundll32.exe 29 PID 448 wrote to memory of 1696 448 rundll32.exe 29 PID 448 wrote to memory of 1696 448 rundll32.exe 29 PID 1696 wrote to memory of 1884 1696 rundll32.exe 30 PID 1696 wrote to memory of 1884 1696 rundll32.exe 30 PID 1696 wrote to memory of 1884 1696 rundll32.exe 30 PID 1696 wrote to memory of 1884 1696 rundll32.exe 30
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\682aa64b91690c7f4908f8f1412630d7_JaffaCakes118.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:448 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\682aa64b91690c7f4908f8f1412630d7_JaffaCakes118.dll,#12⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1696 -
C:\WINDOWS\mssecsvr.exeC:\WINDOWS\mssecsvr.exe3⤵
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:1884 -
C:\WINDOWS\tasksche.exeC:\WINDOWS\tasksche.exe /i4⤵
- Executes dropped EXE
PID:2788
-
-
-
-
C:\WINDOWS\mssecsvr.exeC:\WINDOWS\mssecsvr.exe -m security1⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies data under HKEY_USERS
PID:2508
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3.6MB
MD50e1348bbba0c267e031edb6149c9ea5d
SHA1b2602649dff3895e11ccd2a82722d608941d7928
SHA2565f5d3280c47371a32b3b838979752ba38806c79f83b01bef23b811e57c9a7b57
SHA512d2a0c8562d9675d7d3b18f756d3940ebdeeb2b35c5ef566b081f88a1639f161791664a93c3cc6f983fdda1bc33d901406b03b8d1b68d6d66c3c885006eda3e3c
-
Filesize
3.4MB
MD5582d04ff78da5bfd311804f49be81219
SHA18141c26f7f37f0313d5906fc0a2efe5df8775197
SHA2565e45f72706f10483c079cd0a829d1b32dc92dfc977ed90420450869e3aad1d30
SHA512b81483a4db7db5b94d05db9e0f7266f3ad59d4217f0718236b345a1a217a55a35ab2655ce2b1edc3a06cbf70e4cf0008941194e8842d97abeb970afd85db5ebe