Analysis
-
max time kernel
150s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
24-07-2024 10:57
Static task
static1
Behavioral task
behavioral1
Sample
6b5a9da099c8dd5b63a63c01c0256210_JaffaCakes118.dll
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
6b5a9da099c8dd5b63a63c01c0256210_JaffaCakes118.dll
Resource
win10v2004-20240709-en
General
-
Target
6b5a9da099c8dd5b63a63c01c0256210_JaffaCakes118.dll
-
Size
5.0MB
-
MD5
6b5a9da099c8dd5b63a63c01c0256210
-
SHA1
6cf798c80bff0d7131b26a3d3c6b8a69fdf6d5b1
-
SHA256
67787992efdeba0523cd2d4d2a61903473e74430ee8e82b25d55fe1ed7001440
-
SHA512
778d8b974a966e1399ab428407426a9db31a45f8bee954f1d530d4e4b8936623475e3d1e57a6bab5ef5ecf55613147964969d5533a67d1a2a1d0becc968ed6de
-
SSDEEP
98304:gzqPoBhUk36SAEdhvxWa9P593R8yAVp2H:gzqP3k3ZAEUadzR8yc4H
Malware Config
Signatures
-
Wannacry
WannaCry is a ransomware cryptoworm.
-
Contacts a large (3286) amount of remote hosts 1 TTPs
This may indicate a network scan to discover remotely running services.
-
Executes dropped EXE 3 IoCs
pid Process 4932 mssecsvc.exe 3688 mssecsvc.exe 264 tasksche.exe -
Creates a large amount of network flows 1 TTPs
This may indicate a network scan to discover remotely running services.
-
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\WINDOWS\mssecsvc.exe rundll32.exe File created C:\WINDOWS\tasksche.exe mssecsvc.exe -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mssecsvc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mssecsvc.exe -
Modifies data under HKEY_USERS 5 IoCs
description ioc Process Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ mssecsvc.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ProxyBypass = "1" mssecsvc.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\IntranetName = "1" mssecsvc.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\UNCAsIntranet = "1" mssecsvc.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\AutoDetect = "0" mssecsvc.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 2036 wrote to memory of 5020 2036 rundll32.exe 84 PID 2036 wrote to memory of 5020 2036 rundll32.exe 84 PID 2036 wrote to memory of 5020 2036 rundll32.exe 84 PID 5020 wrote to memory of 4932 5020 rundll32.exe 85 PID 5020 wrote to memory of 4932 5020 rundll32.exe 85 PID 5020 wrote to memory of 4932 5020 rundll32.exe 85
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\6b5a9da099c8dd5b63a63c01c0256210_JaffaCakes118.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:2036 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\6b5a9da099c8dd5b63a63c01c0256210_JaffaCakes118.dll,#12⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:5020 -
C:\WINDOWS\mssecsvc.exeC:\WINDOWS\mssecsvc.exe3⤵
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:4932 -
C:\WINDOWS\tasksche.exeC:\WINDOWS\tasksche.exe /i4⤵
- Executes dropped EXE
PID:264
-
-
-
-
C:\WINDOWS\mssecsvc.exeC:\WINDOWS\mssecsvc.exe -m security1⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Modifies data under HKEY_USERS
PID:3688
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3.6MB
MD5eee8dcd12e35775eacc7caf6f9c2b4c7
SHA1b5992bfe525d48a0961c41e95805e54eb65145ce
SHA2560fd0d5ebe1e299daafa691813be11f40fd96b8854e5202a19915e368d38b12c1
SHA512182667c5ec86de18ec7734cfc09a168e3ec507378274f35f75b9d383c18f652262174b57a4d96c8d33c0ed55f2534ddebd9d688cffd978de623195a4b62992e8
-
Filesize
3.4MB
MD51b48bb988a50928320efb614414eb5af
SHA1a7edff99f3e444ef80622552c017a76a928393c1
SHA256e014a1d3362c38258759c5b3cfb7bfad82c12b489c85c98ac1165ceca83ffe90
SHA512aeb5c5b734523c6d70838c58de8f65c15049f9feda462ec24df939b9b42fd6b125a95f1e83e2d5770831a213c76cc09658bd4586f57ad972e1426a3ef8c5fd71