Analysis
-
max time kernel
150s -
max time network
150s -
platform
windows7_x64 -
resource
win7-20240705-en -
resource tags
arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system -
submitted
16-08-2024 06:43
Static task
static1
Behavioral task
behavioral1
Sample
9d535224a4285b9212d072937ac2e29f_JaffaCakes118.dll
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
9d535224a4285b9212d072937ac2e29f_JaffaCakes118.dll
Resource
win10v2004-20240802-en
General
-
Target
9d535224a4285b9212d072937ac2e29f_JaffaCakes118.dll
-
Size
5.0MB
-
MD5
9d535224a4285b9212d072937ac2e29f
-
SHA1
7f144c71d63f454af927f8e5f32fe23efde94da1
-
SHA256
72ff7d5e4d5f12cc32f77733334283711e38e0f319c47ca4218567bbf9a0bce6
-
SHA512
74d319e5def0f1fdc286b4c97303fc439770e24ca855009f4bc7c288fb6b4b94a7beb26b9f741e199dcd812d5d9dd14d3d5d85046ca4fd1ccbf6da2b3ad0d727
-
SSDEEP
12288:yebLgPlu+QhMbaIMu7L5NVErCA4z2g5o:zbLgddQhfdmMSxo
Malware Config
Signatures
-
Wannacry
WannaCry is a ransomware cryptoworm.
-
Contacts a large (3080) amount of remote hosts 1 TTPs
This may indicate a network scan to discover remotely running services.
-
Executes dropped EXE 3 IoCs
pid Process 2912 mssecsvc.exe 1692 mssecsvc.exe 2748 tasksche.exe -
Creates a large amount of network flows 1 TTPs
This may indicate a network scan to discover remotely running services.
-
Drops file in System32 directory 1 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\Temporary Internet Files\counters.dat mssecsvc.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\WINDOWS\mssecsvc.exe rundll32.exe File created C:\WINDOWS\tasksche.exe mssecsvc.exe -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mssecsvc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mssecsvc.exe -
Modifies data under HKEY_USERS 24 IoCs
description ioc Process Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections mssecsvc.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\UNCAsIntranet = "0" mssecsvc.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings mssecsvc.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings mssecsvc.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ mssecsvc.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Content\CachePrefix mssecsvc.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\History\CachePrefix = "Visited:" mssecsvc.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{2E9013BF-76E8-4A26-9684-F1ABA730D101}\WpadNetworkName = "Network 3" mssecsvc.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\42-93-08-10-82-ed\WpadDecisionReason = "1" mssecsvc.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\42-93-08-10-82-ed\WpadDecisionTime = 206146a1a7efda01 mssecsvc.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\DefaultConnectionSettings = 4600000002000000090000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 mssecsvc.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ProxyEnable = "0" mssecsvc.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\SavedLegacySettings = 4600000002000000090000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 mssecsvc.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\AutoDetect = "1" mssecsvc.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Cookies\CachePrefix = "Cookie:" mssecsvc.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\DefaultConnectionSettings = 4600000003000000090000000000000000000000000000000400000000000000000000000000000000000000000000000000000001000000020000000a7f00b3000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 mssecsvc.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{2E9013BF-76E8-4A26-9684-F1ABA730D101} mssecsvc.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{2E9013BF-76E8-4A26-9684-F1ABA730D101}\WpadDecisionReason = "1" mssecsvc.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad mssecsvc.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{2E9013BF-76E8-4A26-9684-F1ABA730D101}\WpadDecisionTime = 206146a1a7efda01 mssecsvc.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{2E9013BF-76E8-4A26-9684-F1ABA730D101}\WpadDecision = "0" mssecsvc.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\42-93-08-10-82-ed mssecsvc.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{2E9013BF-76E8-4A26-9684-F1ABA730D101}\42-93-08-10-82-ed mssecsvc.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\42-93-08-10-82-ed\WpadDecision = "0" mssecsvc.exe -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 3044 wrote to memory of 3040 3044 rundll32.exe 30 PID 3044 wrote to memory of 3040 3044 rundll32.exe 30 PID 3044 wrote to memory of 3040 3044 rundll32.exe 30 PID 3044 wrote to memory of 3040 3044 rundll32.exe 30 PID 3044 wrote to memory of 3040 3044 rundll32.exe 30 PID 3044 wrote to memory of 3040 3044 rundll32.exe 30 PID 3044 wrote to memory of 3040 3044 rundll32.exe 30 PID 3040 wrote to memory of 2912 3040 rundll32.exe 31 PID 3040 wrote to memory of 2912 3040 rundll32.exe 31 PID 3040 wrote to memory of 2912 3040 rundll32.exe 31 PID 3040 wrote to memory of 2912 3040 rundll32.exe 31
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\9d535224a4285b9212d072937ac2e29f_JaffaCakes118.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:3044 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\9d535224a4285b9212d072937ac2e29f_JaffaCakes118.dll,#12⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3040 -
C:\WINDOWS\mssecsvc.exeC:\WINDOWS\mssecsvc.exe3⤵
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:2912 -
C:\WINDOWS\tasksche.exeC:\WINDOWS\tasksche.exe /i4⤵
- Executes dropped EXE
PID:2748
-
-
-
-
C:\WINDOWS\mssecsvc.exeC:\WINDOWS\mssecsvc.exe -m security1⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies data under HKEY_USERS
PID:1692
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3.6MB
MD5cea956121b2298dee8a34651fca1d90d
SHA1f162b03dd73356c71f2130e8911edf94bab38568
SHA256c936b61077ceab4c20b600d590596ffb8a0536e3f8235347b16c9cf971c31ac7
SHA512510488f17053c29c30dab7b8146f21237c8f688079a5dcf2cd56af427be293c74f42502fdee5bcbe1a81712d611eccb103bab50288599e95bfd81f46d098d31e
-
Filesize
3.4MB
MD5f091b50180ae630a5aa6b5ed88c39afa
SHA19be32beb975fa08e3c2dde564d8a9b103837dc7c
SHA256881b2b7fae737dc9e719835e3d4581ccef7a825c825811837933bcda99528eab
SHA51227ed1f31c7e4ff23dfa4ac0d4a7d6ef9d91b902dfa18fb20b2f27ab19f8151d4f5d8b919ce1b74640e7fc3692ec204d7e4f95c1e6f8c81feb90d224e834930a2