Analysis
-
max time kernel
150s -
max time network
150s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
16-08-2024 16:12
Static task
static1
Behavioral task
behavioral1
Sample
9f108bcc01879026ae1dffe45e176c25_JaffaCakes118.dll
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
9f108bcc01879026ae1dffe45e176c25_JaffaCakes118.dll
Resource
win10v2004-20240802-en
General
-
Target
9f108bcc01879026ae1dffe45e176c25_JaffaCakes118.dll
-
Size
5.0MB
-
MD5
9f108bcc01879026ae1dffe45e176c25
-
SHA1
5ceace2efc67beb605291341e6e9e2909007ee49
-
SHA256
c196f82b9099ff065da7ea59000af48239cbb46fcde173fb5fe3778055aa4fb1
-
SHA512
e9a28bca9bd6af2a6a91d1e9e9844baf13ed2a6c67600b5edf906ebdcdad2f9404f420f540901191ba7bc46308710b5b61769bc62c5a27ed8d4f47c6f9eda304
-
SSDEEP
49152:znAQqMSPbcBVQej/1INRx+TSqTdX1HkQo6SAAx3R8:TDqPoBhz1aRxcSUDk36SAC3R8
Malware Config
Signatures
-
Wannacry
WannaCry is a ransomware cryptoworm.
-
Contacts a large (3323) amount of remote hosts 1 TTPs
This may indicate a network scan to discover remotely running services.
-
Executes dropped EXE 3 IoCs
pid Process 2564 mssecsvc.exe 2548 mssecsvc.exe 2556 tasksche.exe -
Creates a large amount of network flows 1 TTPs
This may indicate a network scan to discover remotely running services.
-
Drops file in System32 directory 1 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\Temporary Internet Files\counters.dat mssecsvc.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\WINDOWS\mssecsvc.exe rundll32.exe File created C:\WINDOWS\tasksche.exe mssecsvc.exe -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mssecsvc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mssecsvc.exe -
Modifies data under HKEY_USERS 24 IoCs
description ioc Process Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{7D9CDE4D-E426-4AA1-9E7B-86E16919E46A}\da-f5-e5-ed-de-fd mssecsvc.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings mssecsvc.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad mssecsvc.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{7D9CDE4D-E426-4AA1-9E7B-86E16919E46A} mssecsvc.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{7D9CDE4D-E426-4AA1-9E7B-86E16919E46A}\WpadDecisionReason = "1" mssecsvc.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{7D9CDE4D-E426-4AA1-9E7B-86E16919E46A}\WpadDecisionTime = 50d6dd0af7efda01 mssecsvc.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\DefaultConnectionSettings = 4600000003000000090000000000000000000000000000000400000000000000000000000000000000000000000000000000000001000000020000000a7f01a4000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 mssecsvc.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\da-f5-e5-ed-de-fd mssecsvc.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings mssecsvc.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections mssecsvc.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ mssecsvc.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\UNCAsIntranet = "0" mssecsvc.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Content\CachePrefix mssecsvc.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\da-f5-e5-ed-de-fd\WpadDecisionTime = 50d6dd0af7efda01 mssecsvc.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ProxyEnable = "0" mssecsvc.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Cookies\CachePrefix = "Cookie:" mssecsvc.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\History\CachePrefix = "Visited:" mssecsvc.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{7D9CDE4D-E426-4AA1-9E7B-86E16919E46A}\WpadDecision = "0" mssecsvc.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{7D9CDE4D-E426-4AA1-9E7B-86E16919E46A}\WpadNetworkName = "Network 3" mssecsvc.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\DefaultConnectionSettings = 4600000002000000090000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 mssecsvc.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\SavedLegacySettings = 4600000002000000090000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 mssecsvc.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\AutoDetect = "1" mssecsvc.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\da-f5-e5-ed-de-fd\WpadDecisionReason = "1" mssecsvc.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\da-f5-e5-ed-de-fd\WpadDecision = "0" mssecsvc.exe -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 3032 wrote to memory of 1704 3032 rundll32.exe 30 PID 3032 wrote to memory of 1704 3032 rundll32.exe 30 PID 3032 wrote to memory of 1704 3032 rundll32.exe 30 PID 3032 wrote to memory of 1704 3032 rundll32.exe 30 PID 3032 wrote to memory of 1704 3032 rundll32.exe 30 PID 3032 wrote to memory of 1704 3032 rundll32.exe 30 PID 3032 wrote to memory of 1704 3032 rundll32.exe 30 PID 1704 wrote to memory of 2564 1704 rundll32.exe 31 PID 1704 wrote to memory of 2564 1704 rundll32.exe 31 PID 1704 wrote to memory of 2564 1704 rundll32.exe 31 PID 1704 wrote to memory of 2564 1704 rundll32.exe 31
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\9f108bcc01879026ae1dffe45e176c25_JaffaCakes118.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:3032 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\9f108bcc01879026ae1dffe45e176c25_JaffaCakes118.dll,#12⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1704 -
C:\WINDOWS\mssecsvc.exeC:\WINDOWS\mssecsvc.exe3⤵
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:2564 -
C:\WINDOWS\tasksche.exeC:\WINDOWS\tasksche.exe /i4⤵
- Executes dropped EXE
PID:2556
-
-
-
-
C:\WINDOWS\mssecsvc.exeC:\WINDOWS\mssecsvc.exe -m security1⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies data under HKEY_USERS
PID:2548
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3.6MB
MD51d0eb66733df9fb587d79f7cce342216
SHA1d955467f0b6b902e085206a545ed5b9f9a0b92ff
SHA2569badbd85e7f6e70f21b1f3851952f00b8fa4b99de679c0087f56efa30244bcfe
SHA5120571d657171eabc97ec027ca2daeb9966302833a9189d0e51ad7c212b90d764353ce7d1fc114828b1cbe15b1fe5f7d47d267551b6a37bb445d101fb0d2e0c4c2
-
Filesize
3.4MB
MD5951cf84627111beb5614e239b7048ab0
SHA15bda6308a096a19f522501588a56b5d536ba6bed
SHA25628928852d3fe9190c177082000afec221bc857ad897b662802ac0e3da053b2f7
SHA5120e43f32c43a11f1ed3d6b7202471566c84de311beb37a911509e3e98174139bab4e2a930c1580b352a1e909af49ab001cfa8517963f85a26314b5b4d25513d1e