Analysis
-
max time kernel
150s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
20-08-2024 17:11
Static task
static1
Behavioral task
behavioral1
Sample
b01b4dbaeab5353347d09642c0454cef_JaffaCakes118.dll
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
b01b4dbaeab5353347d09642c0454cef_JaffaCakes118.dll
Resource
win10v2004-20240802-en
General
-
Target
b01b4dbaeab5353347d09642c0454cef_JaffaCakes118.dll
-
Size
5.0MB
-
MD5
b01b4dbaeab5353347d09642c0454cef
-
SHA1
bb043b2adbdb267e4b526c6428cf5eef5111015c
-
SHA256
115e716481945844a24a4c4e21cec431792bffcb2bb6a05728e829742ba9bcf6
-
SHA512
e6483b7a2e65a7e9766ed2d2bee35d44bde6c3e917e26eb1b19e837730d9189f214c75765511a4db6b9d769f1edea7943ffe9d4b65b3159139f1be177b838c2c
-
SSDEEP
12288:yvbLgPlu+QhMbaIMu7L5NVErCA4z2g6rTcbckPM82900Ve7zw+K+DHeQYSUjEXFO:SbLgddQhfdmMSirYbcMNgef0QeQjG
Malware Config
Signatures
-
Wannacry
WannaCry is a ransomware cryptoworm.
-
Contacts a large (3169) amount of remote hosts 1 TTPs
This may indicate a network scan to discover remotely running services.
-
Executes dropped EXE 3 IoCs
pid Process 3352 mssecsvc.exe 4984 mssecsvc.exe 2016 tasksche.exe -
Creates a large amount of network flows 1 TTPs
This may indicate a network scan to discover remotely running services.
-
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\WINDOWS\tasksche.exe mssecsvc.exe File created C:\WINDOWS\mssecsvc.exe rundll32.exe -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mssecsvc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mssecsvc.exe -
Modifies data under HKEY_USERS 5 IoCs
description ioc Process Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\UNCAsIntranet = "1" mssecsvc.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\AutoDetect = "0" mssecsvc.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ mssecsvc.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ProxyBypass = "1" mssecsvc.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\IntranetName = "1" mssecsvc.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 4396 wrote to memory of 1680 4396 rundll32.exe 84 PID 4396 wrote to memory of 1680 4396 rundll32.exe 84 PID 4396 wrote to memory of 1680 4396 rundll32.exe 84 PID 1680 wrote to memory of 3352 1680 rundll32.exe 85 PID 1680 wrote to memory of 3352 1680 rundll32.exe 85 PID 1680 wrote to memory of 3352 1680 rundll32.exe 85
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\b01b4dbaeab5353347d09642c0454cef_JaffaCakes118.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:4396 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\b01b4dbaeab5353347d09642c0454cef_JaffaCakes118.dll,#12⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1680 -
C:\WINDOWS\mssecsvc.exeC:\WINDOWS\mssecsvc.exe3⤵
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:3352 -
C:\WINDOWS\tasksche.exeC:\WINDOWS\tasksche.exe /i4⤵
- Executes dropped EXE
PID:2016
-
-
-
-
C:\WINDOWS\mssecsvc.exeC:\WINDOWS\mssecsvc.exe -m security1⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Modifies data under HKEY_USERS
PID:4984
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3.6MB
MD5a2882ae67399ca859277cffe04f10e18
SHA1bcf6c6af164e1256c6ed0e09d11debf650b1298b
SHA25638e92b0cef95213f72af2eefec010810580ffed19e2c77beaa5d3a52da4b5fc6
SHA5122319f3cbc57b4aecb51c8940a12ad0785591507f19148a81a902a4ff1daac8d53acb730a55165332f08d7cdb1edd535531874708ae14d005bd50122f11db4e3d
-
Filesize
3.4MB
MD5e19f8cb58ceede7d421a4bd320109dea
SHA17ba8a6e8cde8242a25a0da60bdeca1f3ec0bf5e5
SHA2566e1a97463dbcf36e2cd74678e7f2626f2516ecd0831ac2eaddd1fcaead58eea4
SHA5123a0a52cf2367371bab0d3fee28ee4ac3da0b5621361455a4d6f76f252b26181222ae884782f333b1e4f825b6c1d1aaf0a9ab49a52a585672859546e58f076aea