Analysis
-
max time kernel
150s -
max time network
156s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
23-08-2024 01:38
Static task
static1
Behavioral task
behavioral1
Sample
b9de290ef3ec191950f0550cf6d14a6f_JaffaCakes118.dll
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
b9de290ef3ec191950f0550cf6d14a6f_JaffaCakes118.dll
Resource
win10v2004-20240802-en
General
-
Target
b9de290ef3ec191950f0550cf6d14a6f_JaffaCakes118.dll
-
Size
5.0MB
-
MD5
b9de290ef3ec191950f0550cf6d14a6f
-
SHA1
8926858b8703c0a303284ce5d8ae587e42c67324
-
SHA256
4f8b2591ae22c8cadaee061e46e6ad93f8912a06319b7454e19e85893fc7929e
-
SHA512
692178874f56991ec7c3970adc05df836c9786b51646aaa651ab1163d75864f188146c92209ba3417c143d9c0b0c7a7bf922b1b9b53c815f2abc2c764558bb2a
-
SSDEEP
49152:JnjJMSPbcBb/1INRx+TSqTdX1HkQo6SAARdhpk3R8yAH1plA:ddPoBL1aRxcSUDk36SAEdh+3R8yAVp2
Malware Config
Signatures
-
Wannacry
WannaCry is a ransomware cryptoworm.
-
Contacts a large (2998) amount of remote hosts 1 TTPs
This may indicate a network scan to discover remotely running services.
-
Executes dropped EXE 3 IoCs
pid Process 2952 mssecsvc.exe 2824 mssecsvc.exe 2788 tasksche.exe -
Creates a large amount of network flows 1 TTPs
This may indicate a network scan to discover remotely running services.
-
Drops file in System32 directory 1 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\Temporary Internet Files\counters.dat mssecsvc.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\WINDOWS\mssecsvc.exe rundll32.exe File created C:\WINDOWS\tasksche.exe mssecsvc.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 2640 2788 WerFault.exe 32 -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tasksche.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mssecsvc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mssecsvc.exe -
Modifies data under HKEY_USERS 1 IoCs
description ioc Process Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings mssecsvc.exe -
Suspicious use of WriteProcessMemory 19 IoCs
description pid Process procid_target PID 1732 wrote to memory of 2408 1732 rundll32.exe 29 PID 1732 wrote to memory of 2408 1732 rundll32.exe 29 PID 1732 wrote to memory of 2408 1732 rundll32.exe 29 PID 1732 wrote to memory of 2408 1732 rundll32.exe 29 PID 1732 wrote to memory of 2408 1732 rundll32.exe 29 PID 1732 wrote to memory of 2408 1732 rundll32.exe 29 PID 1732 wrote to memory of 2408 1732 rundll32.exe 29 PID 2408 wrote to memory of 2952 2408 rundll32.exe 30 PID 2408 wrote to memory of 2952 2408 rundll32.exe 30 PID 2408 wrote to memory of 2952 2408 rundll32.exe 30 PID 2408 wrote to memory of 2952 2408 rundll32.exe 30 PID 2952 wrote to memory of 2788 2952 mssecsvc.exe 32 PID 2952 wrote to memory of 2788 2952 mssecsvc.exe 32 PID 2952 wrote to memory of 2788 2952 mssecsvc.exe 32 PID 2952 wrote to memory of 2788 2952 mssecsvc.exe 32 PID 2788 wrote to memory of 2640 2788 tasksche.exe 33 PID 2788 wrote to memory of 2640 2788 tasksche.exe 33 PID 2788 wrote to memory of 2640 2788 tasksche.exe 33 PID 2788 wrote to memory of 2640 2788 tasksche.exe 33
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\b9de290ef3ec191950f0550cf6d14a6f_JaffaCakes118.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1732 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\b9de290ef3ec191950f0550cf6d14a6f_JaffaCakes118.dll,#12⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2408 -
C:\WINDOWS\mssecsvc.exeC:\WINDOWS\mssecsvc.exe3⤵
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2952 -
C:\WINDOWS\tasksche.exeC:\WINDOWS\tasksche.exe /i4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2788 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2788 -s 365⤵
- Program crash
PID:2640
-
-
-
-
-
C:\WINDOWS\mssecsvc.exeC:\WINDOWS\mssecsvc.exe -m security1⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies data under HKEY_USERS
PID:2824
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3.6MB
MD578f8bf2607bd58232157b444a11f1b14
SHA15d82908aa114e962d48cab4ce0485740a7f27a2e
SHA2563309eca5ad0c78fe84377bd3d30627d7f969e6542012e97a53b5dc9ed1d2f227
SHA51240197feda797b70647716f13099a8c3993c36c0f10ee2c0215144a11fe4af1cdce0a5775b03454889ab2e17cf8c8f6da6e47eb4024393c2db536778e84546acd
-
Filesize
3.4MB
MD50d4019652b4a71bdfb941fe4a4b57eac
SHA1674108e9ccd4d5ad28696a4d2d291822a07acdbb
SHA25635e8518bd85fbef05aaf095984e0ca658595c3878c6b13dbd1ec6eab8dc64860
SHA512b0e59c9463bad0b63e5a6bc4a09d00a0d92617e7be651c7ec5eedef06c53274f294d87da1471b3201f3cd88a7f10c5cb5b5ac019e664a08d0007d3e7dec3dd22