Analysis
-
max time kernel
150s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
23-08-2024 01:38
Static task
static1
Behavioral task
behavioral1
Sample
b9de290ef3ec191950f0550cf6d14a6f_JaffaCakes118.dll
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
b9de290ef3ec191950f0550cf6d14a6f_JaffaCakes118.dll
Resource
win10v2004-20240802-en
General
-
Target
b9de290ef3ec191950f0550cf6d14a6f_JaffaCakes118.dll
-
Size
5.0MB
-
MD5
b9de290ef3ec191950f0550cf6d14a6f
-
SHA1
8926858b8703c0a303284ce5d8ae587e42c67324
-
SHA256
4f8b2591ae22c8cadaee061e46e6ad93f8912a06319b7454e19e85893fc7929e
-
SHA512
692178874f56991ec7c3970adc05df836c9786b51646aaa651ab1163d75864f188146c92209ba3417c143d9c0b0c7a7bf922b1b9b53c815f2abc2c764558bb2a
-
SSDEEP
49152:JnjJMSPbcBb/1INRx+TSqTdX1HkQo6SAARdhpk3R8yAH1plA:ddPoBL1aRxcSUDk36SAEdh+3R8yAVp2
Malware Config
Signatures
-
Wannacry
WannaCry is a ransomware cryptoworm.
-
Contacts a large (3303) amount of remote hosts 1 TTPs
This may indicate a network scan to discover remotely running services.
-
Executes dropped EXE 3 IoCs
pid Process 3608 mssecsvc.exe 2256 mssecsvc.exe 2244 tasksche.exe -
Creates a large amount of network flows 1 TTPs
This may indicate a network scan to discover remotely running services.
-
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\WINDOWS\mssecsvc.exe rundll32.exe File created C:\WINDOWS\tasksche.exe mssecsvc.exe -
Program crash 2 IoCs
pid pid_target Process procid_target 5004 2244 WerFault.exe 91 1576 2244 WerFault.exe 91 -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mssecsvc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mssecsvc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tasksche.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 3400 wrote to memory of 2544 3400 rundll32.exe 86 PID 3400 wrote to memory of 2544 3400 rundll32.exe 86 PID 3400 wrote to memory of 2544 3400 rundll32.exe 86 PID 2544 wrote to memory of 3608 2544 rundll32.exe 87 PID 2544 wrote to memory of 3608 2544 rundll32.exe 87 PID 2544 wrote to memory of 3608 2544 rundll32.exe 87 PID 3608 wrote to memory of 2244 3608 mssecsvc.exe 91 PID 3608 wrote to memory of 2244 3608 mssecsvc.exe 91 PID 3608 wrote to memory of 2244 3608 mssecsvc.exe 91
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\b9de290ef3ec191950f0550cf6d14a6f_JaffaCakes118.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:3400 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\b9de290ef3ec191950f0550cf6d14a6f_JaffaCakes118.dll,#12⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2544 -
C:\WINDOWS\mssecsvc.exeC:\WINDOWS\mssecsvc.exe3⤵
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3608 -
C:\WINDOWS\tasksche.exeC:\WINDOWS\tasksche.exe /i4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2244 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2244 -s 2205⤵
- Program crash
PID:5004
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2244 -s 2245⤵
- Program crash
PID:1576
-
-
-
-
-
C:\WINDOWS\mssecsvc.exeC:\WINDOWS\mssecsvc.exe -m security1⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2256
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 2244 -ip 22441⤵PID:2528
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 516 -p 2244 -ip 22441⤵PID:3312
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3.4MB
MD50d4019652b4a71bdfb941fe4a4b57eac
SHA1674108e9ccd4d5ad28696a4d2d291822a07acdbb
SHA25635e8518bd85fbef05aaf095984e0ca658595c3878c6b13dbd1ec6eab8dc64860
SHA512b0e59c9463bad0b63e5a6bc4a09d00a0d92617e7be651c7ec5eedef06c53274f294d87da1471b3201f3cd88a7f10c5cb5b5ac019e664a08d0007d3e7dec3dd22
-
Filesize
3.6MB
MD578f8bf2607bd58232157b444a11f1b14
SHA15d82908aa114e962d48cab4ce0485740a7f27a2e
SHA2563309eca5ad0c78fe84377bd3d30627d7f969e6542012e97a53b5dc9ed1d2f227
SHA51240197feda797b70647716f13099a8c3993c36c0f10ee2c0215144a11fe4af1cdce0a5775b03454889ab2e17cf8c8f6da6e47eb4024393c2db536778e84546acd