Analysis
-
max time kernel
150s -
max time network
150s -
platform
windows7_x64 -
resource
win7-20240705-en -
resource tags
arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system -
submitted
24-08-2024 04:31
Static task
static1
Behavioral task
behavioral1
Sample
bde52e2773d0acb422a7a42ef6824bc5_JaffaCakes118.dll
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
bde52e2773d0acb422a7a42ef6824bc5_JaffaCakes118.dll
Resource
win10v2004-20240802-en
General
-
Target
bde52e2773d0acb422a7a42ef6824bc5_JaffaCakes118.dll
-
Size
5.0MB
-
MD5
bde52e2773d0acb422a7a42ef6824bc5
-
SHA1
d3ec8332484ffca41295dbd7c6347b7b23a67b4e
-
SHA256
5353112eff461c51afc13af66b45c2e1c51c887357c8aaa377e711c98d25f82c
-
SHA512
1601952cfa5975d6ff40b8bbacd7f794214d5eb2f16ab3225c408142be8ff66d8a405311de461156bc7828238c405f1116b9f2e556354308ed45fc9b49429769
-
SSDEEP
49152:RnuQIEKUacBVQej/1INRx+TSqTdX1HkQo6SAARdhnv:1ZIyfBhz1aRxcSUDk36SAEdhv
Malware Config
Signatures
-
Wannacry
WannaCry is a ransomware cryptoworm.
-
Contacts a large (2110) amount of remote hosts 1 TTPs
This may indicate a network scan to discover remotely running services.
-
Executes dropped EXE 3 IoCs
pid Process 2532 mssecsvr.exe 2808 mssecsvr.exe 1592 tasksche.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\Temporary Internet Files\counters.dat mssecsvr.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\WINDOWS\mssecsvr.exe rundll32.exe File created C:\WINDOWS\tasksche.exe mssecsvr.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 2352 1592 WerFault.exe 33 -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mssecsvr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mssecsvr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tasksche.exe -
Modifies data under HKEY_USERS 24 IoCs
description ioc Process Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{CC8183F0-6DD6-4AC9-8D8B-D9F9AFE06380}\WpadDecisionTime = 80c3f17ddef5da01 mssecsvr.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{CC8183F0-6DD6-4AC9-8D8B-D9F9AFE06380}\WpadDecision = "0" mssecsvr.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings mssecsvr.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections mssecsvr.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\DefaultConnectionSettings = 4600000002000000090000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 mssecsvr.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ mssecsvr.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\AutoDetect = "1" mssecsvr.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad mssecsvr.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{CC8183F0-6DD6-4AC9-8D8B-D9F9AFE06380}\WpadNetworkName = "Network 3" mssecsvr.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{CC8183F0-6DD6-4AC9-8D8B-D9F9AFE06380}\4e-82-be-a9-dc-9b mssecsvr.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\4e-82-be-a9-dc-9b\WpadDecisionReason = "1" mssecsvr.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings mssecsvr.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ProxyEnable = "0" mssecsvr.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\UNCAsIntranet = "0" mssecsvr.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\History\CachePrefix = "Visited:" mssecsvr.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{CC8183F0-6DD6-4AC9-8D8B-D9F9AFE06380} mssecsvr.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\4e-82-be-a9-dc-9b mssecsvr.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\4e-82-be-a9-dc-9b\WpadDecision = "0" mssecsvr.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\SavedLegacySettings = 4600000002000000090000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 mssecsvr.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Content\CachePrefix mssecsvr.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Cookies\CachePrefix = "Cookie:" mssecsvr.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\DefaultConnectionSettings = 4600000003000000090000000000000000000000000000000400000000000000000000000000000000000000000000000000000001000000020000000a7f0074000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 mssecsvr.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{CC8183F0-6DD6-4AC9-8D8B-D9F9AFE06380}\WpadDecisionReason = "1" mssecsvr.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\4e-82-be-a9-dc-9b\WpadDecisionTime = 80c3f17ddef5da01 mssecsvr.exe -
Suspicious use of WriteProcessMemory 25 IoCs
description pid Process procid_target PID 1820 wrote to memory of 2128 1820 rundll32.exe 29 PID 1820 wrote to memory of 2128 1820 rundll32.exe 29 PID 1820 wrote to memory of 2128 1820 rundll32.exe 29 PID 1820 wrote to memory of 2128 1820 rundll32.exe 29 PID 1820 wrote to memory of 2128 1820 rundll32.exe 29 PID 1820 wrote to memory of 2128 1820 rundll32.exe 29 PID 1820 wrote to memory of 2128 1820 rundll32.exe 29 PID 2128 wrote to memory of 2532 2128 rundll32.exe 30 PID 2128 wrote to memory of 2532 2128 rundll32.exe 30 PID 2128 wrote to memory of 2532 2128 rundll32.exe 30 PID 2128 wrote to memory of 2532 2128 rundll32.exe 30 PID 2532 wrote to memory of 1592 2532 mssecsvr.exe 33 PID 2532 wrote to memory of 1592 2532 mssecsvr.exe 33 PID 2532 wrote to memory of 1592 2532 mssecsvr.exe 33 PID 2532 wrote to memory of 1592 2532 mssecsvr.exe 33 PID 2532 wrote to memory of 1592 2532 mssecsvr.exe 33 PID 2532 wrote to memory of 1592 2532 mssecsvr.exe 33 PID 2532 wrote to memory of 1592 2532 mssecsvr.exe 33 PID 1592 wrote to memory of 2352 1592 tasksche.exe 34 PID 1592 wrote to memory of 2352 1592 tasksche.exe 34 PID 1592 wrote to memory of 2352 1592 tasksche.exe 34 PID 1592 wrote to memory of 2352 1592 tasksche.exe 34 PID 1592 wrote to memory of 2352 1592 tasksche.exe 34 PID 1592 wrote to memory of 2352 1592 tasksche.exe 34 PID 1592 wrote to memory of 2352 1592 tasksche.exe 34
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\bde52e2773d0acb422a7a42ef6824bc5_JaffaCakes118.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1820 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\bde52e2773d0acb422a7a42ef6824bc5_JaffaCakes118.dll,#12⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2128 -
C:\WINDOWS\mssecsvr.exeC:\WINDOWS\mssecsvr.exe3⤵
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2532 -
C:\WINDOWS\tasksche.exeC:\WINDOWS\tasksche.exe /i4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1592 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1592 -s 2245⤵
- Program crash
PID:2352
-
-
-
-
-
C:\WINDOWS\mssecsvr.exeC:\WINDOWS\mssecsvr.exe -m security1⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies data under HKEY_USERS
PID:2808
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2.0MB
MD53ae241cb9b4ceffbdae2f3c40d023f6a
SHA1f3051e6981ea651e9af3c4fd8e838a743bb31237
SHA2564da1d893eae81bf30e25bdc6498a614cbebe4d42ac150d9d0e257d8893e19ab7
SHA512458440bbd129e4a66d09100da998de70313c50297cb26a45204f3e8d4c4367405a67928e41bf346b8a6b238020ff49aab8f9826dc020bbd35cb32674cf409053
-
Filesize
2.2MB
MD56d5d32d747fdc6a5521fa3a6d07b328a
SHA1a6aab7d94637044ce562e67ea45e9ad0e9d86545
SHA2565ba58aaa4953dd66856d718d401b68c9ddd399143f85b6d28ac98960aa1d127d
SHA512c91f3330cef16f45415cd839f0b02131588081eb81db190d7297682d7f4258d1fa96558cd4972ba74051499aedce1c93b188a428076c85a60f508be7ddc4b722