Analysis
-
max time kernel
150s -
max time network
152s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
24-08-2024 12:57
Static task
static1
Behavioral task
behavioral1
Sample
bea2c7b2a054321b99b855abaa7ede8f_JaffaCakes118.dll
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
bea2c7b2a054321b99b855abaa7ede8f_JaffaCakes118.dll
Resource
win10v2004-20240802-en
General
-
Target
bea2c7b2a054321b99b855abaa7ede8f_JaffaCakes118.dll
-
Size
5.0MB
-
MD5
bea2c7b2a054321b99b855abaa7ede8f
-
SHA1
55bb7148586969fdd2be6b94ab3846937d88623e
-
SHA256
a735ae0e3018c7098d998c17ad5f01d0ddb72edfa754a9e9ddd1a70c2f095c97
-
SHA512
2f0d3c70edef83e4bf0597e107000be68c554be2010e436bd4c0916cd375060b01508434e30844261098b28c517a97636adb71a70d2eaffb052f9011c2dce5c8
-
SSDEEP
24576:RbLguriIfEcQdIvrYbcMNgef0QeQjG/D8kIqRYoAda6626WgkQg6eX6SASk+Rdhv:RnpEjbcBVQej/1Il6kQo6SAARdhnv
Malware Config
Signatures
-
Wannacry
WannaCry is a ransomware cryptoworm.
-
Contacts a large (2087) amount of remote hosts 1 TTPs
This may indicate a network scan to discover remotely running services.
-
Executes dropped EXE 3 IoCs
pid Process 1988 mssecsvr.exe 2592 mssecsvr.exe 2196 tasksche.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\Temporary Internet Files\counters.dat mssecsvr.exe -
Drops file in Windows directory 4 IoCs
description ioc Process File created C:\WINDOWS\mssecsvr.exe rundll32.exe File created C:\WINDOWS\tasksche.exe mssecsvr.exe File created C:\Windows\__tmp_rar_sfx_access_check_259500799 tasksche.exe File created C:\Windows\eee.exe tasksche.exe -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tasksche.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mssecsvr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mssecsvr.exe -
Modifies data under HKEY_USERS 24 IoCs
description ioc Process Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\DefaultConnectionSettings = 4600000003000000090000000000000000000000000000000400000000000000000000000000000000000000000000000000000001000000020000000a7f018a000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 mssecsvr.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{1EAC05C4-E3A0-4562-AE33-B51979D4EF2E}\WpadDecisionReason = "1" mssecsvr.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\fe-36-61-07-cf-2c\WpadDecision = "0" mssecsvr.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\UNCAsIntranet = "0" mssecsvr.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Content\CachePrefix mssecsvr.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Cookies\CachePrefix = "Cookie:" mssecsvr.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings mssecsvr.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings mssecsvr.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ProxyEnable = "0" mssecsvr.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\SavedLegacySettings = 4600000002000000090000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 mssecsvr.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ mssecsvr.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad mssecsvr.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{1EAC05C4-E3A0-4562-AE33-B51979D4EF2E}\WpadDecision = "0" mssecsvr.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\DefaultConnectionSettings = 4600000002000000090000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 mssecsvr.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{1EAC05C4-E3A0-4562-AE33-B51979D4EF2E} mssecsvr.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{1EAC05C4-E3A0-4562-AE33-B51979D4EF2E}\WpadDecisionTime = 604e963b25f6da01 mssecsvr.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{1EAC05C4-E3A0-4562-AE33-B51979D4EF2E}\WpadNetworkName = "Network 3" mssecsvr.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\fe-36-61-07-cf-2c\WpadDecisionTime = 604e963b25f6da01 mssecsvr.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\fe-36-61-07-cf-2c\WpadDecisionReason = "1" mssecsvr.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections mssecsvr.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\AutoDetect = "1" mssecsvr.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\History\CachePrefix = "Visited:" mssecsvr.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\fe-36-61-07-cf-2c mssecsvr.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{1EAC05C4-E3A0-4562-AE33-B51979D4EF2E}\fe-36-61-07-cf-2c mssecsvr.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2196 tasksche.exe -
Suspicious use of WriteProcessMemory 18 IoCs
description pid Process procid_target PID 2084 wrote to memory of 2640 2084 rundll32.exe 30 PID 2084 wrote to memory of 2640 2084 rundll32.exe 30 PID 2084 wrote to memory of 2640 2084 rundll32.exe 30 PID 2084 wrote to memory of 2640 2084 rundll32.exe 30 PID 2084 wrote to memory of 2640 2084 rundll32.exe 30 PID 2084 wrote to memory of 2640 2084 rundll32.exe 30 PID 2084 wrote to memory of 2640 2084 rundll32.exe 30 PID 2640 wrote to memory of 1988 2640 rundll32.exe 31 PID 2640 wrote to memory of 1988 2640 rundll32.exe 31 PID 2640 wrote to memory of 1988 2640 rundll32.exe 31 PID 2640 wrote to memory of 1988 2640 rundll32.exe 31 PID 1988 wrote to memory of 2196 1988 mssecsvr.exe 34 PID 1988 wrote to memory of 2196 1988 mssecsvr.exe 34 PID 1988 wrote to memory of 2196 1988 mssecsvr.exe 34 PID 1988 wrote to memory of 2196 1988 mssecsvr.exe 34 PID 1988 wrote to memory of 2196 1988 mssecsvr.exe 34 PID 1988 wrote to memory of 2196 1988 mssecsvr.exe 34 PID 1988 wrote to memory of 2196 1988 mssecsvr.exe 34
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\bea2c7b2a054321b99b855abaa7ede8f_JaffaCakes118.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:2084 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\bea2c7b2a054321b99b855abaa7ede8f_JaffaCakes118.dll,#12⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2640 -
C:\WINDOWS\mssecsvr.exeC:\WINDOWS\mssecsvr.exe3⤵
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1988 -
C:\WINDOWS\tasksche.exeC:\WINDOWS\tasksche.exe /i4⤵
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: GetForegroundWindowSpam
PID:2196
-
-
-
-
C:\WINDOWS\mssecsvr.exeC:\WINDOWS\mssecsvr.exe -m security1⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies data under HKEY_USERS
PID:2592
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2.2MB
MD5d5807bba032a43cefb7395db67815b92
SHA116fd39c70c5bc03ffb413791fe557442efd5d20f
SHA25650b2154a7a32c24a4e1527c8f5ad13b59714669f76fbb8c4b06ef639ca10386a
SHA5129c7b90604392dac65562a91b8c3b852bbdce8bf1f6a08e06d873e76460fad2ace665f32d58b2598a13356bda53a1f2b65845107e0e24c28807075d074d743a2c
-
Filesize
2.0MB
MD5360eacd6ecc8bcf9d8be365359a4015a
SHA1543e07d13c23ffc47473cc44662b4f68f7c89422
SHA256333a8fce65282a63680b96b5421265c8e04497b1944612cb8d2e7418aca71aac
SHA5126c25aae097f1d0e42b7cf665f95985f4d519b35341fbebd1d57d8d13c027078351677e1a74b3f764363a2efffa33d72e5d5197892b9e5f0a40a346d2ba0ea977