Analysis
-
max time kernel
150s -
max time network
152s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
24-08-2024 15:39
Static task
static1
Behavioral task
behavioral1
Sample
bee90d14c6577c4a6c4e635fd1887c83_JaffaCakes118.dll
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
bee90d14c6577c4a6c4e635fd1887c83_JaffaCakes118.dll
Resource
win10v2004-20240802-en
General
-
Target
bee90d14c6577c4a6c4e635fd1887c83_JaffaCakes118.dll
-
Size
5.0MB
-
MD5
bee90d14c6577c4a6c4e635fd1887c83
-
SHA1
2b0e108ff1ed5037d1b400fedee80c5932c36f35
-
SHA256
17b57dae29ccc12e13895642b8d5ad50d4fa5442acd2a6bd7c5577670336b5fd
-
SHA512
21f7e39e121d571fdda03cef603d21cd070ba52b202268eb9020baef747faa50f21f5ad441f44cfb791a064a5057cbfd87b408a676c882a8e8d1bc267f519e84
-
SSDEEP
98304:+DqPoBhz1aRxcSUDk36SAEdhvxWa9F593R8yAVp2H:+DqPe1Cxcxk3ZAEUa7zR8yc4H
Malware Config
Signatures
-
Wannacry
WannaCry is a ransomware cryptoworm.
-
Contacts a large (3321) amount of remote hosts 1 TTPs
This may indicate a network scan to discover remotely running services.
-
Executes dropped EXE 3 IoCs
pid Process 1628 mssecsvc.exe 2700 mssecsvc.exe 2780 tasksche.exe -
Creates a large amount of network flows 1 TTPs
This may indicate a network scan to discover remotely running services.
-
Drops file in System32 directory 1 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\Temporary Internet Files\counters.dat mssecsvc.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\WINDOWS\mssecsvc.exe rundll32.exe File created C:\WINDOWS\tasksche.exe mssecsvc.exe -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mssecsvc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mssecsvc.exe -
Modifies data under HKEY_USERS 24 IoCs
description ioc Process Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings mssecsvc.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections mssecsvc.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\DefaultConnectionSettings = 4600000002000000090000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 mssecsvc.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ProxyEnable = "0" mssecsvc.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ mssecsvc.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\History\CachePrefix = "Visited:" mssecsvc.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\DefaultConnectionSettings = 4600000003000000090000000000000000000000000000000400000000000000000000000000000000000000000000000000000001000000020000000a7f0032000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 mssecsvc.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{9C944B6F-C6C4-4CB4-979A-06573300125A} mssecsvc.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{9C944B6F-C6C4-4CB4-979A-06573300125A}\WpadDecision = "0" mssecsvc.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{9C944B6F-C6C4-4CB4-979A-06573300125A}\WpadNetworkName = "Network 3" mssecsvc.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{9C944B6F-C6C4-4CB4-979A-06573300125A}\76-b8-9e-78-c0-a3 mssecsvc.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\SavedLegacySettings = 4600000002000000090000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 mssecsvc.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\AutoDetect = "1" mssecsvc.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Content\CachePrefix mssecsvc.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\76-b8-9e-78-c0-a3 mssecsvc.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\76-b8-9e-78-c0-a3\WpadDecisionReason = "1" mssecsvc.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad mssecsvc.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\76-b8-9e-78-c0-a3\WpadDecision = "0" mssecsvc.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings mssecsvc.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\UNCAsIntranet = "0" mssecsvc.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Cookies\CachePrefix = "Cookie:" mssecsvc.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{9C944B6F-C6C4-4CB4-979A-06573300125A}\WpadDecisionReason = "1" mssecsvc.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{9C944B6F-C6C4-4CB4-979A-06573300125A}\WpadDecisionTime = 200e7fd53bf6da01 mssecsvc.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\76-b8-9e-78-c0-a3\WpadDecisionTime = 200e7fd53bf6da01 mssecsvc.exe -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 2220 wrote to memory of 1708 2220 rundll32.exe 31 PID 2220 wrote to memory of 1708 2220 rundll32.exe 31 PID 2220 wrote to memory of 1708 2220 rundll32.exe 31 PID 2220 wrote to memory of 1708 2220 rundll32.exe 31 PID 2220 wrote to memory of 1708 2220 rundll32.exe 31 PID 2220 wrote to memory of 1708 2220 rundll32.exe 31 PID 2220 wrote to memory of 1708 2220 rundll32.exe 31 PID 1708 wrote to memory of 1628 1708 rundll32.exe 32 PID 1708 wrote to memory of 1628 1708 rundll32.exe 32 PID 1708 wrote to memory of 1628 1708 rundll32.exe 32 PID 1708 wrote to memory of 1628 1708 rundll32.exe 32
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\bee90d14c6577c4a6c4e635fd1887c83_JaffaCakes118.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:2220 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\bee90d14c6577c4a6c4e635fd1887c83_JaffaCakes118.dll,#12⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1708 -
C:\WINDOWS\mssecsvc.exeC:\WINDOWS\mssecsvc.exe3⤵
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:1628 -
C:\WINDOWS\tasksche.exeC:\WINDOWS\tasksche.exe /i4⤵
- Executes dropped EXE
PID:2780
-
-
-
-
C:\WINDOWS\mssecsvc.exeC:\WINDOWS\mssecsvc.exe -m security1⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies data under HKEY_USERS
PID:2700
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3.6MB
MD5265f68c233e3c07571688734e9b4de67
SHA10f53799274090b04ac39e7e27c0534dbdaa6f2a2
SHA256277915ab77a3f4d06d3a1e037ff68139c3ee0a1dcd05263a0d2291d21b4e4ed6
SHA512bbdd12a3fd17a4852a3da56ac3177f152927ba32938e981751032c48639697d390489a75c172248db9df2a2b93b8200d953c5ad5a231d8e6d8740b6a862197ca
-
Filesize
3.4MB
MD56906a0f05fe05c0587c0d2b61d550bf4
SHA1f57fd2d03128c8357adbe4aa0ae931df27bf26cd
SHA256768457568425e74075e19a1749461a842ccdb261d340a0df90a36ee0486d6309
SHA51258bb4e011d757fd719c917d9ec9e5997ef9a436957670251a6d83d3cbf7e18e47409dfc656093045c9c6e7f6939a84ae26d71922fa4cd645f81c364c7c9190a7