Analysis
-
max time kernel
150s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
25/08/2024, 22:29
Static task
static1
Behavioral task
behavioral1
Sample
c1b8c052a48271ebbfc3aac3be192ea6_JaffaCakes118.dll
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
c1b8c052a48271ebbfc3aac3be192ea6_JaffaCakes118.dll
Resource
win10v2004-20240802-en
General
-
Target
c1b8c052a48271ebbfc3aac3be192ea6_JaffaCakes118.dll
-
Size
5.0MB
-
MD5
c1b8c052a48271ebbfc3aac3be192ea6
-
SHA1
261d3790d8cdcc9270fd9ba59e46111337b28128
-
SHA256
6fdcaec408326a18d6b77a9cbca46348e65f37e8d0233f42196fc1fc74b8dc5c
-
SHA512
5c0b5780b14397006e22858ea8abf427b14e1abfc5bdbc2fcfbdabf8b39b5580f707addd4e372d6e0b7801ba9eb74e1be64b6b24f5c0ace6bce0275f19042c12
-
SSDEEP
49152:JnjQqMSPbcBVQej/1INRx+TSqTdX1HkQoIAjvxJM0H9PAMEcaEau3:d8qPoBhz1aRxcSUDk3IKxWa9P593
Malware Config
Signatures
-
Wannacry
WannaCry is a ransomware cryptoworm.
-
Contacts a large (3129) amount of remote hosts 1 TTPs
This may indicate a network scan to discover remotely running services.
-
Executes dropped EXE 3 IoCs
pid Process 4984 mssecsvc.exe 4272 mssecsvc.exe 1372 tasksche.exe -
Creates a large amount of network flows 1 TTPs
This may indicate a network scan to discover remotely running services.
-
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\WINDOWS\mssecsvc.exe rundll32.exe File created C:\WINDOWS\tasksche.exe mssecsvc.exe -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mssecsvc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mssecsvc.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 368 wrote to memory of 1048 368 rundll32.exe 84 PID 368 wrote to memory of 1048 368 rundll32.exe 84 PID 368 wrote to memory of 1048 368 rundll32.exe 84 PID 1048 wrote to memory of 4984 1048 rundll32.exe 85 PID 1048 wrote to memory of 4984 1048 rundll32.exe 85 PID 1048 wrote to memory of 4984 1048 rundll32.exe 85
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\c1b8c052a48271ebbfc3aac3be192ea6_JaffaCakes118.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:368 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\c1b8c052a48271ebbfc3aac3be192ea6_JaffaCakes118.dll,#12⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1048 -
C:\WINDOWS\mssecsvc.exeC:\WINDOWS\mssecsvc.exe3⤵
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:4984 -
C:\WINDOWS\tasksche.exeC:\WINDOWS\tasksche.exe /i4⤵
- Executes dropped EXE
PID:1372
-
-
-
-
C:\WINDOWS\mssecsvc.exeC:\WINDOWS\mssecsvc.exe -m security1⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4272
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3.6MB
MD56d8d620a17a705bb33dea5ce2f92959c
SHA14653bbb39d3f662ce101dc40dd82bd423b8a430b
SHA2566301eb5c7f2f26758530966fad744215b4af386f7798c6233fb638e7f2af62fe
SHA5123f6f286c4ac3d9fbfb1b7b7779fea13be8c79dd8a807117e831fdae455a88987829a72692420b1fdb39f21a1c3c47c63dd128bda8fa0c82d6854e15598447b66
-
Filesize
3.4MB
MD52d274e7c5836e96a923bcdaeb7baad64
SHA1ed9f2f21864f5d2d672b12390f69d3eeb88ec34e
SHA25661980b1757a92c771c06426e316e3e2bb9efba2b96fcf3e6daf56948464fb96f
SHA512c83e1e05dfa751b4b94ad6ed4b0eb7928e45e54e17de75c3322d9bdc184b1ae1592f50be247738f35ec10fd10710b93b83eb017cf56beb4439543207d6e90d73