Analysis
-
max time kernel
150s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
25-08-2024 03:58
Static task
static1
Behavioral task
behavioral1
Sample
bff0aa6595e3fc250a32ada5ca1c0cfe_JaffaCakes118.dll
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
bff0aa6595e3fc250a32ada5ca1c0cfe_JaffaCakes118.dll
Resource
win10v2004-20240802-en
General
-
Target
bff0aa6595e3fc250a32ada5ca1c0cfe_JaffaCakes118.dll
-
Size
5.0MB
-
MD5
bff0aa6595e3fc250a32ada5ca1c0cfe
-
SHA1
c9b1d78fe33b96b883af27aa01bc55fb52a22bb6
-
SHA256
bae676adf235b1ec80ef24c7db5531ce7ac1a3c74124bbe405e9f4c98d358624
-
SHA512
34ded1f942eaca5c96b664e1c2d65ab73f0dea8589390027a0c569d7a03aa7590fb168bca797c0a19efb5468d92b3cacde48dde6540c873680f42258dbec39a1
-
SSDEEP
12288:yvbLgPlu+QhMbaIMu7L5NVErCA4z2g6rTcbckPU82900Ve7zw+K+DHeQYSUjEXFO:SbLgddQhfdmMSirYbcMNgef0QeQjG
Malware Config
Signatures
-
Wannacry
WannaCry is a ransomware cryptoworm.
-
Contacts a large (3196) amount of remote hosts 1 TTPs
This may indicate a network scan to discover remotely running services.
-
Executes dropped EXE 3 IoCs
pid Process 5096 mssecsvc.exe 2656 mssecsvc.exe 1452 tasksche.exe -
Creates a large amount of network flows 1 TTPs
This may indicate a network scan to discover remotely running services.
-
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\WINDOWS\mssecsvc.exe rundll32.exe File created C:\WINDOWS\tasksche.exe mssecsvc.exe -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mssecsvc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mssecsvc.exe -
Modifies data under HKEY_USERS 5 IoCs
description ioc Process Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ProxyBypass = "1" mssecsvc.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\IntranetName = "1" mssecsvc.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\UNCAsIntranet = "1" mssecsvc.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\AutoDetect = "0" mssecsvc.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ mssecsvc.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 3572 wrote to memory of 948 3572 rundll32.exe 84 PID 3572 wrote to memory of 948 3572 rundll32.exe 84 PID 3572 wrote to memory of 948 3572 rundll32.exe 84 PID 948 wrote to memory of 5096 948 rundll32.exe 85 PID 948 wrote to memory of 5096 948 rundll32.exe 85 PID 948 wrote to memory of 5096 948 rundll32.exe 85
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\bff0aa6595e3fc250a32ada5ca1c0cfe_JaffaCakes118.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:3572 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\bff0aa6595e3fc250a32ada5ca1c0cfe_JaffaCakes118.dll,#12⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:948 -
C:\WINDOWS\mssecsvc.exeC:\WINDOWS\mssecsvc.exe3⤵
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:5096 -
C:\WINDOWS\tasksche.exeC:\WINDOWS\tasksche.exe /i4⤵
- Executes dropped EXE
PID:1452
-
-
-
-
C:\WINDOWS\mssecsvc.exeC:\WINDOWS\mssecsvc.exe -m security1⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Modifies data under HKEY_USERS
PID:2656
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3.6MB
MD55935f949fac3bda42bd4804f1844d49d
SHA139fc4f70494507c5c240ad45794db06d1b5497d0
SHA2562805f6018ef47934a84094ec9846d7628c793926b261bf96ce71d82c6a3740c2
SHA5126f96c6ff9f77551dfe7b1db90caa0a4c740016ba3cccc703379bd298362c7e1dd0163639d1dbb6364f3d041fb396caaf870b299016abc9074d0c3dcd83cafdd2
-
Filesize
3.4MB
MD58a8867441d89de126f8e9591e767af9b
SHA1d1626e2852dc713e3268f5788783bc8d911df7cd
SHA2561cbcbf5a77d2d235bfc6dcf769169f6b0d96c0377bcaa128589025bb9d8cec9a
SHA5122a1de2ca77b529fcfe640436eaab51755a1c673a27ef6c06261ddee7df98df4b048ea645494f0a384253cfa5e277e1167cb294ebab7de00eed7cc57b4a6afedb