Analysis
-
max time kernel
150s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
26-08-2024 04:12
Static task
static1
Behavioral task
behavioral1
Sample
c24245382f00395061b695c6156301e1_JaffaCakes118.dll
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
c24245382f00395061b695c6156301e1_JaffaCakes118.dll
Resource
win10v2004-20240802-en
General
-
Target
c24245382f00395061b695c6156301e1_JaffaCakes118.dll
-
Size
5.0MB
-
MD5
c24245382f00395061b695c6156301e1
-
SHA1
dafb0bd90559adb8da2c816172202420fb24ba71
-
SHA256
60f2d2df3fc462ab21f6aac50edbd58f9f2aa2ce917d0eb7132bddf76845c39e
-
SHA512
5ba8d775e099b766e8dd1be677e30a278512f821ad2880d325a16020bf4badb11cb3fabf9ccd6c7f0ef6e8714a51ad8861ba2454f6c2b54ae3ac57d66498afee
-
SSDEEP
49152:SnAQqMSPbcBVQej/1INRx+TSqTdX1HkQo6SAARdhnvxJM0H9PAME:+DqPoBhz1aRxcSUDk36SAEdhvxWa9P5
Malware Config
Signatures
-
Wannacry
WannaCry is a ransomware cryptoworm.
-
Contacts a large (3351) amount of remote hosts 1 TTPs
This may indicate a network scan to discover remotely running services.
-
Executes dropped EXE 3 IoCs
pid Process 3964 mssecsvc.exe 708 mssecsvc.exe 1120 tasksche.exe -
Creates a large amount of network flows 1 TTPs
This may indicate a network scan to discover remotely running services.
-
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\WINDOWS\tasksche.exe mssecsvc.exe File created C:\WINDOWS\mssecsvc.exe rundll32.exe -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mssecsvc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mssecsvc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Modifies data under HKEY_USERS 5 IoCs
description ioc Process Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ mssecsvc.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ProxyBypass = "1" mssecsvc.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\IntranetName = "1" mssecsvc.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\UNCAsIntranet = "1" mssecsvc.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\AutoDetect = "0" mssecsvc.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 5072 wrote to memory of 388 5072 rundll32.exe 86 PID 5072 wrote to memory of 388 5072 rundll32.exe 86 PID 5072 wrote to memory of 388 5072 rundll32.exe 86 PID 388 wrote to memory of 3964 388 rundll32.exe 87 PID 388 wrote to memory of 3964 388 rundll32.exe 87 PID 388 wrote to memory of 3964 388 rundll32.exe 87
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\c24245382f00395061b695c6156301e1_JaffaCakes118.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:5072 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\c24245382f00395061b695c6156301e1_JaffaCakes118.dll,#12⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:388 -
C:\WINDOWS\mssecsvc.exeC:\WINDOWS\mssecsvc.exe3⤵
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:3964 -
C:\WINDOWS\tasksche.exeC:\WINDOWS\tasksche.exe /i4⤵
- Executes dropped EXE
PID:1120
-
-
-
-
C:\WINDOWS\mssecsvc.exeC:\WINDOWS\mssecsvc.exe -m security1⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Modifies data under HKEY_USERS
PID:708
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3.6MB
MD5c6d62ea48e907a90d24991dd6d351362
SHA184da4f1bd3a269122bf87c3305f00b4cf30befda
SHA2562744ff187491936c99101cda8a6a7e618ce570d1bffcabdb9d394643d937ffc1
SHA5125f0d806b111967176de9a682192d6b4bf0f63baa4a511eacbeb66b0a80b279acbfd1aadb46d29b3b386b7bb7ffeb7d945601139322653b0a7d1a2cf7b12e5150
-
Filesize
3.4MB
MD518cd1b0fa42b651602d7f2fe9be4496f
SHA12a2f6b6478716f0896fba98aec974dd928ee2924
SHA2564f3b533069c1451dc13c82ad350820ccac8e907e356f2e89d960bdf1c8ab4b65
SHA5127c4539b175e6c92fbd02c1780f66c7c21c3c481c0f130366f00c0d7304178ad5f3286f730613abe59323f4436610784ab128e7bb5eefabbd6959af05b29a36b0