Analysis
-
max time kernel
150s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
26-08-2024 12:03
Static task
static1
Behavioral task
behavioral1
Sample
c2f45780a92f1ebe7bef8666e5b2284d_JaffaCakes118.dll
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
c2f45780a92f1ebe7bef8666e5b2284d_JaffaCakes118.dll
Resource
win10v2004-20240802-en
General
-
Target
c2f45780a92f1ebe7bef8666e5b2284d_JaffaCakes118.dll
-
Size
5.0MB
-
MD5
c2f45780a92f1ebe7bef8666e5b2284d
-
SHA1
b64779feba9ea84eb6b489eadb73ec635fd4b250
-
SHA256
8e6792f76da8dd823517fe1b563b86b3670389a27efa0e48d9770370aebcd719
-
SHA512
fd9f03f0520b6f24b30674ddf498b470044115290d52c2429ad24d5a8e3bf6ef4fea04bf5ab948b182f734dbc9e16a8f3356d684cae8283e576392d06ae9c995
-
SSDEEP
98304:TDqPoBhz17iSYOgS/sXxW/WnTTTxa9xWa9P593RenVpE:TDqPe17kOPWxW/WnnT42adzReVm
Malware Config
Signatures
-
Wannacry
WannaCry is a ransomware cryptoworm.
-
Contacts a large (3270) amount of remote hosts 1 TTPs
This may indicate a network scan to discover remotely running services.
-
Executes dropped EXE 3 IoCs
pid Process 4256 mssecsvc.exe 3592 mssecsvc.exe 2488 tasksche.exe -
Creates a large amount of network flows 1 TTPs
This may indicate a network scan to discover remotely running services.
-
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\WINDOWS\tasksche.exe mssecsvc.exe File created C:\WINDOWS\mssecsvc.exe rundll32.exe -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mssecsvc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mssecsvc.exe -
Modifies data under HKEY_USERS 5 IoCs
description ioc Process Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ mssecsvc.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ProxyBypass = "1" mssecsvc.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\IntranetName = "1" mssecsvc.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\UNCAsIntranet = "1" mssecsvc.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\AutoDetect = "0" mssecsvc.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 3424 wrote to memory of 3052 3424 rundll32.exe 84 PID 3424 wrote to memory of 3052 3424 rundll32.exe 84 PID 3424 wrote to memory of 3052 3424 rundll32.exe 84 PID 3052 wrote to memory of 4256 3052 rundll32.exe 85 PID 3052 wrote to memory of 4256 3052 rundll32.exe 85 PID 3052 wrote to memory of 4256 3052 rundll32.exe 85
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\c2f45780a92f1ebe7bef8666e5b2284d_JaffaCakes118.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:3424 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\c2f45780a92f1ebe7bef8666e5b2284d_JaffaCakes118.dll,#12⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3052 -
C:\WINDOWS\mssecsvc.exeC:\WINDOWS\mssecsvc.exe3⤵
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:4256 -
C:\WINDOWS\tasksche.exeC:\WINDOWS\tasksche.exe /i4⤵
- Executes dropped EXE
PID:2488
-
-
-
-
C:\WINDOWS\mssecsvc.exeC:\WINDOWS\mssecsvc.exe -m security1⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Modifies data under HKEY_USERS
PID:3592
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3.6MB
MD5896225ded93bd142bb65049d7b897c2f
SHA1212b6c78db49167d573748dcf6345e21f96ea804
SHA25682135513eacff950fc7ef848a18d01e1593b5d70f01689aaca9f2f643bdc24cc
SHA5122c1d861a85d3d9981d0765c44d6bfd41828db1b451d36bca15b6ebcdce6f5eac639d99f525970e2ef05e5c9b0e56f02d11ef1f636600ffb39c237ff0ff3be5cc
-
Filesize
3.4MB
MD52a57f48993fa5737850c4a90f58feaa7
SHA13b0fdae686657672eb1f4bb076c5d926d5d9a3a7
SHA256283989409f8b35d7883b0a1efd87d5f474927788bc3198dbedb863fbcbb1b7b9
SHA51259861eec87b706387464f4472cb3c4c768108a4e087954f4caf09c864725d7da7fc955641b5b4e6cef7bda950a3aa4ebe29493dd898bf6264924f46285432403