Analysis
-
max time kernel
150s -
max time network
150s -
platform
windows7_x64 -
resource
win7-20240705-en -
resource tags
arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system -
submitted
26-08-2024 15:48
Static task
static1
Behavioral task
behavioral1
Sample
c352124d7c524a2f4f48ce2ac16ebe88_JaffaCakes118.dll
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
c352124d7c524a2f4f48ce2ac16ebe88_JaffaCakes118.dll
Resource
win10v2004-20240802-en
General
-
Target
c352124d7c524a2f4f48ce2ac16ebe88_JaffaCakes118.dll
-
Size
5.0MB
-
MD5
c352124d7c524a2f4f48ce2ac16ebe88
-
SHA1
593e5266addd75e3c12666fd335023008ee42e4e
-
SHA256
9974ef9a67abde0940c7c44f5a2f76304f5b1f9615f4a471804471a523f5d950
-
SHA512
ad124d4af25bbf34afa9c05d4604a1973577a009019d3c7fe0060e3adf5c976a1ac20b03ff122a7fdbe6b7c545f030afae396f79be407664dbca0b36960bb812
-
SSDEEP
49152:ynAQqMSPbcBVQej/1INRx+TSqTdX1HkQo6SAAZ0vZ6GIk:eDqPoBhz1aRxcSUDk36SAc0B6GIk
Malware Config
Signatures
-
Wannacry
WannaCry is a ransomware cryptoworm.
-
Contacts a large (3230) amount of remote hosts 1 TTPs
This may indicate a network scan to discover remotely running services.
-
Executes dropped EXE 2 IoCs
pid Process 2768 mssecsvc.exe 2440 mssecsvc.exe -
Creates a large amount of network flows 1 TTPs
This may indicate a network scan to discover remotely running services.
-
Drops file in System32 directory 1 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\Temporary Internet Files\counters.dat mssecsvc.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\WINDOWS\mssecsvc.exe rundll32.exe File created C:\WINDOWS\tasksche.exe mssecsvc.exe -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mssecsvc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mssecsvc.exe -
Modifies data under HKEY_USERS 24 IoCs
description ioc Process Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Content\CachePrefix mssecsvc.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Cookies\CachePrefix = "Cookie:" mssecsvc.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{3672FCC5-B714-4182-93C1-9663ACBBD70B} mssecsvc.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\c2-1a-9c-06-72-ed mssecsvc.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings mssecsvc.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections mssecsvc.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\SavedLegacySettings = 4600000002000000090000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 mssecsvc.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\AutoDetect = "1" mssecsvc.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ProxyEnable = "0" mssecsvc.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\History\CachePrefix = "Visited:" mssecsvc.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad mssecsvc.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{3672FCC5-B714-4182-93C1-9663ACBBD70B}\WpadDecisionTime = 707e0464cff7da01 mssecsvc.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{3672FCC5-B714-4182-93C1-9663ACBBD70B}\c2-1a-9c-06-72-ed mssecsvc.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\c2-1a-9c-06-72-ed\WpadDecisionReason = "1" mssecsvc.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\c2-1a-9c-06-72-ed\WpadDecisionTime = 707e0464cff7da01 mssecsvc.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ mssecsvc.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\UNCAsIntranet = "0" mssecsvc.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{3672FCC5-B714-4182-93C1-9663ACBBD70B}\WpadDecisionReason = "1" mssecsvc.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{3672FCC5-B714-4182-93C1-9663ACBBD70B}\WpadNetworkName = "Network 3" mssecsvc.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\c2-1a-9c-06-72-ed\WpadDecision = "0" mssecsvc.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\DefaultConnectionSettings = 4600000002000000090000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 mssecsvc.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings mssecsvc.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\DefaultConnectionSettings = 4600000003000000090000000000000000000000000000000400000000000000000000000000000000000000000000000000000001000000020000000a7f00b1000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 mssecsvc.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{3672FCC5-B714-4182-93C1-9663ACBBD70B}\WpadDecision = "0" mssecsvc.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2768 mssecsvc.exe 2440 mssecsvc.exe -
Suspicious behavior: MapViewOfSection 47 IoCs
pid Process 2768 mssecsvc.exe 2768 mssecsvc.exe 2768 mssecsvc.exe 2768 mssecsvc.exe 2768 mssecsvc.exe 2768 mssecsvc.exe 2768 mssecsvc.exe 2768 mssecsvc.exe 2768 mssecsvc.exe 2768 mssecsvc.exe 2768 mssecsvc.exe 2768 mssecsvc.exe 2768 mssecsvc.exe 2768 mssecsvc.exe 2768 mssecsvc.exe 2768 mssecsvc.exe 2768 mssecsvc.exe 2768 mssecsvc.exe 2768 mssecsvc.exe 2768 mssecsvc.exe 2768 mssecsvc.exe 2768 mssecsvc.exe 2768 mssecsvc.exe 2440 mssecsvc.exe 2440 mssecsvc.exe 2440 mssecsvc.exe 2440 mssecsvc.exe 2440 mssecsvc.exe 2440 mssecsvc.exe 2440 mssecsvc.exe 2440 mssecsvc.exe 2440 mssecsvc.exe 2440 mssecsvc.exe 2440 mssecsvc.exe 2440 mssecsvc.exe 2440 mssecsvc.exe 2440 mssecsvc.exe 2440 mssecsvc.exe 2440 mssecsvc.exe 2440 mssecsvc.exe 2440 mssecsvc.exe 2440 mssecsvc.exe 2440 mssecsvc.exe 2440 mssecsvc.exe 2440 mssecsvc.exe 2440 mssecsvc.exe 2440 mssecsvc.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 2768 mssecsvc.exe Token: SeDebugPrivilege 2440 mssecsvc.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2228 wrote to memory of 2732 2228 rundll32.exe 30 PID 2228 wrote to memory of 2732 2228 rundll32.exe 30 PID 2228 wrote to memory of 2732 2228 rundll32.exe 30 PID 2228 wrote to memory of 2732 2228 rundll32.exe 30 PID 2228 wrote to memory of 2732 2228 rundll32.exe 30 PID 2228 wrote to memory of 2732 2228 rundll32.exe 30 PID 2228 wrote to memory of 2732 2228 rundll32.exe 30 PID 2732 wrote to memory of 2768 2732 rundll32.exe 31 PID 2732 wrote to memory of 2768 2732 rundll32.exe 31 PID 2732 wrote to memory of 2768 2732 rundll32.exe 31 PID 2732 wrote to memory of 2768 2732 rundll32.exe 31 PID 2768 wrote to memory of 384 2768 mssecsvc.exe 3 PID 2768 wrote to memory of 384 2768 mssecsvc.exe 3 PID 2768 wrote to memory of 384 2768 mssecsvc.exe 3 PID 2768 wrote to memory of 384 2768 mssecsvc.exe 3 PID 2768 wrote to memory of 384 2768 mssecsvc.exe 3 PID 2768 wrote to memory of 384 2768 mssecsvc.exe 3 PID 2768 wrote to memory of 384 2768 mssecsvc.exe 3 PID 2768 wrote to memory of 396 2768 mssecsvc.exe 4 PID 2768 wrote to memory of 396 2768 mssecsvc.exe 4 PID 2768 wrote to memory of 396 2768 mssecsvc.exe 4 PID 2768 wrote to memory of 396 2768 mssecsvc.exe 4 PID 2768 wrote to memory of 396 2768 mssecsvc.exe 4 PID 2768 wrote to memory of 396 2768 mssecsvc.exe 4 PID 2768 wrote to memory of 396 2768 mssecsvc.exe 4 PID 2768 wrote to memory of 432 2768 mssecsvc.exe 5 PID 2768 wrote to memory of 432 2768 mssecsvc.exe 5 PID 2768 wrote to memory of 432 2768 mssecsvc.exe 5 PID 2768 wrote to memory of 432 2768 mssecsvc.exe 5 PID 2768 wrote to memory of 432 2768 mssecsvc.exe 5 PID 2768 wrote to memory of 432 2768 mssecsvc.exe 5 PID 2768 wrote to memory of 432 2768 mssecsvc.exe 5 PID 2768 wrote to memory of 476 2768 mssecsvc.exe 6 PID 2768 wrote to memory of 476 2768 mssecsvc.exe 6 PID 2768 wrote to memory of 476 2768 mssecsvc.exe 6 PID 2768 wrote to memory of 476 2768 mssecsvc.exe 6 PID 2768 wrote to memory of 476 2768 mssecsvc.exe 6 PID 2768 wrote to memory of 476 2768 mssecsvc.exe 6 PID 2768 wrote to memory of 476 2768 mssecsvc.exe 6 PID 2768 wrote to memory of 492 2768 mssecsvc.exe 7 PID 2768 wrote to memory of 492 2768 mssecsvc.exe 7 PID 2768 wrote to memory of 492 2768 mssecsvc.exe 7 PID 2768 wrote to memory of 492 2768 mssecsvc.exe 7 PID 2768 wrote to memory of 492 2768 mssecsvc.exe 7 PID 2768 wrote to memory of 492 2768 mssecsvc.exe 7 PID 2768 wrote to memory of 492 2768 mssecsvc.exe 7 PID 2768 wrote to memory of 500 2768 mssecsvc.exe 8 PID 2768 wrote to memory of 500 2768 mssecsvc.exe 8 PID 2768 wrote to memory of 500 2768 mssecsvc.exe 8 PID 2768 wrote to memory of 500 2768 mssecsvc.exe 8 PID 2768 wrote to memory of 500 2768 mssecsvc.exe 8 PID 2768 wrote to memory of 500 2768 mssecsvc.exe 8 PID 2768 wrote to memory of 500 2768 mssecsvc.exe 8 PID 2768 wrote to memory of 608 2768 mssecsvc.exe 9 PID 2768 wrote to memory of 608 2768 mssecsvc.exe 9 PID 2768 wrote to memory of 608 2768 mssecsvc.exe 9 PID 2768 wrote to memory of 608 2768 mssecsvc.exe 9 PID 2768 wrote to memory of 608 2768 mssecsvc.exe 9 PID 2768 wrote to memory of 608 2768 mssecsvc.exe 9 PID 2768 wrote to memory of 608 2768 mssecsvc.exe 9 PID 2768 wrote to memory of 688 2768 mssecsvc.exe 10 PID 2768 wrote to memory of 688 2768 mssecsvc.exe 10 PID 2768 wrote to memory of 688 2768 mssecsvc.exe 10 PID 2768 wrote to memory of 688 2768 mssecsvc.exe 10
Processes
-
C:\Windows\system32\wininit.exewininit.exe1⤵PID:384
-
C:\Windows\system32\services.exeC:\Windows\system32\services.exe2⤵PID:476
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k DcomLaunch3⤵PID:608
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}4⤵PID:1472
-
-
C:\Windows\system32\wbem\wmiprvse.exeC:\Windows\system32\wbem\wmiprvse.exe4⤵PID:772
-
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k RPCSS3⤵PID:688
-
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted3⤵PID:760
-
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted3⤵PID:832
-
C:\Windows\system32\Dwm.exe"C:\Windows\system32\Dwm.exe"4⤵PID:1184
-
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs3⤵PID:876
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalService3⤵PID:980
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k NetworkService3⤵PID:268
-
-
C:\Windows\System32\spoolsv.exeC:\Windows\System32\spoolsv.exe3⤵PID:1028
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalServiceNoNetwork3⤵PID:1088
-
-
C:\Windows\system32\taskhost.exe"taskhost.exe"3⤵PID:1108
-
-
C:\Program Files\Common Files\Microsoft Shared\OfficeSoftwareProtectionPlatform\OSPPSVC.EXE"C:\Program Files\Common Files\Microsoft Shared\OfficeSoftwareProtectionPlatform\OSPPSVC.EXE"3⤵PID:1744
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalServiceAndNoImpersonation3⤵PID:2968
-
-
C:\Windows\system32\sppsvc.exeC:\Windows\system32\sppsvc.exe3⤵PID:3024
-
-
C:\WINDOWS\mssecsvc.exeC:\WINDOWS\mssecsvc.exe -m security3⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
PID:2440
-
-
-
C:\Windows\system32\lsass.exeC:\Windows\system32\lsass.exe2⤵PID:492
-
-
C:\Windows\system32\lsm.exeC:\Windows\system32\lsm.exe2⤵PID:500
-
-
C:\Windows\system32\csrss.exe%SystemRoot%\system32\csrss.exe ObjectDirectory=\Windows SharedSection=1024,20480,768 Windows=On SubSystemType=Windows ServerDll=basesrv,1 ServerDll=winsrv:UserServerDllInitialization,3 ServerDll=winsrv:ConServerDllInitialization,2 ServerDll=sxssrv,4 ProfileControl=Off MaxRequestThreads=161⤵PID:396
-
C:\Windows\system32\winlogon.exewinlogon.exe1⤵PID:432
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1216
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\c352124d7c524a2f4f48ce2ac16ebe88_JaffaCakes118.dll,#12⤵
- Suspicious use of WriteProcessMemory
PID:2228 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\c352124d7c524a2f4f48ce2ac16ebe88_JaffaCakes118.dll,#13⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2732 -
C:\WINDOWS\mssecsvc.exeC:\WINDOWS\mssecsvc.exe4⤵
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2768
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3.6MB
MD514d3bde1edb2dc541d96b3c17df18d09
SHA1dc0516ec0f6ef74e2e05a364a49337a7bde60f9e
SHA256acead39967484b84811ba80b3811b2493c8cf8d9257c7ae11037bd1cba55789a
SHA512880435d8cf8be250679678f402d636939588ef6c1cc27dad946d3e521e1cb363ef5f005690868c7577ea9c9724419f36a19e30474d7249a23eae783113dad3bd