Analysis
-
max time kernel
150s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
26-08-2024 20:24
Static task
static1
Behavioral task
behavioral1
Sample
c3c5ffe9ad07c3526a1b0a39fc921a6d_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
c3c5ffe9ad07c3526a1b0a39fc921a6d_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
c3c5ffe9ad07c3526a1b0a39fc921a6d_JaffaCakes118.exe
-
Size
3.6MB
-
MD5
c3c5ffe9ad07c3526a1b0a39fc921a6d
-
SHA1
50cf274511aa8e88d0fa190163908841bac6b500
-
SHA256
c8a7800561daa664cb7aae74fafcb9d776e5d0f0dd181c0af31fa729403a8251
-
SHA512
4dabeaa3b4e95213a6a489129c384612e8412e29f49ed17f4adbdcb2180dd4139d21a09a6c48d8212d27d7172ea21465cbb891b6aff19ea5744c5ef28db99396
-
SSDEEP
49152:2nAQqMSPbcBVL/5AMEcaEau3R8yAH1plAHI:yDqPoBd5593R8yAVp2HI
Malware Config
Signatures
-
Wannacry
WannaCry is a ransomware cryptoworm.
-
Contacts a large (3164) amount of remote hosts 1 TTPs
This may indicate a network scan to discover remotely running services.
-
Executes dropped EXE 1 IoCs
pid Process 5012 tasksche.exe -
Creates a large amount of network flows 1 TTPs
This may indicate a network scan to discover remotely running services.
-
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\WINDOWS\tasksche.exe c3c5ffe9ad07c3526a1b0a39fc921a6d_JaffaCakes118.exe -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language c3c5ffe9ad07c3526a1b0a39fc921a6d_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language c3c5ffe9ad07c3526a1b0a39fc921a6d_JaffaCakes118.exe -
Modifies data under HKEY_USERS 5 IoCs
description ioc Process Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ProxyBypass = "1" c3c5ffe9ad07c3526a1b0a39fc921a6d_JaffaCakes118.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\IntranetName = "1" c3c5ffe9ad07c3526a1b0a39fc921a6d_JaffaCakes118.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\UNCAsIntranet = "1" c3c5ffe9ad07c3526a1b0a39fc921a6d_JaffaCakes118.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\AutoDetect = "0" c3c5ffe9ad07c3526a1b0a39fc921a6d_JaffaCakes118.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ c3c5ffe9ad07c3526a1b0a39fc921a6d_JaffaCakes118.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\c3c5ffe9ad07c3526a1b0a39fc921a6d_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\c3c5ffe9ad07c3526a1b0a39fc921a6d_JaffaCakes118.exe"1⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:1684 -
C:\WINDOWS\tasksche.exeC:\WINDOWS\tasksche.exe /i2⤵
- Executes dropped EXE
PID:5012
-
-
C:\Users\Admin\AppData\Local\Temp\c3c5ffe9ad07c3526a1b0a39fc921a6d_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\c3c5ffe9ad07c3526a1b0a39fc921a6d_JaffaCakes118.exe -m security1⤵
- System Location Discovery: System Language Discovery
- Modifies data under HKEY_USERS
PID:3088
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --field-trial-handle=3996,i,1729213506309163284,12809566808978835441,262144 --variations-seed-version --mojo-platform-channel-handle=4192 /prefetch:81⤵PID:4220
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3.4MB
MD5ecc5c3e62e02437d549e97748e69e96e
SHA1df81c8d97534ce651e3bf0d21cba9c7c83583b1f
SHA25616a2ac4cc25fab34f106a92a42e18fb5ae33e35fdbe3506d9e4a2b0a4078b161
SHA5129e508887a771ae156ed8e7c201563fc28e79246b159480e0ffc71378f01bece7d02c5355bddd5bda444d171238caf41705be7ab64acdf3b630ffe4a2d1641dbc