Analysis
-
max time kernel
150s -
max time network
154s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
27-08-2024 00:43
Static task
static1
Behavioral task
behavioral1
Sample
c417bfff535fd0752037f1037ca0703a_JaffaCakes118.dll
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
c417bfff535fd0752037f1037ca0703a_JaffaCakes118.dll
Resource
win10v2004-20240802-en
General
-
Target
c417bfff535fd0752037f1037ca0703a_JaffaCakes118.dll
-
Size
5.0MB
-
MD5
c417bfff535fd0752037f1037ca0703a
-
SHA1
c9c91fd6cb67b0ae332e2baaa698c0403e11ca7c
-
SHA256
8ffcc92790fd2594db8fd0f6fe5716ba694dff01df2638bd0eb0d63dbda55143
-
SHA512
17b0be134dbfccd831a1900dfff4ef6b4067f52db282780504a38df372bf0852fcb1153981253e3532428679d9a2a9b7f5c1904019934a17309ad478ca0113b2
-
SSDEEP
49152:SnjQqMSPbcBVQej/1INRx+TSqTfdhkvxJM0H9ZFMEcaEauvAH1plAH:+8qPoBhz1aRxcSUfdhMxWa9M9vAVp2H
Malware Config
Signatures
-
Wannacry
WannaCry is a ransomware cryptoworm.
-
Contacts a large (3324) amount of remote hosts 1 TTPs
This may indicate a network scan to discover remotely running services.
-
Executes dropped EXE 3 IoCs
pid Process 2120 mssecsvc.exe 2448 mssecsvc.exe 2292 tasksche.exe -
Creates a large amount of network flows 1 TTPs
This may indicate a network scan to discover remotely running services.
-
Drops file in System32 directory 1 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\Temporary Internet Files\counters.dat mssecsvc.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\WINDOWS\mssecsvc.exe rundll32.exe File created C:\WINDOWS\tasksche.exe mssecsvc.exe -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mssecsvc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mssecsvc.exe -
Modifies data under HKEY_USERS 1 IoCs
description ioc Process Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings mssecsvc.exe -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 2472 wrote to memory of 1956 2472 rundll32.exe 28 PID 2472 wrote to memory of 1956 2472 rundll32.exe 28 PID 2472 wrote to memory of 1956 2472 rundll32.exe 28 PID 2472 wrote to memory of 1956 2472 rundll32.exe 28 PID 2472 wrote to memory of 1956 2472 rundll32.exe 28 PID 2472 wrote to memory of 1956 2472 rundll32.exe 28 PID 2472 wrote to memory of 1956 2472 rundll32.exe 28 PID 1956 wrote to memory of 2120 1956 rundll32.exe 29 PID 1956 wrote to memory of 2120 1956 rundll32.exe 29 PID 1956 wrote to memory of 2120 1956 rundll32.exe 29 PID 1956 wrote to memory of 2120 1956 rundll32.exe 29
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\c417bfff535fd0752037f1037ca0703a_JaffaCakes118.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:2472 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\c417bfff535fd0752037f1037ca0703a_JaffaCakes118.dll,#12⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1956 -
C:\WINDOWS\mssecsvc.exeC:\WINDOWS\mssecsvc.exe3⤵
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:2120 -
C:\WINDOWS\tasksche.exeC:\WINDOWS\tasksche.exe /i4⤵
- Executes dropped EXE
PID:2292
-
-
-
-
C:\WINDOWS\mssecsvc.exeC:\WINDOWS\mssecsvc.exe -m security1⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies data under HKEY_USERS
PID:2448
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3.6MB
MD55f359210280158e179f3532e287694e8
SHA17daf6f8ed8ac067318c30f78d41dbc6889c42ffb
SHA256c8a7a2ef4b6c48cbe04dadf9b44204abce8e7b362bb81758e5167fcc79ee94d2
SHA5128a425ab1856548e9c088e37138044648a112ea4e667212720fd373ed860551d0e985be82c1d6a99008050313666a7d01f1370a791ddafa70abff65a670f294f6
-
Filesize
3.4MB
MD53b8da6671eff1d3af5f40b5dd832ffd4
SHA119c539bc5ae822aaf15b0a9b896238a4ea094cff
SHA256c7c6d3e6b371ae7068299b68b040d6f15f288676c32e8873edae45b06fdc36e6
SHA512e42e2b406342326c6cfd44fd7618f4a74f75bb58253c982639361f146fa358ae8eaf7b8144246e480bedc724299eac9e5e52694564b60611b7278ee87b709e2a