Analysis
-
max time kernel
150s -
max time network
150s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
27-08-2024 12:05
Static task
static1
Behavioral task
behavioral1
Sample
c4f5fee47a0ff63037387e69e0d9db92_JaffaCakes118.dll
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
c4f5fee47a0ff63037387e69e0d9db92_JaffaCakes118.dll
Resource
win10v2004-20240802-en
General
-
Target
c4f5fee47a0ff63037387e69e0d9db92_JaffaCakes118.dll
-
Size
5.0MB
-
MD5
c4f5fee47a0ff63037387e69e0d9db92
-
SHA1
0803e235f89519d49d52b92911f7ce8194f88974
-
SHA256
944db9261261513f9e1bd645467982449216f4c6ac946f49fac7e05ae8f615f5
-
SHA512
fb25e43898a26c34eb13f9470447500eccd85057867661fb1ef6700e565ff2729f72b8183f6782debc3fdbb25650b385a3dbaec88be03585cb9e5af7cbf7d8ae
-
SSDEEP
98304:+DqPoBhz1aRxcSUDk36SAcxWa95593R8yAVp2H:+DqPe1Cxcxk3ZAfabzR8yc4H
Malware Config
Signatures
-
Wannacry
WannaCry is a ransomware cryptoworm.
-
Contacts a large (3160) amount of remote hosts 1 TTPs
This may indicate a network scan to discover remotely running services.
-
Executes dropped EXE 3 IoCs
pid Process 2392 mssecsvc.exe 1884 mssecsvc.exe 2240 tasksche.exe -
Creates a large amount of network flows 1 TTPs
This may indicate a network scan to discover remotely running services.
-
Drops file in System32 directory 1 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\Temporary Internet Files\counters.dat mssecsvc.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\WINDOWS\mssecsvc.exe rundll32.exe File created C:\WINDOWS\tasksche.exe mssecsvc.exe -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mssecsvc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mssecsvc.exe -
Modifies data under HKEY_USERS 24 IoCs
description ioc Process Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{0EBB8CCA-552F-42AD-9B0E-EEDB02532FC7}\WpadNetworkName = "Network 3" mssecsvc.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\72-2a-ea-72-4c-2d\WpadDecisionReason = "1" mssecsvc.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\72-2a-ea-72-4c-2d\WpadDecisionTime = a0a7217079f8da01 mssecsvc.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ mssecsvc.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\AutoDetect = "1" mssecsvc.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Cookies\CachePrefix = "Cookie:" mssecsvc.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{0EBB8CCA-552F-42AD-9B0E-EEDB02532FC7}\WpadDecisionReason = "1" mssecsvc.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\DefaultConnectionSettings = 4600000002000000090000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 mssecsvc.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Content\CachePrefix mssecsvc.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad mssecsvc.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\History\CachePrefix = "Visited:" mssecsvc.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\DefaultConnectionSettings = 4600000003000000090000000000000000000000000000000400000000000000000000000000000000000000000000000000000001000000020000000a7f0023000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 mssecsvc.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{0EBB8CCA-552F-42AD-9B0E-EEDB02532FC7}\WpadDecisionTime = a0a7217079f8da01 mssecsvc.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{0EBB8CCA-552F-42AD-9B0E-EEDB02532FC7}\WpadDecision = "0" mssecsvc.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{0EBB8CCA-552F-42AD-9B0E-EEDB02532FC7}\72-2a-ea-72-4c-2d mssecsvc.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings mssecsvc.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings mssecsvc.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\SavedLegacySettings = 4600000002000000090000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 mssecsvc.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{0EBB8CCA-552F-42AD-9B0E-EEDB02532FC7} mssecsvc.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\72-2a-ea-72-4c-2d mssecsvc.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\72-2a-ea-72-4c-2d\WpadDecision = "0" mssecsvc.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections mssecsvc.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ProxyEnable = "0" mssecsvc.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\UNCAsIntranet = "0" mssecsvc.exe -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 2524 wrote to memory of 2512 2524 rundll32.exe 30 PID 2524 wrote to memory of 2512 2524 rundll32.exe 30 PID 2524 wrote to memory of 2512 2524 rundll32.exe 30 PID 2524 wrote to memory of 2512 2524 rundll32.exe 30 PID 2524 wrote to memory of 2512 2524 rundll32.exe 30 PID 2524 wrote to memory of 2512 2524 rundll32.exe 30 PID 2524 wrote to memory of 2512 2524 rundll32.exe 30 PID 2512 wrote to memory of 2392 2512 rundll32.exe 31 PID 2512 wrote to memory of 2392 2512 rundll32.exe 31 PID 2512 wrote to memory of 2392 2512 rundll32.exe 31 PID 2512 wrote to memory of 2392 2512 rundll32.exe 31
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\c4f5fee47a0ff63037387e69e0d9db92_JaffaCakes118.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:2524 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\c4f5fee47a0ff63037387e69e0d9db92_JaffaCakes118.dll,#12⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2512 -
C:\WINDOWS\mssecsvc.exeC:\WINDOWS\mssecsvc.exe3⤵
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:2392 -
C:\WINDOWS\tasksche.exeC:\WINDOWS\tasksche.exe /i4⤵
- Executes dropped EXE
PID:2240
-
-
-
-
C:\WINDOWS\mssecsvc.exeC:\WINDOWS\mssecsvc.exe -m security1⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies data under HKEY_USERS
PID:1884
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3.6MB
MD5e3af0286c15d6955b3f556ed2d06b330
SHA185ea5e6a5577b7383d5bb36a09c84e5bbda8ca33
SHA256ddee54d15dfdac399d397383ad2ceb1a8bab70f32785c5fb55e1c8920a608e4d
SHA512e219bc7425da54c0b900fa780ec4d223154578615efb00947bea76855549cabe830bb86b9124f7a13b301e3a5fd7a0d98c04f5cac9cf151d3860b8d72f0c4608
-
Filesize
3.4MB
MD54a6aca6d918ea96a19bb39f874527d8e
SHA1427f809d17c4cf3f1539872b2de9a06425abf3d7
SHA2565d66245a7ea7b82e9d7c1743e2668e24be02208e5dcd3eb3a77338d83516b0e3
SHA5123b582e04ca04900ef3cd0df5ba4ff8049ec38b3e6719aa6bfa8ad0adfc7c0d7d5785a7a72df4d9ae8ce9846c81e8b6d3ac9595f5cd822aea2b642f133b33e651