Analysis
-
max time kernel
114s -
max time network
115s -
platform
windows11-21h2_x64 -
resource
win11-20240802-en -
resource tags
arch:x64arch:x86image:win11-20240802-enlocale:en-usos:windows11-21h2-x64system -
submitted
27-08-2024 15:01
Static task
static1
Behavioral task
behavioral1
Sample
c535d0ca60d2e77f3f849a6ac49a38cb_JaffaCakes118.dll
Resource
win11-20240802-en
General
-
Target
c535d0ca60d2e77f3f849a6ac49a38cb_JaffaCakes118.dll
-
Size
5.0MB
-
MD5
c535d0ca60d2e77f3f849a6ac49a38cb
-
SHA1
b55644e0bfde458e34e144dfe52e5f08f8af2da4
-
SHA256
68ba4f71995025612f70be0c0ff6f0578781f1c144aa24f2928f370c45503b60
-
SHA512
89cef15c22eca56990d8321269798db3f6b5a581217a93908306f155f64fad2ef9a43f83bb2bb79f3c7f7ebc308ce6622e23fa755ebb33cb0319d29c5b7f3f2b
-
SSDEEP
98304:+DqPoBhz1aRxcSUDk36SAEdhvxWa9P593R8y:+DqPe1Cxcxk3ZAEUadzR8y
Malware Config
Signatures
-
Wannacry
WannaCry is a ransomware cryptoworm.
-
Contacts a large (2190) amount of remote hosts 1 TTPs
This may indicate a network scan to discover remotely running services.
-
Executes dropped EXE 3 IoCs
pid Process 1860 mssecsvc.exe 2780 mssecsvc.exe 4768 tasksche.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\WINDOWS\tasksche.exe mssecsvc.exe File created C:\WINDOWS\mssecsvc.exe rundll32.exe -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mssecsvc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mssecsvc.exe -
Modifies data under HKEY_USERS 5 IoCs
description ioc Process Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ mssecsvc.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ProxyBypass = "1" mssecsvc.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\IntranetName = "1" mssecsvc.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\UNCAsIntranet = "1" mssecsvc.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\AutoDetect = "0" mssecsvc.exe -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 944 vlc.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 944 vlc.exe -
Suspicious use of FindShellTrayWindow 8 IoCs
pid Process 944 vlc.exe 944 vlc.exe 944 vlc.exe 944 vlc.exe 944 vlc.exe 944 vlc.exe 944 vlc.exe 944 vlc.exe -
Suspicious use of SendNotifyMessage 7 IoCs
pid Process 944 vlc.exe 944 vlc.exe 944 vlc.exe 944 vlc.exe 944 vlc.exe 944 vlc.exe 944 vlc.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 944 vlc.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 1004 wrote to memory of 4756 1004 rundll32.exe 82 PID 1004 wrote to memory of 4756 1004 rundll32.exe 82 PID 1004 wrote to memory of 4756 1004 rundll32.exe 82 PID 4756 wrote to memory of 1860 4756 rundll32.exe 83 PID 4756 wrote to memory of 1860 4756 rundll32.exe 83 PID 4756 wrote to memory of 1860 4756 rundll32.exe 83
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\c535d0ca60d2e77f3f849a6ac49a38cb_JaffaCakes118.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1004 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\c535d0ca60d2e77f3f849a6ac49a38cb_JaffaCakes118.dll,#12⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4756 -
C:\WINDOWS\mssecsvc.exeC:\WINDOWS\mssecsvc.exe3⤵
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:1860 -
C:\WINDOWS\tasksche.exeC:\WINDOWS\tasksche.exe /i4⤵
- Executes dropped EXE
PID:4768
-
-
-
-
C:\WINDOWS\mssecsvc.exeC:\WINDOWS\mssecsvc.exe -m security1⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Modifies data under HKEY_USERS
PID:2780
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵PID:3336
-
C:\Program Files\VideoLAN\VLC\vlc.exe"C:\Program Files\VideoLAN\VLC\vlc.exe" --started-from-file "C:\Users\Admin\Desktop\CompletePublish.3g2"1⤵
- Suspicious behavior: AddClipboardFormatListener
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
PID:944
-
C:\Program Files\VideoLAN\VLC\vlc.exe"C:\Program Files\VideoLAN\VLC\vlc.exe" --started-from-file "C:\Users\Admin\Desktop\DebugConvertFrom.ADT"1⤵PID:1148
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
94KB
MD57b37c4f352a44c8246bf685258f75045
SHA1817dacb245334f10de0297e69c98b4c9470f083e
SHA256ec45f6e952b43eddc214dba703cf7f31398f3c9f535aad37f42237c56b9b778e
SHA5121e8d675b3c6c9ba257b616da268cac7f1c7a9db12ffb831ed5f8d43c0887d711c197ebc9daf735e3da9a0355bf21c2b29a2fb38a46482a2c5c8cd5628fea4c02
-
Filesize
3.6MB
MD513811dea41a16129e6e56da385071e0e
SHA18aff71e7e582163b3732f3e690113c534ead5415
SHA256eae935145d83468cffc8090750ab5979d0ada29e332715ce6032de77a7b2f04c
SHA5123ef5278264616aaa8d7d6f393bc159f4eaed7c5e8ba420ce7291fb51723ae7585ddee5976992c491aa7099e65955d65ed8f2086a5c5dcae9d09b4e77ff6d149b
-
Filesize
3.4MB
MD5e74eb6fa2a2bc4b0d243cdee618e9819
SHA161f6f281b2436acf2b1fa054ceb763c280d535e6
SHA2567d99aaa426e4f057185168d127b7bf57f13fc971e486af58c85a0d10ee930616
SHA512400dfd700b79db143949845a97122834676f64e0dc0a068f02b283e6fbb0fb52c33d44b5ba5a39de191e72a72da78a2d98dc8b4b2f0dd52fc0995b1a1a5e49f3