Analysis
-
max time kernel
150s -
max time network
150s -
platform
windows7_x64 -
resource
win7-20240729-en -
resource tags
arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system -
submitted
27-08-2024 17:43
Static task
static1
Behavioral task
behavioral1
Sample
c56bf13f6008d79d4a61abd78a2f9b99_JaffaCakes118.dll
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
c56bf13f6008d79d4a61abd78a2f9b99_JaffaCakes118.dll
Resource
win10v2004-20240802-en
General
-
Target
c56bf13f6008d79d4a61abd78a2f9b99_JaffaCakes118.dll
-
Size
5.0MB
-
MD5
c56bf13f6008d79d4a61abd78a2f9b99
-
SHA1
e64dfd3182fb3932aa526a9c1e803e7152d05f5b
-
SHA256
41a3bbfa2cad3856bd38582c56907730254327375b34b6936589049f3721ac34
-
SHA512
20c96190cbda3582db8bb3b38ecfce6abc2c59c2f5aa9dad8f8e0d6c7bbedc34c5a9c4013e903e49cbaab416f2556cd658bbdf853ba14f46c59abdb24cbec093
-
SSDEEP
24576:SbLgddQhfdmMSirYbcMNgef0PSrHV7YoZnA/70CUs1pNZtA0p+9XEk:SnAQqMSPbcBVarHV7YoG/QC51plAH
Malware Config
Signatures
-
Wannacry
WannaCry is a ransomware cryptoworm.
-
Contacts a large (3198) amount of remote hosts 1 TTPs
This may indicate a network scan to discover remotely running services.
-
Executes dropped EXE 3 IoCs
pid Process 2376 mssecsvc.exe 2420 mssecsvc.exe 2840 tasksche.exe -
Creates a large amount of network flows 1 TTPs
This may indicate a network scan to discover remotely running services.
-
Drops file in System32 directory 1 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\Temporary Internet Files\counters.dat mssecsvc.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\WINDOWS\mssecsvc.exe rundll32.exe File created C:\WINDOWS\tasksche.exe mssecsvc.exe -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mssecsvc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mssecsvc.exe -
Modifies data under HKEY_USERS 24 IoCs
description ioc Process Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{4293FF0F-0CAD-4D9F-A450-CB251F22B9F3}\WpadDecisionReason = "1" mssecsvc.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{4293FF0F-0CAD-4D9F-A450-CB251F22B9F3}\WpadNetworkName = "Network 3" mssecsvc.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings mssecsvc.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings mssecsvc.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\UNCAsIntranet = "0" mssecsvc.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\AutoDetect = "1" mssecsvc.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad mssecsvc.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{4293FF0F-0CAD-4D9F-A450-CB251F22B9F3}\WpadDecision = "0" mssecsvc.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\f2-ee-23-51-c7-65 mssecsvc.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\f2-ee-23-51-c7-65\WpadDecisionTime = 6047e9aaa8f8da01 mssecsvc.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections mssecsvc.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\DefaultConnectionSettings = 4600000002000000090000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 mssecsvc.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\SavedLegacySettings = 4600000002000000090000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 mssecsvc.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ mssecsvc.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Cookies\CachePrefix = "Cookie:" mssecsvc.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ProxyEnable = "0" mssecsvc.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\History\CachePrefix = "Visited:" mssecsvc.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{4293FF0F-0CAD-4D9F-A450-CB251F22B9F3} mssecsvc.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{4293FF0F-0CAD-4D9F-A450-CB251F22B9F3}\WpadDecisionTime = 6047e9aaa8f8da01 mssecsvc.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Content\CachePrefix mssecsvc.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\DefaultConnectionSettings = 4600000003000000090000000000000000000000000000000400000000000000000000000000000000000000000000000000000001000000020000000a7f012b000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 mssecsvc.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{4293FF0F-0CAD-4D9F-A450-CB251F22B9F3}\f2-ee-23-51-c7-65 mssecsvc.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\f2-ee-23-51-c7-65\WpadDecisionReason = "1" mssecsvc.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\f2-ee-23-51-c7-65\WpadDecision = "0" mssecsvc.exe -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 1744 wrote to memory of 2576 1744 rundll32.exe 29 PID 1744 wrote to memory of 2576 1744 rundll32.exe 29 PID 1744 wrote to memory of 2576 1744 rundll32.exe 29 PID 1744 wrote to memory of 2576 1744 rundll32.exe 29 PID 1744 wrote to memory of 2576 1744 rundll32.exe 29 PID 1744 wrote to memory of 2576 1744 rundll32.exe 29 PID 1744 wrote to memory of 2576 1744 rundll32.exe 29 PID 2576 wrote to memory of 2376 2576 rundll32.exe 30 PID 2576 wrote to memory of 2376 2576 rundll32.exe 30 PID 2576 wrote to memory of 2376 2576 rundll32.exe 30 PID 2576 wrote to memory of 2376 2576 rundll32.exe 30
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\c56bf13f6008d79d4a61abd78a2f9b99_JaffaCakes118.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1744 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\c56bf13f6008d79d4a61abd78a2f9b99_JaffaCakes118.dll,#12⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2576 -
C:\WINDOWS\mssecsvc.exeC:\WINDOWS\mssecsvc.exe3⤵
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:2376 -
C:\WINDOWS\tasksche.exeC:\WINDOWS\tasksche.exe /i4⤵
- Executes dropped EXE
PID:2840
-
-
-
-
C:\WINDOWS\mssecsvc.exeC:\WINDOWS\mssecsvc.exe -m security1⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies data under HKEY_USERS
PID:2420
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3.6MB
MD5036079676c72ee8a6f6d1edc3d11f440
SHA1055cacb6d5bd4353faed6c81f5036fb6fea2629c
SHA256b2374ebd0bba0c343cff2b282d8419be7fa87755a1d28b7c2e9586cfebe7e6b4
SHA512541509383cf4a9939bea546ed72c4eabb8e48a90878dac13e82c8319f95303c8713a4355da60bd3639c13bad3a3fed2dd4e5dd766001c256ca372486b9dc698f
-
Filesize
3.4MB
MD5570d0a9ff9259487a9098307b2382680
SHA1a1f78e18c9afc6a177d318f717c7670980059527
SHA256f599ccf76383b24001a15a46d197e33aea0d21697d1834be20e435c9ec1fe421
SHA5126e49fa01d5f73dc64c36dbd7aa368312c66c6deaad71beb5a9a5fb8c7e94985e86edb509439b6abf5d94acdf84d6b750e68e667c8c8de01e197a18f2d3e14660