Analysis
-
max time kernel
150s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
27-08-2024 18:07
Static task
static1
Behavioral task
behavioral1
Sample
c5762d667962eb4e7a3e6ded2a21df2a_JaffaCakes118.dll
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
c5762d667962eb4e7a3e6ded2a21df2a_JaffaCakes118.dll
Resource
win10v2004-20240802-en
General
-
Target
c5762d667962eb4e7a3e6ded2a21df2a_JaffaCakes118.dll
-
Size
5.0MB
-
MD5
c5762d667962eb4e7a3e6ded2a21df2a
-
SHA1
f6cbfc5da1352eaf29b3142ea59b979ce0e1cfbc
-
SHA256
3ac4f7151e276bc60fae33fa70b847376551f1f486b46d16d8dc37c7bfcb99b1
-
SHA512
d00dbe7e81e10702d1670e4c6005cab812371eb39f1344e10f2046fccf21fdcb3951d0544228b9cb62a4dfcca4f920f59653e95d3e8b5ddbee042aef33eede57
-
SSDEEP
24576:SbLgddQhfdmMSirYbcMNgef0QeQjG/D8kIqRYoAdNLKz66269Wo/OqAH1pNZtA0U:SnAQqMSPbcBVQej/1INRsW+FAH1plAH
Malware Config
Signatures
-
Wannacry
WannaCry is a ransomware cryptoworm.
-
Contacts a large (3172) amount of remote hosts 1 TTPs
This may indicate a network scan to discover remotely running services.
-
Executes dropped EXE 3 IoCs
pid Process 4712 mssecsvc.exe 4812 mssecsvc.exe 816 tasksche.exe -
Creates a large amount of network flows 1 TTPs
This may indicate a network scan to discover remotely running services.
-
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\WINDOWS\tasksche.exe mssecsvc.exe File created C:\WINDOWS\mssecsvc.exe rundll32.exe -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mssecsvc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mssecsvc.exe -
Modifies data under HKEY_USERS 5 IoCs
description ioc Process Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\IntranetName = "1" mssecsvc.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\UNCAsIntranet = "1" mssecsvc.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\AutoDetect = "0" mssecsvc.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ mssecsvc.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ProxyBypass = "1" mssecsvc.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 4324 wrote to memory of 4656 4324 rundll32.exe 83 PID 4324 wrote to memory of 4656 4324 rundll32.exe 83 PID 4324 wrote to memory of 4656 4324 rundll32.exe 83 PID 4656 wrote to memory of 4712 4656 rundll32.exe 84 PID 4656 wrote to memory of 4712 4656 rundll32.exe 84 PID 4656 wrote to memory of 4712 4656 rundll32.exe 84
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\c5762d667962eb4e7a3e6ded2a21df2a_JaffaCakes118.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:4324 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\c5762d667962eb4e7a3e6ded2a21df2a_JaffaCakes118.dll,#12⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4656 -
C:\WINDOWS\mssecsvc.exeC:\WINDOWS\mssecsvc.exe3⤵
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:4712 -
C:\WINDOWS\tasksche.exeC:\WINDOWS\tasksche.exe /i4⤵
- Executes dropped EXE
PID:816
-
-
-
-
C:\WINDOWS\mssecsvc.exeC:\WINDOWS\mssecsvc.exe -m security1⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Modifies data under HKEY_USERS
PID:4812
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3.6MB
MD52091b08927e31b717ec6cdf362f37562
SHA150d299ab2c87ba540b463b690de502e27c70a5f5
SHA2567d7538b2d21e9b142e09914430f0100b647c9332bcbf9221f2ea383703ef1367
SHA5127b4a379ece38941d4802298d2bb44c8900e7c7b8bd44f2f6a5a33cdf73f6a20e46d6a6aa77e0768db4cb4c3073d0e3bcbf330cab6bc76772b303073236f17dba
-
Filesize
3.4MB
MD5c3a5410c8016d4ff2c1b760d297ddfe9
SHA171e58d3c53e7abba02e7cd5b5ec17ac4caf674a7
SHA256b506a06681d2c95f8223e4d77a197e8768e1139d84f9900bc2b6cb6b9cd1ca19
SHA51281b211191c9ece5ed4ac63fdfb61c6ef6a90e2f5a316943294c4d10e92886463f6030f0fc9397857bf842a08012bc3973426b9f276508b9a17a080d0f84b673e