Analysis
-
max time kernel
150s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
28-08-2024 17:49
Static task
static1
Behavioral task
behavioral1
Sample
c7595b1085a6bc7f1bdf81a22ef6b820_JaffaCakes118.dll
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
c7595b1085a6bc7f1bdf81a22ef6b820_JaffaCakes118.dll
Resource
win10v2004-20240802-en
General
-
Target
c7595b1085a6bc7f1bdf81a22ef6b820_JaffaCakes118.dll
-
Size
5.0MB
-
MD5
c7595b1085a6bc7f1bdf81a22ef6b820
-
SHA1
4dc7cf889f1d7872ffdaa34fc9c2178aa430f259
-
SHA256
d4815e140756483d9fc9bc4aa5700504ae605cae146c30791ab2af81e7151cad
-
SHA512
df878824bef175b32ec77ca216735a5a27b47f019c127e0d3d116989b25c84dec0ff2ec242d5e0e76b6e2d89fa3d0fb362ba303fccaf3715fff26c2305b1cc74
-
SSDEEP
49152:znAQqMSPbcBVQej/1INRx+TSqTdX1HkQo6SA0vxJM0H9DAH1plA:TDqPoBhz1aRxcSUDk36SA8xWa9DAVp2
Malware Config
Signatures
-
Wannacry
WannaCry is a ransomware cryptoworm.
-
Contacts a large (3149) amount of remote hosts 1 TTPs
This may indicate a network scan to discover remotely running services.
-
Executes dropped EXE 3 IoCs
pid Process 4744 mssecsvc.exe 2804 mssecsvc.exe 1180 tasksche.exe -
Creates a large amount of network flows 1 TTPs
This may indicate a network scan to discover remotely running services.
-
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\WINDOWS\mssecsvc.exe rundll32.exe File created C:\WINDOWS\tasksche.exe mssecsvc.exe -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mssecsvc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mssecsvc.exe -
Modifies data under HKEY_USERS 5 IoCs
description ioc Process Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ mssecsvc.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ProxyBypass = "1" mssecsvc.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\IntranetName = "1" mssecsvc.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\UNCAsIntranet = "1" mssecsvc.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\AutoDetect = "0" mssecsvc.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 3368 wrote to memory of 228 3368 rundll32.exe 91 PID 3368 wrote to memory of 228 3368 rundll32.exe 91 PID 3368 wrote to memory of 228 3368 rundll32.exe 91 PID 228 wrote to memory of 4744 228 rundll32.exe 92 PID 228 wrote to memory of 4744 228 rundll32.exe 92 PID 228 wrote to memory of 4744 228 rundll32.exe 92
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\c7595b1085a6bc7f1bdf81a22ef6b820_JaffaCakes118.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:3368 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\c7595b1085a6bc7f1bdf81a22ef6b820_JaffaCakes118.dll,#12⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:228 -
C:\WINDOWS\mssecsvc.exeC:\WINDOWS\mssecsvc.exe3⤵
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:4744 -
C:\WINDOWS\tasksche.exeC:\WINDOWS\tasksche.exe /i4⤵
- Executes dropped EXE
PID:1180
-
-
-
-
C:\WINDOWS\mssecsvc.exeC:\WINDOWS\mssecsvc.exe -m security1⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Modifies data under HKEY_USERS
PID:2804
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --field-trial-handle=4212,i,13995403245988825027,7033610968827661507,262144 --variations-seed-version --mojo-platform-channel-handle=1316 /prefetch:81⤵PID:4704
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3.6MB
MD500dc5da70c8df466cfb8d5d3ed6bf0d1
SHA1c84a660036e064f27a77eb0a4cd7badb62371c8e
SHA256017acbabbcfd9e579af9095d77e83181165de10fb04a40697b6801593fa2dd8d
SHA5129e00f41cdcf1e2416352d9f2ebe8871184ea5a248c72955e272ca1f137c9743715836b695f3fc04343438f7ac98ec2eca1d2875661d9466a3d0960c4e4901d43
-
Filesize
3.4MB
MD5ff60bf4157e2d76fd985a1043886cafb
SHA16cf4f3a6e3d1ae95a8ab97b08514c6909b3599be
SHA256ef6124fa6041b086a5472db92c1f46c48029625bfc8dc0044b0816debc1e2f70
SHA512a3375f761ac10590b8a7145e081752c485b57aee8b9882b21697f6255fcab32392703a8e8b8263dac9195acc84a063dc8c4c838256860788e71a172155959f73