Analysis
-
max time kernel
150s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
28-08-2024 20:08
Static task
static1
Behavioral task
behavioral1
Sample
c790209bbac895252becb6085d2d00ee_JaffaCakes118.dll
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
c790209bbac895252becb6085d2d00ee_JaffaCakes118.dll
Resource
win10v2004-20240802-en
General
-
Target
c790209bbac895252becb6085d2d00ee_JaffaCakes118.dll
-
Size
5.0MB
-
MD5
c790209bbac895252becb6085d2d00ee
-
SHA1
4e0ba7cec21084c0dec9d8f5fc4f2bda04eae596
-
SHA256
5d71865fbb77e77c06e4c6319d17d1fd7368dddf00e588a2f6ddd90089604fd9
-
SHA512
e64eb6f0f7fe6daf057223cdc18969dfd4abaa43ec1b87e24293484494fa656d8b0226788edc6b0459ef07015973d920bf2a884d18fea6d67b67227c231d33a4
-
SSDEEP
98304:+DqPoBhz1aRxcSUDk36SAEdhvxWa9P593R8yACX:+DqPe1Cxcxk3ZAEUadzR8yPX
Malware Config
Signatures
-
Wannacry
WannaCry is a ransomware cryptoworm.
-
Contacts a large (3092) amount of remote hosts 1 TTPs
This may indicate a network scan to discover remotely running services.
-
Executes dropped EXE 3 IoCs
pid Process 2900 mssecsvc.exe 400 mssecsvc.exe 1160 tasksche.exe -
Creates a large amount of network flows 1 TTPs
This may indicate a network scan to discover remotely running services.
-
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\WINDOWS\mssecsvc.exe rundll32.exe File created C:\WINDOWS\tasksche.exe mssecsvc.exe -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mssecsvc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mssecsvc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Modifies data under HKEY_USERS 5 IoCs
description ioc Process Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ mssecsvc.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ProxyBypass = "1" mssecsvc.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\IntranetName = "1" mssecsvc.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\UNCAsIntranet = "1" mssecsvc.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\AutoDetect = "0" mssecsvc.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 3724 wrote to memory of 4576 3724 rundll32.exe 84 PID 3724 wrote to memory of 4576 3724 rundll32.exe 84 PID 3724 wrote to memory of 4576 3724 rundll32.exe 84 PID 4576 wrote to memory of 2900 4576 rundll32.exe 85 PID 4576 wrote to memory of 2900 4576 rundll32.exe 85 PID 4576 wrote to memory of 2900 4576 rundll32.exe 85
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\c790209bbac895252becb6085d2d00ee_JaffaCakes118.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:3724 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\c790209bbac895252becb6085d2d00ee_JaffaCakes118.dll,#12⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4576 -
C:\WINDOWS\mssecsvc.exeC:\WINDOWS\mssecsvc.exe3⤵
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:2900 -
C:\WINDOWS\tasksche.exeC:\WINDOWS\tasksche.exe /i4⤵
- Executes dropped EXE
PID:1160
-
-
-
-
C:\WINDOWS\mssecsvc.exeC:\WINDOWS\mssecsvc.exe -m security1⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Modifies data under HKEY_USERS
PID:400
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3.6MB
MD575d9b677df4242826e9e39fba61f1998
SHA1cad8010ffccf72b023f137d98b2f4192e6b0638f
SHA2561f48fd94257d160d33f81c5313f084792f852ea66442a9b8b1aefaeb1903de62
SHA512b01fbade0a4c8eed97f15064e9717f4571f957a6a6e68c93aa1a043a93f10fe7ea4c6cc52cbaee512e29b5431260331469519ea5e376c3906aab4d4fdc30d4a2
-
Filesize
3.4MB
MD57f990c78be8e9df841fca64ad59f4e27
SHA1bcdd93b81c8d7151cde394ca40fd5c75006d7e94
SHA2565d6d8530e968bd7690ccee2fa03521204c68988cc09ef5ddbd81e59ab72b637f
SHA512fb839ad5a4191ced1623da477d1546c40f35d6e76000796c0d1c3406091bd9a9a63254e3ef2dbb295f5d816910086c99bad742e731dc8da2529d4b74ee6eb248