Analysis
-
max time kernel
20s -
max time network
20s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
29-08-2024 06:15
Static task
static1
Behavioral task
behavioral1
Sample
c858b6229d33818de24f3549253298d9_JaffaCakes118.dll
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
c858b6229d33818de24f3549253298d9_JaffaCakes118.dll
Resource
win10v2004-20240802-en
General
-
Target
c858b6229d33818de24f3549253298d9_JaffaCakes118.dll
-
Size
5.0MB
-
MD5
c858b6229d33818de24f3549253298d9
-
SHA1
fa0aba1ca5228cf33d3b1bf3cb94887d89c741b0
-
SHA256
a68bcbb24666e4acfe96874f03f3bca170ac800980373e181f01db433736eebc
-
SHA512
9bbb0aa242c20d1055043868058bdc2fbf4ab338f2d96822adb24e2dc7f340e854054dc7bd038d35ec3796e4d36790b200069303ff419673a6a69da8ef4be3e2
-
SSDEEP
49152:znAQqMSPbcBVq/1INRx+TSqTdX1HkQo6SAARdhnvxJM0H9PAMEd:TDqPoBc1aRxcSUDk36SAEdhvxWa9P5S
Malware Config
Signatures
-
Wannacry
WannaCry is a ransomware cryptoworm.
-
Executes dropped EXE 3 IoCs
pid Process 1948 mssecsvc.exe 1308 mssecsvc.exe 2740 tasksche.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\Temporary Internet Files\counters.dat mssecsvc.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\WINDOWS\mssecsvc.exe rundll32.exe File created C:\WINDOWS\tasksche.exe mssecsvc.exe -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mssecsvc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mssecsvc.exe -
Modifies data under HKEY_USERS 24 IoCs
description ioc Process Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Content\CachePrefix mssecsvc.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Cookies\CachePrefix = "Cookie:" mssecsvc.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad mssecsvc.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{3B5B5FEF-0A76-4277-BDF3-1FF13DBB5F18}\WpadDecisionTime = 10af8ff0daf9da01 mssecsvc.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\da-7e-48-cd-dd-56 mssecsvc.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings mssecsvc.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ProxyEnable = "0" mssecsvc.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\SavedLegacySettings = 4600000002000000090000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 mssecsvc.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{3B5B5FEF-0A76-4277-BDF3-1FF13DBB5F18}\WpadDecision = "0" mssecsvc.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings mssecsvc.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ mssecsvc.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\DefaultConnectionSettings = 4600000003000000090000000000000000000000000000000400000000000000000000000000000000000000000000000000000001000000020000000a7f01a2000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 mssecsvc.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\da-7e-48-cd-dd-56\WpadDecisionReason = "1" mssecsvc.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\da-7e-48-cd-dd-56\WpadDecision = "0" mssecsvc.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections mssecsvc.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\DefaultConnectionSettings = 4600000002000000090000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 mssecsvc.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{3B5B5FEF-0A76-4277-BDF3-1FF13DBB5F18} mssecsvc.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{3B5B5FEF-0A76-4277-BDF3-1FF13DBB5F18}\WpadDecisionReason = "1" mssecsvc.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{3B5B5FEF-0A76-4277-BDF3-1FF13DBB5F18}\WpadNetworkName = "Network 3" mssecsvc.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{3B5B5FEF-0A76-4277-BDF3-1FF13DBB5F18}\da-7e-48-cd-dd-56 mssecsvc.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\da-7e-48-cd-dd-56\WpadDecisionTime = 10af8ff0daf9da01 mssecsvc.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\UNCAsIntranet = "0" mssecsvc.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\AutoDetect = "1" mssecsvc.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\History\CachePrefix = "Visited:" mssecsvc.exe -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 1704 wrote to memory of 1856 1704 rundll32.exe 30 PID 1704 wrote to memory of 1856 1704 rundll32.exe 30 PID 1704 wrote to memory of 1856 1704 rundll32.exe 30 PID 1704 wrote to memory of 1856 1704 rundll32.exe 30 PID 1704 wrote to memory of 1856 1704 rundll32.exe 30 PID 1704 wrote to memory of 1856 1704 rundll32.exe 30 PID 1704 wrote to memory of 1856 1704 rundll32.exe 30 PID 1856 wrote to memory of 1948 1856 rundll32.exe 31 PID 1856 wrote to memory of 1948 1856 rundll32.exe 31 PID 1856 wrote to memory of 1948 1856 rundll32.exe 31 PID 1856 wrote to memory of 1948 1856 rundll32.exe 31
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\c858b6229d33818de24f3549253298d9_JaffaCakes118.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1704 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\c858b6229d33818de24f3549253298d9_JaffaCakes118.dll,#12⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1856 -
C:\WINDOWS\mssecsvc.exeC:\WINDOWS\mssecsvc.exe3⤵
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:1948 -
C:\WINDOWS\tasksche.exeC:\WINDOWS\tasksche.exe /i4⤵
- Executes dropped EXE
PID:2740
-
-
-
-
C:\WINDOWS\mssecsvc.exeC:\WINDOWS\mssecsvc.exe -m security1⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies data under HKEY_USERS
PID:1308
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3.6MB
MD5abc2ac1b583032c5f2ddb636c34342c4
SHA1be9b9636376dd4a019227285896594d27c4fe353
SHA2560ef9d87cc6541d54f93149af4a12521b994aa9b1775b60e6ce60d0c5e5a930ce
SHA512cbfff0bb0f588b4debac0aab80adbfa232a9c73789a271088fea3725b123ad3f6d6fbfc90b73710e91cac40b999d6baac36fa35ccec99313376ccd938d6f7d7c
-
Filesize
3.4MB
MD55ffa0bf099b42864698794afac439aaa
SHA19b6a827cefd04ea268ef14160a67d4e3a1a67903
SHA256170c2e437ac932e396146ba0c7cd0b3d6b09cc4938f27455aca3b58505248f76
SHA512a8a7b8061bd87372ca783763827da0c878eb014875f86b5e6c9f42c8672d60e3c13d5851218bbf3db95c726c4eaa961b62e96941a8ff658f67bdadfaf6a33b4f