Analysis
-
max time kernel
13s -
max time network
17s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
29-08-2024 06:15
Static task
static1
Behavioral task
behavioral1
Sample
c858b6229d33818de24f3549253298d9_JaffaCakes118.dll
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
c858b6229d33818de24f3549253298d9_JaffaCakes118.dll
Resource
win10v2004-20240802-en
General
-
Target
c858b6229d33818de24f3549253298d9_JaffaCakes118.dll
-
Size
5.0MB
-
MD5
c858b6229d33818de24f3549253298d9
-
SHA1
fa0aba1ca5228cf33d3b1bf3cb94887d89c741b0
-
SHA256
a68bcbb24666e4acfe96874f03f3bca170ac800980373e181f01db433736eebc
-
SHA512
9bbb0aa242c20d1055043868058bdc2fbf4ab338f2d96822adb24e2dc7f340e854054dc7bd038d35ec3796e4d36790b200069303ff419673a6a69da8ef4be3e2
-
SSDEEP
49152:znAQqMSPbcBVq/1INRx+TSqTdX1HkQo6SAARdhnvxJM0H9PAMEd:TDqPoBc1aRxcSUDk36SAEdhvxWa9P5S
Malware Config
Signatures
-
Wannacry
WannaCry is a ransomware cryptoworm.
-
Executes dropped EXE 3 IoCs
pid Process 1404 mssecsvc.exe 960 mssecsvc.exe 3608 tasksche.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\WINDOWS\mssecsvc.exe rundll32.exe File created C:\WINDOWS\tasksche.exe mssecsvc.exe -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mssecsvc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mssecsvc.exe -
Modifies data under HKEY_USERS 5 IoCs
description ioc Process Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\AutoDetect = "0" mssecsvc.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ mssecsvc.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ProxyBypass = "1" mssecsvc.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\IntranetName = "1" mssecsvc.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\UNCAsIntranet = "1" mssecsvc.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 1664 wrote to memory of 936 1664 rundll32.exe 84 PID 1664 wrote to memory of 936 1664 rundll32.exe 84 PID 1664 wrote to memory of 936 1664 rundll32.exe 84 PID 936 wrote to memory of 1404 936 rundll32.exe 85 PID 936 wrote to memory of 1404 936 rundll32.exe 85 PID 936 wrote to memory of 1404 936 rundll32.exe 85
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\c858b6229d33818de24f3549253298d9_JaffaCakes118.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1664 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\c858b6229d33818de24f3549253298d9_JaffaCakes118.dll,#12⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:936 -
C:\WINDOWS\mssecsvc.exeC:\WINDOWS\mssecsvc.exe3⤵
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:1404 -
C:\WINDOWS\tasksche.exeC:\WINDOWS\tasksche.exe /i4⤵
- Executes dropped EXE
PID:3608
-
-
-
-
C:\WINDOWS\mssecsvc.exeC:\WINDOWS\mssecsvc.exe -m security1⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Modifies data under HKEY_USERS
PID:960
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3.6MB
MD5abc2ac1b583032c5f2ddb636c34342c4
SHA1be9b9636376dd4a019227285896594d27c4fe353
SHA2560ef9d87cc6541d54f93149af4a12521b994aa9b1775b60e6ce60d0c5e5a930ce
SHA512cbfff0bb0f588b4debac0aab80adbfa232a9c73789a271088fea3725b123ad3f6d6fbfc90b73710e91cac40b999d6baac36fa35ccec99313376ccd938d6f7d7c
-
Filesize
3.4MB
MD55ffa0bf099b42864698794afac439aaa
SHA19b6a827cefd04ea268ef14160a67d4e3a1a67903
SHA256170c2e437ac932e396146ba0c7cd0b3d6b09cc4938f27455aca3b58505248f76
SHA512a8a7b8061bd87372ca783763827da0c878eb014875f86b5e6c9f42c8672d60e3c13d5851218bbf3db95c726c4eaa961b62e96941a8ff658f67bdadfaf6a33b4f