Resubmissions
29-08-2024 14:14
240829-rj9j6sxgjq 1029-08-2024 14:14
240829-rj1bhaxfrn 1029-08-2024 14:02
240829-rb9j7svgkg 10Analysis
-
max time kernel
150s -
max time network
153s -
platform
windows7_x64 -
resource
win7-20240729-en -
resource tags
arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system -
submitted
29-08-2024 14:02
Static task
static1
Behavioral task
behavioral1
Sample
c8f70ac7e9954b061f38978bac453fdc_JaffaCakes118.dll
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
c8f70ac7e9954b061f38978bac453fdc_JaffaCakes118.dll
Resource
win10v2004-20240802-en
General
-
Target
c8f70ac7e9954b061f38978bac453fdc_JaffaCakes118.dll
-
Size
5.0MB
-
MD5
c8f70ac7e9954b061f38978bac453fdc
-
SHA1
608a4b167b7a4f5812decb0330959b2e4a825afb
-
SHA256
7dff4036c0f6b9c18d53d8d64a42a9bbee68cf8d2a88a79005759ea5b0b9f2d7
-
SHA512
e3fd00eb7db991eec1bcf6364520a34dd480059d9103bb7af78ab881b3adefb7ab1fc8f305a65e9ecc79df5a74ba31b46cc204d3f05df3e31160f0fbaec4587e
-
SSDEEP
98304:TDqPoBhz1aRxcSUDk36SAEdhvxWa9P593eAVp2H:TDqPe1Cxcxk3ZAEUadzec4H
Malware Config
Signatures
-
Wannacry
WannaCry is a ransomware cryptoworm.
-
Contacts a large (3204) amount of remote hosts 1 TTPs
This may indicate a network scan to discover remotely running services.
-
Executes dropped EXE 3 IoCs
pid Process 2584 mssecsvc.exe 2876 mssecsvc.exe 2668 tasksche.exe -
Creates a large amount of network flows 1 TTPs
This may indicate a network scan to discover remotely running services.
-
Drops file in System32 directory 1 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\Temporary Internet Files\counters.dat mssecsvc.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\WINDOWS\mssecsvc.exe rundll32.exe File created C:\WINDOWS\tasksche.exe mssecsvc.exe -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mssecsvc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mssecsvc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Modifies data under HKEY_USERS 24 IoCs
description ioc Process Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ mssecsvc.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\History\CachePrefix = "Visited:" mssecsvc.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\DefaultConnectionSettings = 4600000003000000090000000000000000000000000000000400000000000000000000000000000000000000000000000000000001000000020000000a7f012a000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 mssecsvc.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{58595A50-B574-4237-BE1E-D766ABB7B897}\WpadDecisionReason = "1" mssecsvc.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{58595A50-B574-4237-BE1E-D766ABB7B897}\72-42-4a-2e-87-c6 mssecsvc.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\72-42-4a-2e-87-c6\WpadDecisionReason = "1" mssecsvc.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\72-42-4a-2e-87-c6\WpadDecision = "0" mssecsvc.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections mssecsvc.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\72-42-4a-2e-87-c6 mssecsvc.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{58595A50-B574-4237-BE1E-D766ABB7B897}\WpadNetworkName = "Network 3" mssecsvc.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings mssecsvc.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ProxyEnable = "0" mssecsvc.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\UNCAsIntranet = "0" mssecsvc.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\AutoDetect = "1" mssecsvc.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad mssecsvc.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{58595A50-B574-4237-BE1E-D766ABB7B897}\WpadDecisionTime = a0d552211cfada01 mssecsvc.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{58595A50-B574-4237-BE1E-D766ABB7B897}\WpadDecision = "0" mssecsvc.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings mssecsvc.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\SavedLegacySettings = 4600000002000000090000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 mssecsvc.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Content\CachePrefix mssecsvc.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Cookies\CachePrefix = "Cookie:" mssecsvc.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{58595A50-B574-4237-BE1E-D766ABB7B897} mssecsvc.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\72-42-4a-2e-87-c6\WpadDecisionTime = a0d552211cfada01 mssecsvc.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\DefaultConnectionSettings = 4600000002000000090000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 mssecsvc.exe -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 2140 wrote to memory of 2596 2140 rundll32.exe 29 PID 2140 wrote to memory of 2596 2140 rundll32.exe 29 PID 2140 wrote to memory of 2596 2140 rundll32.exe 29 PID 2140 wrote to memory of 2596 2140 rundll32.exe 29 PID 2140 wrote to memory of 2596 2140 rundll32.exe 29 PID 2140 wrote to memory of 2596 2140 rundll32.exe 29 PID 2140 wrote to memory of 2596 2140 rundll32.exe 29 PID 2596 wrote to memory of 2584 2596 rundll32.exe 30 PID 2596 wrote to memory of 2584 2596 rundll32.exe 30 PID 2596 wrote to memory of 2584 2596 rundll32.exe 30 PID 2596 wrote to memory of 2584 2596 rundll32.exe 30
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\c8f70ac7e9954b061f38978bac453fdc_JaffaCakes118.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:2140 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\c8f70ac7e9954b061f38978bac453fdc_JaffaCakes118.dll,#12⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2596 -
C:\WINDOWS\mssecsvc.exeC:\WINDOWS\mssecsvc.exe3⤵
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:2584 -
C:\WINDOWS\tasksche.exeC:\WINDOWS\tasksche.exe /i4⤵
- Executes dropped EXE
PID:2668
-
-
-
-
C:\WINDOWS\mssecsvc.exeC:\WINDOWS\mssecsvc.exe -m security1⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies data under HKEY_USERS
PID:2876
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3.6MB
MD5873db523cf1a5c46201f70fa8d06477c
SHA127275b9858ecf9dcf7237a5f759b6c063d84d8c0
SHA25646a7188e237cc7e06842567b30a21336f88140c8f6259d8b9bb0482644335932
SHA512a17026a78f8d3390fa3b4dac2280ed27c3e504f9260da263c63aeaee8e60a9ed9f0b917e62a17ace38df828bd981c1f0f71582f0e85a2fef73bc7285505544fe
-
Filesize
3.4MB
MD5d7a781aa1f9da5d30708526320eba21b
SHA1951a80a582b3a13286643bc8228dc3e2506a9b92
SHA256d8cdfa66dfe433268ce31463dc1736ea21bbae75f21c0daf07febe16618d304a
SHA512afa75828bcdf96b6530ee6ae391b5900851d8d9e3929add2e252363bf923b39d127fb71ffa27f13f4ebece4aeff027a46b3777dae805caf94e73b02c73b9e711