Resubmissions
29-08-2024 14:14
240829-rj9j6sxgjq 1029-08-2024 14:14
240829-rj1bhaxfrn 1029-08-2024 14:02
240829-rb9j7svgkg 10Analysis
-
max time kernel
1800s -
max time network
1801s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
29-08-2024 14:14
Static task
static1
Behavioral task
behavioral1
Sample
c8f70ac7e9954b061f38978bac453fdc_JaffaCakes118.dll
Resource
win10v2004-20240802-en
General
-
Target
c8f70ac7e9954b061f38978bac453fdc_JaffaCakes118.dll
-
Size
5.0MB
-
MD5
c8f70ac7e9954b061f38978bac453fdc
-
SHA1
608a4b167b7a4f5812decb0330959b2e4a825afb
-
SHA256
7dff4036c0f6b9c18d53d8d64a42a9bbee68cf8d2a88a79005759ea5b0b9f2d7
-
SHA512
e3fd00eb7db991eec1bcf6364520a34dd480059d9103bb7af78ab881b3adefb7ab1fc8f305a65e9ecc79df5a74ba31b46cc204d3f05df3e31160f0fbaec4587e
-
SSDEEP
98304:TDqPoBhz1aRxcSUDk36SAEdhvxWa9P593eAVp2H:TDqPe1Cxcxk3ZAEUadzec4H
Malware Config
Signatures
-
Wannacry
WannaCry is a ransomware cryptoworm.
-
Contacts a large (36320) amount of remote hosts 1 TTPs
This may indicate a network scan to discover remotely running services.
-
Creates a large amount of network flows 1 TTPs
This may indicate a network scan to discover remotely running services.
-
Executes dropped EXE 3 IoCs
pid Process 4256 mssecsvc.exe 1676 mssecsvc.exe 1204 tasksche.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\WINDOWS\mssecsvc.exe rundll32.exe File created C:\WINDOWS\tasksche.exe mssecsvc.exe -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mssecsvc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mssecsvc.exe -
Modifies data under HKEY_USERS 5 IoCs
description ioc Process Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ mssecsvc.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ProxyBypass = "1" mssecsvc.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\IntranetName = "1" mssecsvc.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\UNCAsIntranet = "1" mssecsvc.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\AutoDetect = "0" mssecsvc.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 1772 wrote to memory of 1944 1772 rundll32.exe 93 PID 1772 wrote to memory of 1944 1772 rundll32.exe 93 PID 1772 wrote to memory of 1944 1772 rundll32.exe 93 PID 1944 wrote to memory of 4256 1944 rundll32.exe 94 PID 1944 wrote to memory of 4256 1944 rundll32.exe 94 PID 1944 wrote to memory of 4256 1944 rundll32.exe 94
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\c8f70ac7e9954b061f38978bac453fdc_JaffaCakes118.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1772 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\c8f70ac7e9954b061f38978bac453fdc_JaffaCakes118.dll,#12⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1944 -
C:\WINDOWS\mssecsvc.exeC:\WINDOWS\mssecsvc.exe3⤵
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:4256 -
C:\WINDOWS\tasksche.exeC:\WINDOWS\tasksche.exe /i4⤵
- Executes dropped EXE
PID:1204
-
-
-
-
C:\WINDOWS\mssecsvc.exeC:\WINDOWS\mssecsvc.exe -m security1⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Modifies data under HKEY_USERS
PID:1676
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --field-trial-handle=4460,i,10597648459838880772,16562651767759956329,262144 --variations-seed-version --mojo-platform-channel-handle=4344 /prefetch:81⤵PID:948
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --field-trial-handle=4076,i,10597648459838880772,16562651767759956329,262144 --variations-seed-version --mojo-platform-channel-handle=4068 /prefetch:81⤵PID:4300
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3.6MB
MD5873db523cf1a5c46201f70fa8d06477c
SHA127275b9858ecf9dcf7237a5f759b6c063d84d8c0
SHA25646a7188e237cc7e06842567b30a21336f88140c8f6259d8b9bb0482644335932
SHA512a17026a78f8d3390fa3b4dac2280ed27c3e504f9260da263c63aeaee8e60a9ed9f0b917e62a17ace38df828bd981c1f0f71582f0e85a2fef73bc7285505544fe
-
Filesize
3.4MB
MD5d7a781aa1f9da5d30708526320eba21b
SHA1951a80a582b3a13286643bc8228dc3e2506a9b92
SHA256d8cdfa66dfe433268ce31463dc1736ea21bbae75f21c0daf07febe16618d304a
SHA512afa75828bcdf96b6530ee6ae391b5900851d8d9e3929add2e252363bf923b39d127fb71ffa27f13f4ebece4aeff027a46b3777dae805caf94e73b02c73b9e711