Resubmissions
29-08-2024 14:14
240829-rj9j6sxgjq 1029-08-2024 14:14
240829-rj1bhaxfrn 1029-08-2024 14:02
240829-rb9j7svgkg 10Analysis
-
max time kernel
20s -
max time network
21s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
29-08-2024 14:14
Static task
static1
Behavioral task
behavioral1
Sample
c8f70ac7e9954b061f38978bac453fdc_JaffaCakes118.dll
Resource
win10v2004-20240802-en
Errors
General
-
Target
c8f70ac7e9954b061f38978bac453fdc_JaffaCakes118.dll
-
Size
5.0MB
-
MD5
c8f70ac7e9954b061f38978bac453fdc
-
SHA1
608a4b167b7a4f5812decb0330959b2e4a825afb
-
SHA256
7dff4036c0f6b9c18d53d8d64a42a9bbee68cf8d2a88a79005759ea5b0b9f2d7
-
SHA512
e3fd00eb7db991eec1bcf6364520a34dd480059d9103bb7af78ab881b3adefb7ab1fc8f305a65e9ecc79df5a74ba31b46cc204d3f05df3e31160f0fbaec4587e
-
SSDEEP
98304:TDqPoBhz1aRxcSUDk36SAEdhvxWa9P593eAVp2H:TDqPe1Cxcxk3ZAEUadzec4H
Malware Config
Signatures
-
Wannacry
WannaCry is a ransomware cryptoworm.
-
Executes dropped EXE 3 IoCs
pid Process 408 mssecsvc.exe 1644 mssecsvc.exe 1712 tasksche.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\WINDOWS\mssecsvc.exe rundll32.exe File created C:\WINDOWS\tasksche.exe mssecsvc.exe -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mssecsvc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mssecsvc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Modifies data under HKEY_USERS 20 IoCs
description ioc Process Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\Accent\AccentColorMenu = "4292311040" LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\ColorizationColorBalance = "89" LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\ColorizationAfterglow = "3288365271" LogonUI.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\Accent\AccentPalette = a6d8ff0076b9ed00429ce3000078d700005a9e000042750000264200f7630c00 LogonUI.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Themes\History LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\Accent\StartColorMenu = "4288567808" LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\AccentColor = "4292311040" LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\ColorizationColor = "3288365271" LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\ColorizationBlurBalance = "1" LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\UNCAsIntranet = "1" mssecsvc.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\AutoDetect = "0" mssecsvc.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\EnableWindowColorization = "103" LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\ColorizationGlassAttribute = "1" LogonUI.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ mssecsvc.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ProxyBypass = "1" mssecsvc.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\IntranetName = "1" mssecsvc.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\Accent LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Themes\History\AutoColor = "0" LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\ColorizationAfterglowBalance = "10" LogonUI.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 1980 LogonUI.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 1776 wrote to memory of 2276 1776 rundll32.exe 84 PID 1776 wrote to memory of 2276 1776 rundll32.exe 84 PID 1776 wrote to memory of 2276 1776 rundll32.exe 84 PID 2276 wrote to memory of 408 2276 rundll32.exe 86 PID 2276 wrote to memory of 408 2276 rundll32.exe 86 PID 2276 wrote to memory of 408 2276 rundll32.exe 86
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\c8f70ac7e9954b061f38978bac453fdc_JaffaCakes118.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1776 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\c8f70ac7e9954b061f38978bac453fdc_JaffaCakes118.dll,#12⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2276 -
C:\WINDOWS\mssecsvc.exeC:\WINDOWS\mssecsvc.exe3⤵
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:408 -
C:\WINDOWS\tasksche.exeC:\WINDOWS\tasksche.exe /i4⤵
- Executes dropped EXE
PID:1712
-
-
-
-
C:\WINDOWS\mssecsvc.exeC:\WINDOWS\mssecsvc.exe -m security1⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Modifies data under HKEY_USERS
PID:1644
-
C:\Windows\system32\LogonUI.exe"LogonUI.exe" /flags:0x4 /state0:0xa3949055 /state1:0x41c64e6d1⤵
- Modifies data under HKEY_USERS
- Suspicious use of SetWindowsHookEx
PID:1980
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3.6MB
MD5873db523cf1a5c46201f70fa8d06477c
SHA127275b9858ecf9dcf7237a5f759b6c063d84d8c0
SHA25646a7188e237cc7e06842567b30a21336f88140c8f6259d8b9bb0482644335932
SHA512a17026a78f8d3390fa3b4dac2280ed27c3e504f9260da263c63aeaee8e60a9ed9f0b917e62a17ace38df828bd981c1f0f71582f0e85a2fef73bc7285505544fe
-
Filesize
3.4MB
MD5d7a781aa1f9da5d30708526320eba21b
SHA1951a80a582b3a13286643bc8228dc3e2506a9b92
SHA256d8cdfa66dfe433268ce31463dc1736ea21bbae75f21c0daf07febe16618d304a
SHA512afa75828bcdf96b6530ee6ae391b5900851d8d9e3929add2e252363bf923b39d127fb71ffa27f13f4ebece4aeff027a46b3777dae805caf94e73b02c73b9e711