Analysis
-
max time kernel
150s -
max time network
153s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
31-08-2024 01:02
Static task
static1
Behavioral task
behavioral1
Sample
cbfbe34fc43e67e434767165510719db_JaffaCakes118.dll
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
cbfbe34fc43e67e434767165510719db_JaffaCakes118.dll
Resource
win10v2004-20240802-en
General
-
Target
cbfbe34fc43e67e434767165510719db_JaffaCakes118.dll
-
Size
5.0MB
-
MD5
cbfbe34fc43e67e434767165510719db
-
SHA1
9ed7ebd66c1024527cce2e800186ec257972687e
-
SHA256
e2e991ee9abd3808e33e7a08052f422eecb8e8c82779a306787331b45770fc6b
-
SHA512
621a81e55caacffe96a05db291762c377aeed6a6102913e1bdcbb7ebb8bfaea7643aea801cc1a17ec61d4b65b5d318e0bcbf78e2d0fa2beef2de99d1f967550c
-
SSDEEP
98304:+DqPoBhz1aRxcSUDk36SAEdhvxWa9TPebdWOC:+DqPe1Cxcxk3ZAEUagbd3C
Malware Config
Signatures
-
Wannacry
WannaCry is a ransomware cryptoworm.
-
Contacts a large (3217) amount of remote hosts 1 TTPs
This may indicate a network scan to discover remotely running services.
-
Executes dropped EXE 3 IoCs
pid Process 1884 mssecsvc.exe 2720 mssecsvc.exe 2648 tasksche.exe -
Creates a large amount of network flows 1 TTPs
This may indicate a network scan to discover remotely running services.
-
Drops file in System32 directory 1 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\Temporary Internet Files\counters.dat mssecsvc.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\WINDOWS\mssecsvc.exe rundll32.exe File created C:\WINDOWS\tasksche.exe mssecsvc.exe -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mssecsvc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mssecsvc.exe -
Modifies data under HKEY_USERS 24 IoCs
description ioc Process Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ mssecsvc.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\AutoDetect = "1" mssecsvc.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Content\CachePrefix mssecsvc.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Cookies\CachePrefix = "Cookie:" mssecsvc.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\History\CachePrefix = "Visited:" mssecsvc.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\DefaultConnectionSettings = 4600000003000000090000000000000000000000000000000400000000000000000000000000000000000000000000000000000001000000020000000a7f0091000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 mssecsvc.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{0743F437-9375-41C9-8515-620C40B4647C}\72-e6-76-18-6b-4f mssecsvc.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings mssecsvc.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ProxyEnable = "0" mssecsvc.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\SavedLegacySettings = 4600000002000000090000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 mssecsvc.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{0743F437-9375-41C9-8515-620C40B4647C} mssecsvc.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{0743F437-9375-41C9-8515-620C40B4647C}\WpadDecisionReason = "1" mssecsvc.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{0743F437-9375-41C9-8515-620C40B4647C}\WpadDecisionTime = 005c229a41fbda01 mssecsvc.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\72-e6-76-18-6b-4f\WpadDecisionReason = "1" mssecsvc.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\DefaultConnectionSettings = 4600000002000000090000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 mssecsvc.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{0743F437-9375-41C9-8515-620C40B4647C}\WpadDecision = "0" mssecsvc.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{0743F437-9375-41C9-8515-620C40B4647C}\WpadNetworkName = "Network 3" mssecsvc.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\72-e6-76-18-6b-4f\WpadDecision = "0" mssecsvc.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad mssecsvc.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings mssecsvc.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\UNCAsIntranet = "0" mssecsvc.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\72-e6-76-18-6b-4f mssecsvc.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\72-e6-76-18-6b-4f\WpadDecisionTime = 005c229a41fbda01 mssecsvc.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections mssecsvc.exe -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 2940 wrote to memory of 2484 2940 rundll32.exe 31 PID 2940 wrote to memory of 2484 2940 rundll32.exe 31 PID 2940 wrote to memory of 2484 2940 rundll32.exe 31 PID 2940 wrote to memory of 2484 2940 rundll32.exe 31 PID 2940 wrote to memory of 2484 2940 rundll32.exe 31 PID 2940 wrote to memory of 2484 2940 rundll32.exe 31 PID 2940 wrote to memory of 2484 2940 rundll32.exe 31 PID 2484 wrote to memory of 1884 2484 rundll32.exe 32 PID 2484 wrote to memory of 1884 2484 rundll32.exe 32 PID 2484 wrote to memory of 1884 2484 rundll32.exe 32 PID 2484 wrote to memory of 1884 2484 rundll32.exe 32
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\cbfbe34fc43e67e434767165510719db_JaffaCakes118.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:2940 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\cbfbe34fc43e67e434767165510719db_JaffaCakes118.dll,#12⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2484 -
C:\WINDOWS\mssecsvc.exeC:\WINDOWS\mssecsvc.exe3⤵
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:1884 -
C:\WINDOWS\tasksche.exeC:\WINDOWS\tasksche.exe /i4⤵
- Executes dropped EXE
PID:2648
-
-
-
-
C:\WINDOWS\mssecsvc.exeC:\WINDOWS\mssecsvc.exe -m security1⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies data under HKEY_USERS
PID:2720
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3.6MB
MD563e13ec0c78c1974ac2b02a81373d4ad
SHA14c636516fc7ff928bb37f4b110ab42cfcbc07b6f
SHA256e44aa69cc55379ef56b1dc7fe42e4bcc635182d5b614031a7199623d3a15ada2
SHA512cf1080195b8eeeb840fad90260119041d290606403df40c59cf992a619af11ef0bc89d384482f58e38eb92b21d57f180110ab7c5063641f4fc29483fdb5ce8b5
-
Filesize
3.4MB
MD5751ddc0849cc50fd793139be891727d8
SHA168b46bcacd6eb4143bff80b1ba21499b572e37eb
SHA256441a0bd0cc2d2e9555cd5428edb33ce6a900af705198206f8366b3ec1ed3b13a
SHA51208961c490a041557bdf9c522a85f4343658293fe730b1f8a2ba2eb3d4216db748aa35397e5910568f9df8d76250aea15090ef29a22f9ec32754441337c1169c2