Analysis
-
max time kernel
150s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
31-08-2024 09:11
Static task
static1
Behavioral task
behavioral1
Sample
cc891b7ffdd5b65b3c09fefa79771478_JaffaCakes118.dll
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
cc891b7ffdd5b65b3c09fefa79771478_JaffaCakes118.dll
Resource
win10v2004-20240802-en
General
-
Target
cc891b7ffdd5b65b3c09fefa79771478_JaffaCakes118.dll
-
Size
5.0MB
-
MD5
cc891b7ffdd5b65b3c09fefa79771478
-
SHA1
10ff3945eb3b1e83b687303c3969ee0defada423
-
SHA256
6047c58757dba0b446e56f27f2c32a6ff87a56b8e4c63d5798a1c5ff4a582542
-
SHA512
f32c11dfd9fb0ef0bab628457d1d3e67bd64b139cabf19fe74044cd6ab432445a2a53ce98f845e1f21a5a233c9eb648f3ad3230caf88fbf64faf3dc30cacdbf7
-
SSDEEP
49152:znAQqMSu+TSqTdX1HkQo6SAARdhnvxJM0H9PAMEcaEau3:TDqucSUDk36SAEdhvxWa9P593
Malware Config
Signatures
-
Wannacry
WannaCry is a ransomware cryptoworm.
-
Contacts a large (3134) amount of remote hosts 1 TTPs
This may indicate a network scan to discover remotely running services.
-
Executes dropped EXE 3 IoCs
pid Process 3620 mssecsvc.exe 4808 mssecsvc.exe 2132 tasksche.exe -
Creates a large amount of network flows 1 TTPs
This may indicate a network scan to discover remotely running services.
-
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\WINDOWS\mssecsvc.exe rundll32.exe File created C:\WINDOWS\tasksche.exe mssecsvc.exe -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mssecsvc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mssecsvc.exe -
Modifies data under HKEY_USERS 5 IoCs
description ioc Process Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\UNCAsIntranet = "1" mssecsvc.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\AutoDetect = "0" mssecsvc.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ mssecsvc.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ProxyBypass = "1" mssecsvc.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\IntranetName = "1" mssecsvc.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 1588 wrote to memory of 2288 1588 rundll32.exe 84 PID 1588 wrote to memory of 2288 1588 rundll32.exe 84 PID 1588 wrote to memory of 2288 1588 rundll32.exe 84 PID 2288 wrote to memory of 3620 2288 rundll32.exe 87 PID 2288 wrote to memory of 3620 2288 rundll32.exe 87 PID 2288 wrote to memory of 3620 2288 rundll32.exe 87
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\cc891b7ffdd5b65b3c09fefa79771478_JaffaCakes118.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1588 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\cc891b7ffdd5b65b3c09fefa79771478_JaffaCakes118.dll,#12⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2288 -
C:\WINDOWS\mssecsvc.exeC:\WINDOWS\mssecsvc.exe3⤵
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:3620 -
C:\WINDOWS\tasksche.exeC:\WINDOWS\tasksche.exe /i4⤵
- Executes dropped EXE
PID:2132
-
-
-
-
C:\WINDOWS\mssecsvc.exeC:\WINDOWS\mssecsvc.exe -m security1⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Modifies data under HKEY_USERS
PID:4808
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3.6MB
MD5aeccfe573224cb1bdd2001f5fb4c960e
SHA1e9a085c4f5bf11d78b31064f0c1a6fc3eea51bf6
SHA256875865da96ec452ce8a7d5eb18ae4cd034037f1ec136b8c9dabb809f8b1bf95c
SHA512924750a346db877f38f22619a59673a354d70113320581c5ca20fe506fc70c2aab9817621c0e4bab3eedf4139627c2cc63e9cea701bcfd72b3162e9bf05b1b51
-
Filesize
3.4MB
MD59bfb4e442eb75eadd48c617bb936b1ba
SHA19ba3b35b881a4e8555de4346e6a6f6fde7fc4ac7
SHA25657b04e5d1f6953eecf8378a7d3306460bcfcfe83f185ff22e8a8596b27b368b8
SHA512d63a9787876c42b6106be55755fc0a194554b1911255f57a0db61ef59610e9327c47c2fc4d5298b09e5e2e0a38d2987671c8fe4e339a82ce8c7ff89016f236a1