Analysis
-
max time kernel
150s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
06-09-2024 00:03
Static task
static1
Behavioral task
behavioral1
Sample
ce345025577e26843946a5b2456eeada_JaffaCakes118.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
ce345025577e26843946a5b2456eeada_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
ce345025577e26843946a5b2456eeada_JaffaCakes118.exe
-
Size
3.6MB
-
MD5
ce345025577e26843946a5b2456eeada
-
SHA1
2144fcb2ee7b4b694bb0abde64b8c3d71ead864a
-
SHA256
2fab19259a6a8ce55fed8ce40e3f2d1cf630461e177193696683e76d220c44ea
-
SHA512
70e99c1470d2a747b3ad31f0326b30e459570c1c26f1bbb68b9c5bb687bc57cb93bc1689e767deb73fd28234aab96cd141927130de7463f2a8fd9c1b25dd3a7d
-
SSDEEP
98304:yDqPoBRcSUDk36SAEdhvxWa9P593R8yAVp2HI:yDqP+cxk3ZAEUadzR8yc4HI
Malware Config
Signatures
-
Wannacry
WannaCry is a ransomware cryptoworm.
-
Contacts a large (3337) amount of remote hosts 1 TTPs
This may indicate a network scan to discover remotely running services.
-
Executes dropped EXE 1 IoCs
pid Process 4984 tasksche.exe -
Creates a large amount of network flows 1 TTPs
This may indicate a network scan to discover remotely running services.
-
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\WINDOWS\tasksche.exe ce345025577e26843946a5b2456eeada_JaffaCakes118.exe -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ce345025577e26843946a5b2456eeada_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ce345025577e26843946a5b2456eeada_JaffaCakes118.exe -
Modifies data under HKEY_USERS 5 IoCs
description ioc Process Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ ce345025577e26843946a5b2456eeada_JaffaCakes118.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ProxyBypass = "1" ce345025577e26843946a5b2456eeada_JaffaCakes118.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\IntranetName = "1" ce345025577e26843946a5b2456eeada_JaffaCakes118.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\UNCAsIntranet = "1" ce345025577e26843946a5b2456eeada_JaffaCakes118.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\AutoDetect = "0" ce345025577e26843946a5b2456eeada_JaffaCakes118.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\ce345025577e26843946a5b2456eeada_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\ce345025577e26843946a5b2456eeada_JaffaCakes118.exe"1⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:768 -
C:\WINDOWS\tasksche.exeC:\WINDOWS\tasksche.exe /i2⤵
- Executes dropped EXE
PID:4984
-
-
C:\Users\Admin\AppData\Local\Temp\ce345025577e26843946a5b2456eeada_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\ce345025577e26843946a5b2456eeada_JaffaCakes118.exe -m security1⤵
- System Location Discovery: System Language Discovery
- Modifies data under HKEY_USERS
PID:3324
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --field-trial-handle=4396,i,10597648459838880772,16562651767759956329,262144 --variations-seed-version --mojo-platform-channel-handle=4164 /prefetch:81⤵PID:2456
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3.4MB
MD54a3a62770a4450fc64f3c631cd83f315
SHA1b6150c08074851a7640a8499937b6ff35215ad02
SHA256af778661599b1d588fe8e0f2418ff904fb36a5c7abd83c3b5cdf38b788793953
SHA5125335cb8dddc2b1d2db0e67e54e75aebec332ed62752c0bc522e81860f703f162c5d8e05ff5f49e0142fc521e2eda4cea2068b87aaef70245e85e9fb86a312711