Analysis

  • max time kernel
    150s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    06-09-2024 00:03

General

  • Target

    ce345025577e26843946a5b2456eeada_JaffaCakes118.exe

  • Size

    3.6MB

  • MD5

    ce345025577e26843946a5b2456eeada

  • SHA1

    2144fcb2ee7b4b694bb0abde64b8c3d71ead864a

  • SHA256

    2fab19259a6a8ce55fed8ce40e3f2d1cf630461e177193696683e76d220c44ea

  • SHA512

    70e99c1470d2a747b3ad31f0326b30e459570c1c26f1bbb68b9c5bb687bc57cb93bc1689e767deb73fd28234aab96cd141927130de7463f2a8fd9c1b25dd3a7d

  • SSDEEP

    98304:yDqPoBRcSUDk36SAEdhvxWa9P593R8yAVp2HI:yDqP+cxk3ZAEUadzR8yc4HI

Malware Config

Signatures

  • Wannacry

    WannaCry is a ransomware cryptoworm.

  • Contacts a large (3337) amount of remote hosts 1 TTPs

    This may indicate a network scan to discover remotely running services.

  • Executes dropped EXE 1 IoCs
  • Creates a large amount of network flows 1 TTPs

    This may indicate a network scan to discover remotely running services.

  • Drops file in Windows directory 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies data under HKEY_USERS 5 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\ce345025577e26843946a5b2456eeada_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\ce345025577e26843946a5b2456eeada_JaffaCakes118.exe"
    1⤵
    • Drops file in Windows directory
    • System Location Discovery: System Language Discovery
    PID:768
    • C:\WINDOWS\tasksche.exe
      C:\WINDOWS\tasksche.exe /i
      2⤵
      • Executes dropped EXE
      PID:4984
  • C:\Users\Admin\AppData\Local\Temp\ce345025577e26843946a5b2456eeada_JaffaCakes118.exe
    C:\Users\Admin\AppData\Local\Temp\ce345025577e26843946a5b2456eeada_JaffaCakes118.exe -m security
    1⤵
    • System Location Discovery: System Language Discovery
    • Modifies data under HKEY_USERS
    PID:3324
  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --field-trial-handle=4396,i,10597648459838880772,16562651767759956329,262144 --variations-seed-version --mojo-platform-channel-handle=4164 /prefetch:8
    1⤵
      PID:2456

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Windows\tasksche.exe

      Filesize

      3.4MB

      MD5

      4a3a62770a4450fc64f3c631cd83f315

      SHA1

      b6150c08074851a7640a8499937b6ff35215ad02

      SHA256

      af778661599b1d588fe8e0f2418ff904fb36a5c7abd83c3b5cdf38b788793953

      SHA512

      5335cb8dddc2b1d2db0e67e54e75aebec332ed62752c0bc522e81860f703f162c5d8e05ff5f49e0142fc521e2eda4cea2068b87aaef70245e85e9fb86a312711