Analysis
-
max time kernel
150s -
max time network
150s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
06-09-2024 08:06
Static task
static1
Behavioral task
behavioral1
Sample
cf128abdd4791c364f29b7bd097036b3_JaffaCakes118.dll
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
cf128abdd4791c364f29b7bd097036b3_JaffaCakes118.dll
Resource
win10v2004-20240802-en
General
-
Target
cf128abdd4791c364f29b7bd097036b3_JaffaCakes118.dll
-
Size
5.0MB
-
MD5
cf128abdd4791c364f29b7bd097036b3
-
SHA1
7eb870e87aec78dd12d6c3bf79b4127978098082
-
SHA256
0508663d47a636e664cd5ff522ed5d12e13a4f00746f827a5e2be7371776794c
-
SHA512
9b531417a08033dbb987612e0f9c31981805864eda583903a3cf86a2b3861b3febd7b66456ff8c7f972d895da4ce69f49baa1a69b5ffb8ed6a8cb37f154c5808
-
SSDEEP
49152:JnjQn3GTCufzZ2FYp/P/G8twfNh6eadHWA:d8WWG2q/P/FwfNgeg
Malware Config
Signatures
-
Wannacry
WannaCry is a ransomware cryptoworm.
-
Contacts a large (3289) amount of remote hosts 1 TTPs
This may indicate a network scan to discover remotely running services.
-
Executes dropped EXE 3 IoCs
pid Process 2828 mssecsvc.exe 2712 mssecsvc.exe 2320 tasksche.exe -
Creates a large amount of network flows 1 TTPs
This may indicate a network scan to discover remotely running services.
-
Drops file in System32 directory 1 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\Temporary Internet Files\counters.dat mssecsvc.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\WINDOWS\mssecsvc.exe rundll32.exe File created C:\WINDOWS\tasksche.exe mssecsvc.exe -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mssecsvc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mssecsvc.exe -
Modifies data under HKEY_USERS 1 IoCs
description ioc Process Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings mssecsvc.exe -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 2688 wrote to memory of 2664 2688 rundll32.exe 31 PID 2688 wrote to memory of 2664 2688 rundll32.exe 31 PID 2688 wrote to memory of 2664 2688 rundll32.exe 31 PID 2688 wrote to memory of 2664 2688 rundll32.exe 31 PID 2688 wrote to memory of 2664 2688 rundll32.exe 31 PID 2688 wrote to memory of 2664 2688 rundll32.exe 31 PID 2688 wrote to memory of 2664 2688 rundll32.exe 31 PID 2664 wrote to memory of 2828 2664 rundll32.exe 32 PID 2664 wrote to memory of 2828 2664 rundll32.exe 32 PID 2664 wrote to memory of 2828 2664 rundll32.exe 32 PID 2664 wrote to memory of 2828 2664 rundll32.exe 32
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\cf128abdd4791c364f29b7bd097036b3_JaffaCakes118.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:2688 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\cf128abdd4791c364f29b7bd097036b3_JaffaCakes118.dll,#12⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2664 -
C:\WINDOWS\mssecsvc.exeC:\WINDOWS\mssecsvc.exe3⤵
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:2828 -
C:\WINDOWS\tasksche.exeC:\WINDOWS\tasksche.exe /i4⤵
- Executes dropped EXE
PID:2320
-
-
-
-
C:\WINDOWS\mssecsvc.exeC:\WINDOWS\mssecsvc.exe -m security1⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies data under HKEY_USERS
PID:2712
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3.6MB
MD5c8342562d20c96410e32dc47ff4cb57e
SHA1dad76af569e4af60e0af9870c89437aaa164626c
SHA2568216c32f161f093a25265159b68035b631e4b1fe4526bd190dd3259c8ddef7c8
SHA51287102695d0cbfd58eb94cffa9f0454b68f2581eebf531414c843c640bdf3d7ca4419d47b51f9970b66c3be487e82def8c8bf6f320b545a6081e1b6bd70538e92
-
Filesize
3.4MB
MD565afae4daecf6d34ffe96b41b65a1d18
SHA119bf1779b298c1206a7606965f1a8192d646b273
SHA2564b2aa4c230f02703bd5a848bbaf5a871b55ce568f745bc09ed8c28203ad4e962
SHA512904e3c92c8d170ebbfbbf47f9072ef703215706b8db3dd90a9ef59ee5b3fb8fce82c6ccc292732deff26aadd79cb0eb2efd86c1b547f775b9e1dc0e6dab48c04