Analysis
-
max time kernel
150s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
06-09-2024 08:06
Static task
static1
Behavioral task
behavioral1
Sample
cf128abdd4791c364f29b7bd097036b3_JaffaCakes118.dll
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
cf128abdd4791c364f29b7bd097036b3_JaffaCakes118.dll
Resource
win10v2004-20240802-en
General
-
Target
cf128abdd4791c364f29b7bd097036b3_JaffaCakes118.dll
-
Size
5.0MB
-
MD5
cf128abdd4791c364f29b7bd097036b3
-
SHA1
7eb870e87aec78dd12d6c3bf79b4127978098082
-
SHA256
0508663d47a636e664cd5ff522ed5d12e13a4f00746f827a5e2be7371776794c
-
SHA512
9b531417a08033dbb987612e0f9c31981805864eda583903a3cf86a2b3861b3febd7b66456ff8c7f972d895da4ce69f49baa1a69b5ffb8ed6a8cb37f154c5808
-
SSDEEP
49152:JnjQn3GTCufzZ2FYp/P/G8twfNh6eadHWA:d8WWG2q/P/FwfNgeg
Malware Config
Signatures
-
Wannacry
WannaCry is a ransomware cryptoworm.
-
Contacts a large (3247) amount of remote hosts 1 TTPs
This may indicate a network scan to discover remotely running services.
-
Executes dropped EXE 3 IoCs
pid Process 2608 mssecsvc.exe 3008 mssecsvc.exe 1864 tasksche.exe -
Creates a large amount of network flows 1 TTPs
This may indicate a network scan to discover remotely running services.
-
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\WINDOWS\mssecsvc.exe rundll32.exe File created C:\WINDOWS\tasksche.exe mssecsvc.exe -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mssecsvc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mssecsvc.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 448 wrote to memory of 2204 448 rundll32.exe 84 PID 448 wrote to memory of 2204 448 rundll32.exe 84 PID 448 wrote to memory of 2204 448 rundll32.exe 84 PID 2204 wrote to memory of 2608 2204 rundll32.exe 85 PID 2204 wrote to memory of 2608 2204 rundll32.exe 85 PID 2204 wrote to memory of 2608 2204 rundll32.exe 85
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\cf128abdd4791c364f29b7bd097036b3_JaffaCakes118.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:448 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\cf128abdd4791c364f29b7bd097036b3_JaffaCakes118.dll,#12⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2204 -
C:\WINDOWS\mssecsvc.exeC:\WINDOWS\mssecsvc.exe3⤵
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:2608 -
C:\WINDOWS\tasksche.exeC:\WINDOWS\tasksche.exe /i4⤵
- Executes dropped EXE
PID:1864
-
-
-
-
C:\WINDOWS\mssecsvc.exeC:\WINDOWS\mssecsvc.exe -m security1⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:3008
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3.6MB
MD5c8342562d20c96410e32dc47ff4cb57e
SHA1dad76af569e4af60e0af9870c89437aaa164626c
SHA2568216c32f161f093a25265159b68035b631e4b1fe4526bd190dd3259c8ddef7c8
SHA51287102695d0cbfd58eb94cffa9f0454b68f2581eebf531414c843c640bdf3d7ca4419d47b51f9970b66c3be487e82def8c8bf6f320b545a6081e1b6bd70538e92
-
Filesize
3.4MB
MD565afae4daecf6d34ffe96b41b65a1d18
SHA119bf1779b298c1206a7606965f1a8192d646b273
SHA2564b2aa4c230f02703bd5a848bbaf5a871b55ce568f745bc09ed8c28203ad4e962
SHA512904e3c92c8d170ebbfbbf47f9072ef703215706b8db3dd90a9ef59ee5b3fb8fce82c6ccc292732deff26aadd79cb0eb2efd86c1b547f775b9e1dc0e6dab48c04