Analysis
-
max time kernel
150s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
06-09-2024 14:15
Static task
static1
Behavioral task
behavioral1
Sample
cfb8e24c51476d67124476d7f9ab734f_JaffaCakes118.dll
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
cfb8e24c51476d67124476d7f9ab734f_JaffaCakes118.dll
Resource
win10v2004-20240802-en
General
-
Target
cfb8e24c51476d67124476d7f9ab734f_JaffaCakes118.dll
-
Size
5.0MB
-
MD5
cfb8e24c51476d67124476d7f9ab734f
-
SHA1
764d67ff69b5e42e16020f13fd82640ab53ddc7f
-
SHA256
2a2cf60ecf5fded877ac54be621a6ff5eda5e21c1c831d7db64e3186470e4bff
-
SHA512
0ba182bf7c3bd92fd00cde395989971104833f026e95276c003bc4180a0d51076fa721d8c85dee9d2a916897387ed120a0854f80bca5e2c0f0b0f2e02f7b510f
-
SSDEEP
24576:SbLgddQhfdmMSirYbcMNgef0QeQjG/D8kIqRYoAdNLKz6626nq/:SnAQqMSPbcBVQej/1INR
Malware Config
Signatures
-
Wannacry
WannaCry is a ransomware cryptoworm.
-
Contacts a large (3293) amount of remote hosts 1 TTPs
This may indicate a network scan to discover remotely running services.
-
Executes dropped EXE 3 IoCs
pid Process 944 mssecsvc.exe 3000 mssecsvc.exe 2472 tasksche.exe -
Creates a large amount of network flows 1 TTPs
This may indicate a network scan to discover remotely running services.
-
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\WINDOWS\mssecsvc.exe rundll32.exe File created C:\WINDOWS\tasksche.exe mssecsvc.exe -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mssecsvc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mssecsvc.exe -
Modifies data under HKEY_USERS 5 IoCs
description ioc Process Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\AutoDetect = "0" mssecsvc.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ mssecsvc.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ProxyBypass = "1" mssecsvc.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\IntranetName = "1" mssecsvc.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\UNCAsIntranet = "1" mssecsvc.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 2512 wrote to memory of 1472 2512 rundll32.exe 83 PID 2512 wrote to memory of 1472 2512 rundll32.exe 83 PID 2512 wrote to memory of 1472 2512 rundll32.exe 83 PID 1472 wrote to memory of 944 1472 rundll32.exe 86 PID 1472 wrote to memory of 944 1472 rundll32.exe 86 PID 1472 wrote to memory of 944 1472 rundll32.exe 86
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\cfb8e24c51476d67124476d7f9ab734f_JaffaCakes118.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:2512 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\cfb8e24c51476d67124476d7f9ab734f_JaffaCakes118.dll,#12⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1472 -
C:\WINDOWS\mssecsvc.exeC:\WINDOWS\mssecsvc.exe3⤵
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:944 -
C:\WINDOWS\tasksche.exeC:\WINDOWS\tasksche.exe /i4⤵
- Executes dropped EXE
PID:2472
-
-
-
-
C:\WINDOWS\mssecsvc.exeC:\WINDOWS\mssecsvc.exe -m security1⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Modifies data under HKEY_USERS
PID:3000
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3.6MB
MD5ceef6befba88192fe8c05d895feec40b
SHA177eda95533a18400d98401e95ab9b93f3f5ecb64
SHA256941a998d4c4b9ed2edd9bd4104de5f09cd4c2ccc3153c2cffeb4fc16d2103712
SHA51264ff97aa8d20d5f3e079ca0d049b0f827a8b0a8fbf64590bf83a835fe67205ef55abf1d0cc72de08866c80883b04e76bc9653e6efa70a53c5f7cfa9bac7b6fb7
-
Filesize
3.4MB
MD51c891306d05a78f677ceb8a9fc18cece
SHA1153f3c1b155c832d367c50f5e7beec8100bebf42
SHA256fef3fca8124aadc5f54578ec457be4765bebbc208091db56e827a3ae7a78b2d6
SHA512e05f7ffa0ac1f9c40e7b55954efe0637ee88dc57512860284d9305ce8a8d17b19ccdd33528b4f77317af94c9dac172de51bbc959b9667d03ea7912a68159226b