Resubmissions
12-09-2024 17:42
240912-v9zdnswckn 1006-09-2024 22:01
240906-1w8m3szgmb 1006-09-2024 21:12
240906-z2d5zsyajl 10Analysis
-
max time kernel
150s -
max time network
150s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
06-09-2024 21:12
Static task
static1
Behavioral task
behavioral1
Sample
d0766eba566a497af6e61c07af24c36d_JaffaCakes118.dll
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
d0766eba566a497af6e61c07af24c36d_JaffaCakes118.dll
Resource
win10v2004-20240802-en
General
-
Target
d0766eba566a497af6e61c07af24c36d_JaffaCakes118.dll
-
Size
5.0MB
-
MD5
d0766eba566a497af6e61c07af24c36d
-
SHA1
4f808f55880494d962c57f9974278fad4b3008f5
-
SHA256
2a94ebb590d7d9ccdd2009a50ab13d94fb3174536e91dfe53dd9cea3e741e7d4
-
SHA512
907c11535d4d4b64c042ee78a74b619b157958e790531bc22057d6b9f0ee40720c6a9a45f7305b85b56563bc32ca7f37a2e4a806aaf5e278e8b09b41c51c5e2b
-
SSDEEP
98304:TDqPoBhz1aRxcSUDk36SAEdhvxWa9Pa3R8yAVp2:TDqPe1Cxcxk3ZAEUadER8yc4
Malware Config
Signatures
-
Wannacry
WannaCry is a ransomware cryptoworm.
-
Contacts a large (3316) amount of remote hosts 1 TTPs
This may indicate a network scan to discover remotely running services.
-
Executes dropped EXE 3 IoCs
pid Process 1036 mssecsvc.exe 1900 mssecsvc.exe 660 tasksche.exe -
Creates a large amount of network flows 1 TTPs
This may indicate a network scan to discover remotely running services.
-
Drops file in System32 directory 1 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\Temporary Internet Files\counters.dat mssecsvc.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\WINDOWS\mssecsvc.exe rundll32.exe File created C:\WINDOWS\tasksche.exe mssecsvc.exe -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mssecsvc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mssecsvc.exe -
Modifies data under HKEY_USERS 24 IoCs
description ioc Process Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings mssecsvc.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ProxyEnable = "0" mssecsvc.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\AutoDetect = "1" mssecsvc.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Cookies\CachePrefix = "Cookie:" mssecsvc.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{89B5C84D-E062-40FF-AAE5-6DE8DF79703D} mssecsvc.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\9a-95-27-8d-8c-6b mssecsvc.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\9a-95-27-8d-8c-6b\WpadDecisionReason = "1" mssecsvc.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings mssecsvc.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ mssecsvc.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Content\CachePrefix mssecsvc.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\DefaultConnectionSettings = 4600000003000000090000000000000000000000000000000400000000000000000000000000000000000000000000000000000001000000020000000a7f016d000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 mssecsvc.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\History\CachePrefix = "Visited:" mssecsvc.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad mssecsvc.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{89B5C84D-E062-40FF-AAE5-6DE8DF79703D}\WpadDecisionReason = "1" mssecsvc.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{89B5C84D-E062-40FF-AAE5-6DE8DF79703D}\WpadDecisionTime = a0e2a17fa100db01 mssecsvc.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections mssecsvc.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\DefaultConnectionSettings = 4600000002000000090000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 mssecsvc.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\SavedLegacySettings = 4600000002000000090000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 mssecsvc.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\UNCAsIntranet = "0" mssecsvc.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{89B5C84D-E062-40FF-AAE5-6DE8DF79703D}\WpadDecision = "0" mssecsvc.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{89B5C84D-E062-40FF-AAE5-6DE8DF79703D}\WpadNetworkName = "Network 3" mssecsvc.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{89B5C84D-E062-40FF-AAE5-6DE8DF79703D}\9a-95-27-8d-8c-6b mssecsvc.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\9a-95-27-8d-8c-6b\WpadDecisionTime = a0e2a17fa100db01 mssecsvc.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\9a-95-27-8d-8c-6b\WpadDecision = "0" mssecsvc.exe -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 2092 wrote to memory of 2420 2092 rundll32.exe 30 PID 2092 wrote to memory of 2420 2092 rundll32.exe 30 PID 2092 wrote to memory of 2420 2092 rundll32.exe 30 PID 2092 wrote to memory of 2420 2092 rundll32.exe 30 PID 2092 wrote to memory of 2420 2092 rundll32.exe 30 PID 2092 wrote to memory of 2420 2092 rundll32.exe 30 PID 2092 wrote to memory of 2420 2092 rundll32.exe 30 PID 2420 wrote to memory of 1036 2420 rundll32.exe 31 PID 2420 wrote to memory of 1036 2420 rundll32.exe 31 PID 2420 wrote to memory of 1036 2420 rundll32.exe 31 PID 2420 wrote to memory of 1036 2420 rundll32.exe 31
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\d0766eba566a497af6e61c07af24c36d_JaffaCakes118.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:2092 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\d0766eba566a497af6e61c07af24c36d_JaffaCakes118.dll,#12⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2420 -
C:\WINDOWS\mssecsvc.exeC:\WINDOWS\mssecsvc.exe3⤵
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:1036 -
C:\WINDOWS\tasksche.exeC:\WINDOWS\tasksche.exe /i4⤵
- Executes dropped EXE
PID:660
-
-
-
-
C:\WINDOWS\mssecsvc.exeC:\WINDOWS\mssecsvc.exe -m security1⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies data under HKEY_USERS
PID:1900
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3.6MB
MD5f4531c47b69b90019096c33303fb9fe8
SHA1ebe1442f1ebf397bddedfaefb7a78ca1c9511eee
SHA2560bf9f9ad7fad6b676f7b7ea7b6b7a9cbe8af54f5e8beceadd678ac473e9d7eb9
SHA5128d9a302631c16a0355d2083062c153da3ec129caca9b874c5407bcf8c936a5cb0bbfd720b7195f2a47e96f4ef8bcfda74abb1e83c00e28c9d215abc7c0fdb172
-
Filesize
3.4MB
MD5fff2678d85747fc86b20215d769ad4cb
SHA1c864976c457a90a678344ffa0b9b134c0645ee3b
SHA256658a87fcf71607b1ced777e309c10d8bbe447f9b368217cc16ebab55f52c340f
SHA512862a16e02173e8875ca573700051d53634463d4cd9fd215c112ea2938fedc4743ea008d2e69ad644c04958d41a548b5763c2e76d85787264fbef033f37037190