Analysis
-
max time kernel
150s -
max time network
157s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
07-09-2024 22:18
Static task
static1
Behavioral task
behavioral1
Sample
d2f2c08ebeb5e226b23fbae86bc51169_JaffaCakes118.dll
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
d2f2c08ebeb5e226b23fbae86bc51169_JaffaCakes118.dll
Resource
win10v2004-20240802-en
General
-
Target
d2f2c08ebeb5e226b23fbae86bc51169_JaffaCakes118.dll
-
Size
5.0MB
-
MD5
d2f2c08ebeb5e226b23fbae86bc51169
-
SHA1
ac4bbe7363aa4f1cbaa8c66818726ab13373fe09
-
SHA256
88674e9e3762f6c669a749134efc4daff5ddede1ca50d1167a216b635a2bce8d
-
SHA512
6ac6c5d00afea526c778e973f9342959ac8c4490a87dfd4347bb47e6d4539d114b5b5ce59e27db72632744b0d207199f64f013d86e716e31208c8399a8a78f06
-
SSDEEP
49152:SnAQqMSPbcBVu/1INRx+TSqTdX1HkQo6SAA:+DqPoBI1aRxcSUDk36SA
Malware Config
Signatures
-
Wannacry
WannaCry is a ransomware cryptoworm.
-
Contacts a large (3293) amount of remote hosts 1 TTPs
This may indicate a network scan to discover remotely running services.
-
Executes dropped EXE 3 IoCs
pid Process 788 mssecsvc.exe 5056 mssecsvc.exe 2868 tasksche.exe -
Creates a large amount of network flows 1 TTPs
This may indicate a network scan to discover remotely running services.
-
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\WINDOWS\tasksche.exe mssecsvc.exe File created C:\WINDOWS\mssecsvc.exe rundll32.exe -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mssecsvc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mssecsvc.exe -
Modifies data under HKEY_USERS 5 IoCs
description ioc Process Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ mssecsvc.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ProxyBypass = "1" mssecsvc.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\IntranetName = "1" mssecsvc.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\UNCAsIntranet = "1" mssecsvc.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\AutoDetect = "0" mssecsvc.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 1832 wrote to memory of 844 1832 rundll32.exe 83 PID 1832 wrote to memory of 844 1832 rundll32.exe 83 PID 1832 wrote to memory of 844 1832 rundll32.exe 83 PID 844 wrote to memory of 788 844 rundll32.exe 86 PID 844 wrote to memory of 788 844 rundll32.exe 86 PID 844 wrote to memory of 788 844 rundll32.exe 86
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\d2f2c08ebeb5e226b23fbae86bc51169_JaffaCakes118.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1832 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\d2f2c08ebeb5e226b23fbae86bc51169_JaffaCakes118.dll,#12⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:844 -
C:\WINDOWS\mssecsvc.exeC:\WINDOWS\mssecsvc.exe3⤵
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:788 -
C:\WINDOWS\tasksche.exeC:\WINDOWS\tasksche.exe /i4⤵
- Executes dropped EXE
PID:2868
-
-
-
-
C:\WINDOWS\mssecsvc.exeC:\WINDOWS\mssecsvc.exe -m security1⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Modifies data under HKEY_USERS
PID:5056
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3.6MB
MD53fea3a6fa33027e883f56153ba2efb7c
SHA1cb418468f681574ffda7f23869ce2108215961d5
SHA2566fd4e99f6083595256d5724c8da529945763454b0666d229ca8987702e405ec9
SHA512141a5420ea928e7088343254aaf0955e1de4572b11de8bd1b8d3745685da8b9286f28ba274faf804f5cb071c1dd16ae0ead18f0f5ae4ce2ad6e23a4b0d87b599
-
Filesize
3.4MB
MD5c703676c99b49e2f0b4b3543af5bb91b
SHA14fb551d62fc28bf553d7a9d1b3a74af40a43717b
SHA2565c5d64979714cfb92ab45357e791a8729c151b248fbe103e4c4a4b89a81e64e9
SHA5120bef8cab7ab951a5e0a6fb46aa051dbdb85e9ba05b577eff42bd0dd8d97070d24f909983368e6fd8754c49a3e8a5599ccbf213617b86fdeb9f4f1a2dd7d8dffd