Analysis
-
max time kernel
150s -
max time network
150s -
platform
windows7_x64 -
resource
win7-20240729-en -
resource tags
arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system -
submitted
07-09-2024 01:21
Static task
static1
Behavioral task
behavioral1
Sample
d0c9b9dcbdb09dba7aa7e93df33e8883_JaffaCakes118.dll
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
d0c9b9dcbdb09dba7aa7e93df33e8883_JaffaCakes118.dll
Resource
win10v2004-20240802-en
General
-
Target
d0c9b9dcbdb09dba7aa7e93df33e8883_JaffaCakes118.dll
-
Size
5.0MB
-
MD5
d0c9b9dcbdb09dba7aa7e93df33e8883
-
SHA1
9095d247ef63b8b2001723c18efa30642fc7cc71
-
SHA256
a1be321e8deb8ef6eb3e326b1ef9d7dfc1cfe7e86bbcf9f5e2573c1b77f858cc
-
SHA512
c4382e91a68fa647c0e640ba4282b42bdc988332e1963f55ae54d7bd8883a251e2fa500923853163d89a996bab8b85e1060d56159c0b6d074df245320ae0a007
-
SSDEEP
24576:SbLgddQhfdmMSirYbcMNgef0QeQjG/D8kIqRYoPccEAHYkRGra8oQPe:SnAQqMSPbcBVQej/1jZROAx
Malware Config
Signatures
-
Wannacry
WannaCry is a ransomware cryptoworm.
-
Contacts a large (3210) amount of remote hosts 1 TTPs
This may indicate a network scan to discover remotely running services.
-
Executes dropped EXE 3 IoCs
pid Process 2532 mssecsvc.exe 2736 mssecsvc.exe 1540 tasksche.exe -
Creates a large amount of network flows 1 TTPs
This may indicate a network scan to discover remotely running services.
-
Drops file in System32 directory 1 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\Temporary Internet Files\counters.dat mssecsvc.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\WINDOWS\mssecsvc.exe rundll32.exe File created C:\WINDOWS\tasksche.exe mssecsvc.exe -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mssecsvc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mssecsvc.exe -
Modifies data under HKEY_USERS 24 IoCs
description ioc Process Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Cookies\CachePrefix = "Cookie:" mssecsvc.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad mssecsvc.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{34F83CF2-EFFF-4BA8-9D3B-B556775640D2}\WpadDecision = "0" mssecsvc.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\32-b7-71-7e-cd-c1 mssecsvc.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings mssecsvc.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings mssecsvc.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\UNCAsIntranet = "0" mssecsvc.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\AutoDetect = "1" mssecsvc.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{34F83CF2-EFFF-4BA8-9D3B-B556775640D2}\32-b7-71-7e-cd-c1 mssecsvc.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{34F83CF2-EFFF-4BA8-9D3B-B556775640D2} mssecsvc.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{34F83CF2-EFFF-4BA8-9D3B-B556775640D2}\WpadDecisionTime = c06c3150c400db01 mssecsvc.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{34F83CF2-EFFF-4BA8-9D3B-B556775640D2}\WpadNetworkName = "Network 3" mssecsvc.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\32-b7-71-7e-cd-c1\WpadDecision = "0" mssecsvc.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections mssecsvc.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ProxyEnable = "0" mssecsvc.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\SavedLegacySettings = 4600000002000000090000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 mssecsvc.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\32-b7-71-7e-cd-c1\WpadDecisionReason = "1" mssecsvc.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\DefaultConnectionSettings = 4600000003000000090000000000000000000000000000000400000000000000000000000000000000000000000000000000000001000000020000000a7f0122000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 mssecsvc.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{34F83CF2-EFFF-4BA8-9D3B-B556775640D2}\WpadDecisionReason = "1" mssecsvc.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\32-b7-71-7e-cd-c1\WpadDecisionTime = c06c3150c400db01 mssecsvc.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\DefaultConnectionSettings = 4600000002000000090000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 mssecsvc.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ mssecsvc.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Content\CachePrefix mssecsvc.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\History\CachePrefix = "Visited:" mssecsvc.exe -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 2264 wrote to memory of 2232 2264 rundll32.exe 30 PID 2264 wrote to memory of 2232 2264 rundll32.exe 30 PID 2264 wrote to memory of 2232 2264 rundll32.exe 30 PID 2264 wrote to memory of 2232 2264 rundll32.exe 30 PID 2264 wrote to memory of 2232 2264 rundll32.exe 30 PID 2264 wrote to memory of 2232 2264 rundll32.exe 30 PID 2264 wrote to memory of 2232 2264 rundll32.exe 30 PID 2232 wrote to memory of 2532 2232 rundll32.exe 31 PID 2232 wrote to memory of 2532 2232 rundll32.exe 31 PID 2232 wrote to memory of 2532 2232 rundll32.exe 31 PID 2232 wrote to memory of 2532 2232 rundll32.exe 31
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\d0c9b9dcbdb09dba7aa7e93df33e8883_JaffaCakes118.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:2264 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\d0c9b9dcbdb09dba7aa7e93df33e8883_JaffaCakes118.dll,#12⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2232 -
C:\WINDOWS\mssecsvc.exeC:\WINDOWS\mssecsvc.exe3⤵
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:2532 -
C:\WINDOWS\tasksche.exeC:\WINDOWS\tasksche.exe /i4⤵
- Executes dropped EXE
PID:1540
-
-
-
-
C:\WINDOWS\mssecsvc.exeC:\WINDOWS\mssecsvc.exe -m security1⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies data under HKEY_USERS
PID:2736
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3.6MB
MD555fb36e09f5078f74a4c1375e4731f5d
SHA1ac377096256b11ec4509e10a6db952228aebf593
SHA256da57bc5dd6f0995e6f2a86a8dac7eefde4be805e0312e359bb55fb088efd9070
SHA512a4e515d34c972b86e55ffd5d2ee67927d2806d8765f10498a89de6b2db7bae93a6ca2719819bda36ad71de212b788b5e80bc4c4cfc85ffdfaff7c6b586695220
-
Filesize
3.4MB
MD5b821d98a86e4b1252b0306c4e5c6a488
SHA10acbc89bd647b9a2afc59958c5d81cd2f4986bc2
SHA256bb28f332bbf787f0b57a9da19a90c1f6002addcc905c22b3f606d45780dc792b
SHA512a79342449e8b784bb755f3e8b12a28c341dc747e9f63f1d904d642aff92d5a4ff227f1eed287919b7f9ea58645374470d39d020cb4e63ede045e674155f881af