Analysis
-
max time kernel
150s -
max time network
151s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
07-09-2024 04:05
Static task
static1
Behavioral task
behavioral1
Sample
d109702dcc19bbf31c0bf15128cb6edd_JaffaCakes118.dll
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
d109702dcc19bbf31c0bf15128cb6edd_JaffaCakes118.dll
Resource
win10v2004-20240802-en
General
-
Target
d109702dcc19bbf31c0bf15128cb6edd_JaffaCakes118.dll
-
Size
5.0MB
-
MD5
d109702dcc19bbf31c0bf15128cb6edd
-
SHA1
79d87fc18bf70da98866f55d471070016f3ff7b0
-
SHA256
4b467eb3bf318d4e5d1ec00b18af6c956abf9c551d51ae40f8fd32f38149c000
-
SHA512
43d41f3475ec5710bab00f3c276324d6314e3c80e58514655eab39f483f68abb3ecd1b8061c82451a73bcff929eb5ad89ac7b88c52f3bee6fbf7521428d77fa3
-
SSDEEP
49152:SnAQqMSPbcBVIwvxJM0H9PAMEcaEau3R8yAH1plAH:+DqPoBWIxWa9P593R8yAVp2H
Malware Config
Signatures
-
Wannacry
WannaCry is a ransomware cryptoworm.
-
Contacts a large (3293) amount of remote hosts 1 TTPs
This may indicate a network scan to discover remotely running services.
-
Executes dropped EXE 3 IoCs
pid Process 2300 mssecsvc.exe 2676 mssecsvc.exe 2848 tasksche.exe -
Creates a large amount of network flows 1 TTPs
This may indicate a network scan to discover remotely running services.
-
Drops file in System32 directory 1 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\Temporary Internet Files\counters.dat mssecsvc.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\WINDOWS\mssecsvc.exe rundll32.exe File created C:\WINDOWS\tasksche.exe mssecsvc.exe -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mssecsvc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mssecsvc.exe -
Modifies data under HKEY_USERS 24 IoCs
description ioc Process Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ mssecsvc.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\da-61-d2-f2-ff-2b\WpadDecisionReason = "1" mssecsvc.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\AutoDetect = "1" mssecsvc.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\History\CachePrefix = "Visited:" mssecsvc.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{717F64BA-BD50-4BEF-9EEE-7750A2E58079}\WpadDecisionReason = "1" mssecsvc.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{717F64BA-BD50-4BEF-9EEE-7750A2E58079}\WpadDecisionTime = 5005983bdb00db01 mssecsvc.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{717F64BA-BD50-4BEF-9EEE-7750A2E58079}\WpadDecision = "0" mssecsvc.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{717F64BA-BD50-4BEF-9EEE-7750A2E58079}\WpadNetworkName = "Network 3" mssecsvc.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\da-61-d2-f2-ff-2b mssecsvc.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{717F64BA-BD50-4BEF-9EEE-7750A2E58079}\da-61-d2-f2-ff-2b mssecsvc.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\da-61-d2-f2-ff-2b\WpadDecision = "0" mssecsvc.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections mssecsvc.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Content\CachePrefix mssecsvc.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Cookies\CachePrefix = "Cookie:" mssecsvc.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad mssecsvc.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\DefaultConnectionSettings = 4600000003000000090000000000000000000000000000000400000000000000000000000000000000000000000000000000000001000000020000000a7f0195000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 mssecsvc.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{717F64BA-BD50-4BEF-9EEE-7750A2E58079} mssecsvc.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\da-61-d2-f2-ff-2b\WpadDecisionTime = 5005983bdb00db01 mssecsvc.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings mssecsvc.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\DefaultConnectionSettings = 4600000002000000090000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 mssecsvc.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings mssecsvc.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ProxyEnable = "0" mssecsvc.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\SavedLegacySettings = 4600000002000000090000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 mssecsvc.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\UNCAsIntranet = "0" mssecsvc.exe -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 2644 wrote to memory of 3052 2644 rundll32.exe 30 PID 2644 wrote to memory of 3052 2644 rundll32.exe 30 PID 2644 wrote to memory of 3052 2644 rundll32.exe 30 PID 2644 wrote to memory of 3052 2644 rundll32.exe 30 PID 2644 wrote to memory of 3052 2644 rundll32.exe 30 PID 2644 wrote to memory of 3052 2644 rundll32.exe 30 PID 2644 wrote to memory of 3052 2644 rundll32.exe 30 PID 3052 wrote to memory of 2300 3052 rundll32.exe 31 PID 3052 wrote to memory of 2300 3052 rundll32.exe 31 PID 3052 wrote to memory of 2300 3052 rundll32.exe 31 PID 3052 wrote to memory of 2300 3052 rundll32.exe 31
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\d109702dcc19bbf31c0bf15128cb6edd_JaffaCakes118.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:2644 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\d109702dcc19bbf31c0bf15128cb6edd_JaffaCakes118.dll,#12⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3052 -
C:\WINDOWS\mssecsvc.exeC:\WINDOWS\mssecsvc.exe3⤵
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:2300 -
C:\WINDOWS\tasksche.exeC:\WINDOWS\tasksche.exe /i4⤵
- Executes dropped EXE
PID:2848
-
-
-
-
C:\WINDOWS\mssecsvc.exeC:\WINDOWS\mssecsvc.exe -m security1⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies data under HKEY_USERS
PID:2676
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3.6MB
MD547be96694e5508e49e2da9a7256b618f
SHA1d150276df26315ef16aff303dc0a7399ae7a2cf5
SHA256b730a9719d0034e91fb849d84aaafc5fa2cdb4adb969cb0598885c3f359bbe65
SHA512884326addc6c7c13c140276e1a201675c40946d1c045c474259172788a32d087a4e29a8ba1e9910a18a8cc6c21295345130acc6263957208f6004b32c9a4bd57
-
Filesize
3.4MB
MD5cd6af6bf7a610fd1ebde0dd752f8a332
SHA1d9b57c540b3db44a2858e6da5ea744c8375a5191
SHA2569b453a1103824b92081f5d160f332ff4e3f73e77cfbd64e7dbff4567751f0f0a
SHA512614220eedc77fa8b044a2b9400a5f02e37fdce8ffd409eddfe654328b8694464946cf543d81baabb5af1cf1043076fc59126a942f6eeba52b79504bfcab7e132