Analysis
-
max time kernel
150s -
max time network
157s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
07-09-2024 11:56
Static task
static1
Behavioral task
behavioral1
Sample
d1e0f268f7543bb14299fd5caa464bd5_JaffaCakes118.dll
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
d1e0f268f7543bb14299fd5caa464bd5_JaffaCakes118.dll
Resource
win10v2004-20240802-en
General
-
Target
d1e0f268f7543bb14299fd5caa464bd5_JaffaCakes118.dll
-
Size
5.0MB
-
MD5
d1e0f268f7543bb14299fd5caa464bd5
-
SHA1
008747abb2bb6d42d18d71ce8e1ec0fcfa4f64c3
-
SHA256
64df13da1342eedbfc49140f060b31d0edbe095258261d3634368ea1cf55997f
-
SHA512
40898a496c2339b03284c1799b2d7544e51d24e886cc323d061a0b0b3bfb134bc7235a2ca3659525b76d49d11ac10c87ff5cc02af0ee248367a0fd0b58603ed3
-
SSDEEP
98304:+DqPoBU1aRxcSUDk36SAEdhvxWa9P593R8yAVp2H:+DqPv1Cxcxk3ZAEUadzR8yc4H
Malware Config
Signatures
-
Wannacry
WannaCry is a ransomware cryptoworm.
-
Contacts a large (3101) amount of remote hosts 1 TTPs
This may indicate a network scan to discover remotely running services.
-
Executes dropped EXE 3 IoCs
pid Process 1932 mssecsvc.exe 2944 mssecsvc.exe 2572 tasksche.exe -
Creates a large amount of network flows 1 TTPs
This may indicate a network scan to discover remotely running services.
-
Drops file in System32 directory 1 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\Temporary Internet Files\counters.dat mssecsvc.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\WINDOWS\mssecsvc.exe rundll32.exe File created C:\WINDOWS\tasksche.exe mssecsvc.exe -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mssecsvc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mssecsvc.exe -
Modifies data under HKEY_USERS 24 IoCs
description ioc Process Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{20197DB9-CDFD-414C-B02E-DDC356873D6A}\e6-ef-c1-4f-9f-9d mssecsvc.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\DefaultConnectionSettings = 4600000002000000090000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 mssecsvc.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\SavedLegacySettings = 4600000002000000090000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 mssecsvc.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\UNCAsIntranet = "0" mssecsvc.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Cookies\CachePrefix = "Cookie:" mssecsvc.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\History\CachePrefix = "Visited:" mssecsvc.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad mssecsvc.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{20197DB9-CDFD-414C-B02E-DDC356873D6A}\WpadDecisionReason = "1" mssecsvc.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections mssecsvc.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ProxyEnable = "0" mssecsvc.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{20197DB9-CDFD-414C-B02E-DDC356873D6A}\WpadDecisionTime = 2081cd131d01db01 mssecsvc.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{20197DB9-CDFD-414C-B02E-DDC356873D6A}\WpadDecision = "0" mssecsvc.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{20197DB9-CDFD-414C-B02E-DDC356873D6A}\WpadNetworkName = "Network 3" mssecsvc.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\e6-ef-c1-4f-9f-9d mssecsvc.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\e6-ef-c1-4f-9f-9d\WpadDecisionReason = "1" mssecsvc.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings mssecsvc.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\AutoDetect = "1" mssecsvc.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{20197DB9-CDFD-414C-B02E-DDC356873D6A} mssecsvc.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\e6-ef-c1-4f-9f-9d\WpadDecision = "0" mssecsvc.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings mssecsvc.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ mssecsvc.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Content\CachePrefix mssecsvc.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\DefaultConnectionSettings = 4600000003000000090000000000000000000000000000000400000000000000000000000000000000000000000000000000000001000000020000000a7f0166000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 mssecsvc.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\e6-ef-c1-4f-9f-9d\WpadDecisionTime = 2081cd131d01db01 mssecsvc.exe -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 2392 wrote to memory of 296 2392 rundll32.exe 30 PID 2392 wrote to memory of 296 2392 rundll32.exe 30 PID 2392 wrote to memory of 296 2392 rundll32.exe 30 PID 2392 wrote to memory of 296 2392 rundll32.exe 30 PID 2392 wrote to memory of 296 2392 rundll32.exe 30 PID 2392 wrote to memory of 296 2392 rundll32.exe 30 PID 2392 wrote to memory of 296 2392 rundll32.exe 30 PID 296 wrote to memory of 1932 296 rundll32.exe 31 PID 296 wrote to memory of 1932 296 rundll32.exe 31 PID 296 wrote to memory of 1932 296 rundll32.exe 31 PID 296 wrote to memory of 1932 296 rundll32.exe 31
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\d1e0f268f7543bb14299fd5caa464bd5_JaffaCakes118.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:2392 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\d1e0f268f7543bb14299fd5caa464bd5_JaffaCakes118.dll,#12⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:296 -
C:\WINDOWS\mssecsvc.exeC:\WINDOWS\mssecsvc.exe3⤵
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:1932 -
C:\WINDOWS\tasksche.exeC:\WINDOWS\tasksche.exe /i4⤵
- Executes dropped EXE
PID:2572
-
-
-
-
C:\WINDOWS\mssecsvc.exeC:\WINDOWS\mssecsvc.exe -m security1⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies data under HKEY_USERS
PID:2944
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3.6MB
MD519776e8521a66a064f1fe4d8d6c3e23a
SHA1b0ae731c6da04ec99a4bd80e0c89a5d951051d83
SHA25652d6e286c148692bd033036618ee086d3ade8f234631b1efd0e21d4564873b0b
SHA51282e3031503ae0c29d8077ce00a9f0a015b13c21c9c713a674e7b291b413aa809eb9bafa4221b480a5af001db1fcf05bb6ab9e27b67891eaf48fd7edf3cc9b5de
-
Filesize
3.4MB
MD5d33ff47a1931f0f0e044ea25c51e4d52
SHA14ffa7cf2d9ba0d5194e01fcba19d9937c96a0cfd
SHA256d04fefb25e74cc2c9b4832cdfb0ecd3e764b39370ef15a7ff757fad67fd41ee6
SHA512cd7f68d520b4592e20c800e3e5a0538ef432cbfbc13a2fe7adbabc9fd87d1fd977a1fafd14ccbda4cab9b0a655b8da31aa6f69c11a77e882547586fef16e391d