Analysis
-
max time kernel
150s -
max time network
151s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
07-09-2024 14:14
Static task
static1
Behavioral task
behavioral1
Sample
d21fe309ec2152f774bfd4f963237b75_JaffaCakes118.dll
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
d21fe309ec2152f774bfd4f963237b75_JaffaCakes118.dll
Resource
win10v2004-20240802-en
General
-
Target
d21fe309ec2152f774bfd4f963237b75_JaffaCakes118.dll
-
Size
5.0MB
-
MD5
d21fe309ec2152f774bfd4f963237b75
-
SHA1
117bd6935e7ce21a3bc0804a0fb08fbc98ccbd20
-
SHA256
242f327e98d2a627542bba2a60860147281e20580880087a1f9a4df550e56c88
-
SHA512
df58122cae38b8edeb682684665ab078df2cb8f0211536391dbe27f9dae8fd13b5565d38f7499b0fbcfc91e65d9d9b05f8c98d7c86921f3f03835221a0ad996c
-
SSDEEP
49152:SnAQqMSPbcBVQej/1INRx+TSqTdX1HkQ:+DqPoBhz1aRxcSUDk
Malware Config
Signatures
-
Wannacry
WannaCry is a ransomware cryptoworm.
-
Contacts a large (2600) amount of remote hosts 1 TTPs
This may indicate a network scan to discover remotely running services.
-
Executes dropped EXE 3 IoCs
pid Process 2404 mssecsvc.exe 2872 mssecsvc.exe 2800 tasksche.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\Temporary Internet Files\counters.dat mssecsvc.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\WINDOWS\mssecsvc.exe rundll32.exe File created C:\WINDOWS\tasksche.exe mssecsvc.exe -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mssecsvc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mssecsvc.exe -
Modifies data under HKEY_USERS 24 IoCs
description ioc Process Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{EC087157-403B-4474-ACBE-27BFAF4FFA25}\WpadNetworkName = "Network 3" mssecsvc.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ProxyEnable = "0" mssecsvc.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ mssecsvc.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\DefaultConnectionSettings = 4600000003000000090000000000000000000000000000000400000000000000000000000000000000000000000000000000000001000000020000000a7f0079000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 mssecsvc.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{EC087157-403B-4474-ACBE-27BFAF4FFA25}\WpadDecisionReason = "1" mssecsvc.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\ce-83-4e-24-53-c6 mssecsvc.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\ce-83-4e-24-53-c6\WpadDecisionReason = "1" mssecsvc.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\UNCAsIntranet = "0" mssecsvc.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\AutoDetect = "1" mssecsvc.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad mssecsvc.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{EC087157-403B-4474-ACBE-27BFAF4FFA25} mssecsvc.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{EC087157-403B-4474-ACBE-27BFAF4FFA25}\WpadDecisionTime = 90d8e8723001db01 mssecsvc.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\ce-83-4e-24-53-c6\WpadDecisionTime = 90d8e8723001db01 mssecsvc.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings mssecsvc.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\SavedLegacySettings = 4600000002000000090000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 mssecsvc.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings mssecsvc.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Content\CachePrefix mssecsvc.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Cookies\CachePrefix = "Cookie:" mssecsvc.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\History\CachePrefix = "Visited:" mssecsvc.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{EC087157-403B-4474-ACBE-27BFAF4FFA25}\WpadDecision = "0" mssecsvc.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{EC087157-403B-4474-ACBE-27BFAF4FFA25}\ce-83-4e-24-53-c6 mssecsvc.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections mssecsvc.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\DefaultConnectionSettings = 4600000002000000090000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 mssecsvc.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\ce-83-4e-24-53-c6\WpadDecision = "0" mssecsvc.exe -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 2148 wrote to memory of 2400 2148 rundll32.exe 30 PID 2148 wrote to memory of 2400 2148 rundll32.exe 30 PID 2148 wrote to memory of 2400 2148 rundll32.exe 30 PID 2148 wrote to memory of 2400 2148 rundll32.exe 30 PID 2148 wrote to memory of 2400 2148 rundll32.exe 30 PID 2148 wrote to memory of 2400 2148 rundll32.exe 30 PID 2148 wrote to memory of 2400 2148 rundll32.exe 30 PID 2400 wrote to memory of 2404 2400 rundll32.exe 31 PID 2400 wrote to memory of 2404 2400 rundll32.exe 31 PID 2400 wrote to memory of 2404 2400 rundll32.exe 31 PID 2400 wrote to memory of 2404 2400 rundll32.exe 31
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\d21fe309ec2152f774bfd4f963237b75_JaffaCakes118.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:2148 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\d21fe309ec2152f774bfd4f963237b75_JaffaCakes118.dll,#12⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2400 -
C:\WINDOWS\mssecsvc.exeC:\WINDOWS\mssecsvc.exe3⤵
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:2404 -
C:\WINDOWS\tasksche.exeC:\WINDOWS\tasksche.exe /i4⤵
- Executes dropped EXE
PID:2800
-
-
-
-
C:\WINDOWS\mssecsvc.exeC:\WINDOWS\mssecsvc.exe -m security1⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies data under HKEY_USERS
PID:2872
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3.6MB
MD504e03c46f899afe3cfd217360a2d4062
SHA15472f24ad819a24e40deea7a32439eecc3e3bd61
SHA256e128d9a3d3605c9d9c833fae56ddc8fb9e783b6d8da5bf75dd7eca6e08461652
SHA512559e18dafa90e585a4bcc5a388ea05db94c3ec6a203150c61cbd9f3d8d46c0bebc1228117d010646ec7482ad5cf566af47408834bbdaf7a1a0a1b14111c84da4
-
Filesize
3.4MB
MD5a88a81f7f48f37d4928dfe7ddf94fe18
SHA157a4541272f3446a3c78d8bd4168e9cbe12cf260
SHA2568f4ae6152a48e8dcd832100047e5b12250be786e1b0f7327524660aac56918c4
SHA512b8ae182399c398fa7ec7ff8c4dfe6e07155a1395669d2f5547242f762e1874539eb6ea2d2b55c5124dd35ff931cd182e18d0580ca7bfb55e1f972613b5d2a6ed