Analysis
-
max time kernel
150s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
07-09-2024 14:14
Static task
static1
Behavioral task
behavioral1
Sample
d21fe309ec2152f774bfd4f963237b75_JaffaCakes118.dll
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
d21fe309ec2152f774bfd4f963237b75_JaffaCakes118.dll
Resource
win10v2004-20240802-en
General
-
Target
d21fe309ec2152f774bfd4f963237b75_JaffaCakes118.dll
-
Size
5.0MB
-
MD5
d21fe309ec2152f774bfd4f963237b75
-
SHA1
117bd6935e7ce21a3bc0804a0fb08fbc98ccbd20
-
SHA256
242f327e98d2a627542bba2a60860147281e20580880087a1f9a4df550e56c88
-
SHA512
df58122cae38b8edeb682684665ab078df2cb8f0211536391dbe27f9dae8fd13b5565d38f7499b0fbcfc91e65d9d9b05f8c98d7c86921f3f03835221a0ad996c
-
SSDEEP
49152:SnAQqMSPbcBVQej/1INRx+TSqTdX1HkQ:+DqPoBhz1aRxcSUDk
Malware Config
Signatures
-
Wannacry
WannaCry is a ransomware cryptoworm.
-
Contacts a large (3240) amount of remote hosts 1 TTPs
This may indicate a network scan to discover remotely running services.
-
Executes dropped EXE 3 IoCs
pid Process 408 mssecsvc.exe 2324 mssecsvc.exe 4156 tasksche.exe -
Creates a large amount of network flows 1 TTPs
This may indicate a network scan to discover remotely running services.
-
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\WINDOWS\mssecsvc.exe rundll32.exe File created C:\WINDOWS\tasksche.exe mssecsvc.exe -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mssecsvc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mssecsvc.exe -
Modifies data under HKEY_USERS 5 IoCs
description ioc Process Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ mssecsvc.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ProxyBypass = "1" mssecsvc.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\IntranetName = "1" mssecsvc.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\UNCAsIntranet = "1" mssecsvc.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\AutoDetect = "0" mssecsvc.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 4832 wrote to memory of 2648 4832 rundll32.exe 90 PID 4832 wrote to memory of 2648 4832 rundll32.exe 90 PID 4832 wrote to memory of 2648 4832 rundll32.exe 90 PID 2648 wrote to memory of 408 2648 rundll32.exe 91 PID 2648 wrote to memory of 408 2648 rundll32.exe 91 PID 2648 wrote to memory of 408 2648 rundll32.exe 91
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\d21fe309ec2152f774bfd4f963237b75_JaffaCakes118.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:4832 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\d21fe309ec2152f774bfd4f963237b75_JaffaCakes118.dll,#12⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2648 -
C:\WINDOWS\mssecsvc.exeC:\WINDOWS\mssecsvc.exe3⤵
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:408 -
C:\WINDOWS\tasksche.exeC:\WINDOWS\tasksche.exe /i4⤵
- Executes dropped EXE
PID:4156
-
-
-
-
C:\WINDOWS\mssecsvc.exeC:\WINDOWS\mssecsvc.exe -m security1⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Modifies data under HKEY_USERS
PID:2324
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --field-trial-handle=4404,i,10597648459838880772,16562651767759956329,262144 --variations-seed-version --mojo-platform-channel-handle=4400 /prefetch:81⤵PID:4380
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3.6MB
MD504e03c46f899afe3cfd217360a2d4062
SHA15472f24ad819a24e40deea7a32439eecc3e3bd61
SHA256e128d9a3d3605c9d9c833fae56ddc8fb9e783b6d8da5bf75dd7eca6e08461652
SHA512559e18dafa90e585a4bcc5a388ea05db94c3ec6a203150c61cbd9f3d8d46c0bebc1228117d010646ec7482ad5cf566af47408834bbdaf7a1a0a1b14111c84da4
-
Filesize
3.4MB
MD5a88a81f7f48f37d4928dfe7ddf94fe18
SHA157a4541272f3446a3c78d8bd4168e9cbe12cf260
SHA2568f4ae6152a48e8dcd832100047e5b12250be786e1b0f7327524660aac56918c4
SHA512b8ae182399c398fa7ec7ff8c4dfe6e07155a1395669d2f5547242f762e1874539eb6ea2d2b55c5124dd35ff931cd182e18d0580ca7bfb55e1f972613b5d2a6ed