Analysis
-
max time kernel
150s -
max time network
151s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
08-09-2024 10:27
Static task
static1
Behavioral task
behavioral1
Sample
d425e84ff06db0fdb37101daf98d2ab6_JaffaCakes118.dll
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
d425e84ff06db0fdb37101daf98d2ab6_JaffaCakes118.dll
Resource
win10v2004-20240802-en
General
-
Target
d425e84ff06db0fdb37101daf98d2ab6_JaffaCakes118.dll
-
Size
5.0MB
-
MD5
d425e84ff06db0fdb37101daf98d2ab6
-
SHA1
b09dfea9c4c14a9d0e8dff30cbce982e63bc8208
-
SHA256
3c7e73a52bab42b0a061f94e9a2ae9ae8a06849fd95cd7e21164d1864847018b
-
SHA512
d4aa5ddf57e655ac8e7fa57edebdbe51e1366a14f3e6b582baa5ef753f9f847b76fb3a035adcaf9b9bb9dfb1ffa1185a9547570f26b87034056ac0591800b2c1
-
SSDEEP
98304:+DqPoBE1aRxcSUDk36SAEdhvxWa9P593R8yAVp2H:+DqPn1Cxcxk3ZAEUadzR8yc4H
Malware Config
Signatures
-
Wannacry
WannaCry is a ransomware cryptoworm.
-
Contacts a large (3064) amount of remote hosts 1 TTPs
This may indicate a network scan to discover remotely running services.
-
Executes dropped EXE 3 IoCs
pid Process 2752 mssecsvc.exe 2840 mssecsvc.exe 2816 tasksche.exe -
Creates a large amount of network flows 1 TTPs
This may indicate a network scan to discover remotely running services.
-
Drops file in System32 directory 1 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\Temporary Internet Files\counters.dat mssecsvc.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\WINDOWS\mssecsvc.exe rundll32.exe File created C:\WINDOWS\tasksche.exe mssecsvc.exe -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mssecsvc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mssecsvc.exe -
Modifies data under HKEY_USERS 24 IoCs
description ioc Process Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{80DE928B-14BA-4435-9CAC-D5DF3FB6F6AE}\WpadNetworkName = "Network 3" mssecsvc.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\c2-07-7c-df-77-56\WpadDecisionReason = "1" mssecsvc.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\c2-07-7c-df-77-56\WpadDecisionTime = a01171b6d901db01 mssecsvc.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections mssecsvc.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings mssecsvc.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\History\CachePrefix = "Visited:" mssecsvc.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\c2-07-7c-df-77-56 mssecsvc.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\UNCAsIntranet = "0" mssecsvc.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\AutoDetect = "1" mssecsvc.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\DefaultConnectionSettings = 4600000003000000090000000000000000000000000000000400000000000000000000000000000000000000000000000000000001000000020000000a7f00d6000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 mssecsvc.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Content\CachePrefix mssecsvc.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Cookies\CachePrefix = "Cookie:" mssecsvc.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad mssecsvc.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{80DE928B-14BA-4435-9CAC-D5DF3FB6F6AE}\WpadDecisionReason = "1" mssecsvc.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{80DE928B-14BA-4435-9CAC-D5DF3FB6F6AE}\WpadDecisionTime = a01171b6d901db01 mssecsvc.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\DefaultConnectionSettings = 4600000002000000090000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 mssecsvc.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\SavedLegacySettings = 4600000002000000090000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 mssecsvc.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ mssecsvc.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{80DE928B-14BA-4435-9CAC-D5DF3FB6F6AE}\WpadDecision = "0" mssecsvc.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{80DE928B-14BA-4435-9CAC-D5DF3FB6F6AE}\c2-07-7c-df-77-56 mssecsvc.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\c2-07-7c-df-77-56\WpadDecision = "0" mssecsvc.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings mssecsvc.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ProxyEnable = "0" mssecsvc.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{80DE928B-14BA-4435-9CAC-D5DF3FB6F6AE} mssecsvc.exe -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 2680 wrote to memory of 2700 2680 rundll32.exe 31 PID 2680 wrote to memory of 2700 2680 rundll32.exe 31 PID 2680 wrote to memory of 2700 2680 rundll32.exe 31 PID 2680 wrote to memory of 2700 2680 rundll32.exe 31 PID 2680 wrote to memory of 2700 2680 rundll32.exe 31 PID 2680 wrote to memory of 2700 2680 rundll32.exe 31 PID 2680 wrote to memory of 2700 2680 rundll32.exe 31 PID 2700 wrote to memory of 2752 2700 rundll32.exe 32 PID 2700 wrote to memory of 2752 2700 rundll32.exe 32 PID 2700 wrote to memory of 2752 2700 rundll32.exe 32 PID 2700 wrote to memory of 2752 2700 rundll32.exe 32
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\d425e84ff06db0fdb37101daf98d2ab6_JaffaCakes118.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:2680 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\d425e84ff06db0fdb37101daf98d2ab6_JaffaCakes118.dll,#12⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2700 -
C:\WINDOWS\mssecsvc.exeC:\WINDOWS\mssecsvc.exe3⤵
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:2752 -
C:\WINDOWS\tasksche.exeC:\WINDOWS\tasksche.exe /i4⤵
- Executes dropped EXE
PID:2816
-
-
-
-
C:\WINDOWS\mssecsvc.exeC:\WINDOWS\mssecsvc.exe -m security1⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies data under HKEY_USERS
PID:2840
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3.6MB
MD52245b1475cb106901a9df4fba93ebde9
SHA1304fe0dc02bcc2c9d403e9b28d236dffca7c0907
SHA256e83ac599f9c57722cfbd5fbd3f63eff0ff834bec116298d67b5ea012af4d99ff
SHA512efedade5a3a565b539a7fad9efd5c6567963db7bb1d225624983e0fa27a1ebd24414742cad761d0872db02b46f0b0e539240d6fee5fa21769cceb2acb2215231
-
Filesize
3.4MB
MD53193c92a4180f57c23539f6ebe6b8867
SHA1c819aae3bda07c61fa9e0f0bf6f71cdbb203b41b
SHA256f5709e480013599ba602588273e5ae053729a9660062f7c3263acfe8e6d21188
SHA5127668c6377c6fe55c9ed92eb0fbfe1c7da60f4d65e727a1ad6e127b829f25e21093f155a4e61ef0e6dcdd5e268ee73ccdd39228ef7312279287151650fa93bb96