Analysis
-
max time kernel
150s -
max time network
150s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
09-09-2024 18:12
Static task
static1
Behavioral task
behavioral1
Sample
d6d9deeb3e81eae9e76462684aba5cb2_JaffaCakes118.dll
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
d6d9deeb3e81eae9e76462684aba5cb2_JaffaCakes118.dll
Resource
win10v2004-20240802-en
General
-
Target
d6d9deeb3e81eae9e76462684aba5cb2_JaffaCakes118.dll
-
Size
5.0MB
-
MD5
d6d9deeb3e81eae9e76462684aba5cb2
-
SHA1
3f586459526cb110971124924423502f915d9129
-
SHA256
98f99fd5705c3e7610060eb4f55bf1fcc7ce0ef10ff59e277ceabd40aa2b97af
-
SHA512
ba5d4d1a39b48c7e3e1087bd87828581199e3f2c8b58fd3e3ab8a4800f679e9fd9ad775d06f46692f2776b85afa2b69b6be77ddd2caa587d62c3cf3d793c4f42
-
SSDEEP
98304:+DqPoBhw1aRxcSUDk36SAEdhvxWa9P593R8yAVp2H:+DqPp1Cxcxk3ZAEUadzR8yc4H
Malware Config
Signatures
-
Wannacry
WannaCry is a ransomware cryptoworm.
-
Contacts a large (3220) amount of remote hosts 1 TTPs
This may indicate a network scan to discover remotely running services.
-
Executes dropped EXE 3 IoCs
pid Process 2080 mssecsvc.exe 2136 mssecsvc.exe 2864 tasksche.exe -
Creates a large amount of network flows 1 TTPs
This may indicate a network scan to discover remotely running services.
-
Drops file in System32 directory 1 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\Temporary Internet Files\counters.dat mssecsvc.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\WINDOWS\mssecsvc.exe rundll32.exe File created C:\WINDOWS\tasksche.exe mssecsvc.exe -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mssecsvc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mssecsvc.exe -
Modifies data under HKEY_USERS 24 IoCs
description ioc Process Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\UNCAsIntranet = "0" mssecsvc.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\AutoDetect = "1" mssecsvc.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Content\CachePrefix mssecsvc.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\DefaultConnectionSettings = 4600000003000000090000000000000000000000000000000400000000000000000000000000000000000000000000000000000001000000020000000a7f00b0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 mssecsvc.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{7D1B0069-BDCC-41D1-B39F-AB8CA8B38D04}\WpadDecisionReason = "1" mssecsvc.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{7D1B0069-BDCC-41D1-B39F-AB8CA8B38D04}\WpadNetworkName = "Network 3" mssecsvc.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\26-52-07-4d-4a-5c\WpadDecisionTime = f0eee9e1e302db01 mssecsvc.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\DefaultConnectionSettings = 4600000002000000090000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 mssecsvc.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings mssecsvc.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Cookies\CachePrefix = "Cookie:" mssecsvc.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\History\CachePrefix = "Visited:" mssecsvc.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{7D1B0069-BDCC-41D1-B39F-AB8CA8B38D04} mssecsvc.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\26-52-07-4d-4a-5c mssecsvc.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{7D1B0069-BDCC-41D1-B39F-AB8CA8B38D04}\26-52-07-4d-4a-5c mssecsvc.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\26-52-07-4d-4a-5c\WpadDecision = "0" mssecsvc.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ProxyEnable = "0" mssecsvc.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ mssecsvc.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{7D1B0069-BDCC-41D1-B39F-AB8CA8B38D04}\WpadDecisionTime = f0eee9e1e302db01 mssecsvc.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings mssecsvc.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections mssecsvc.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\SavedLegacySettings = 4600000002000000090000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 mssecsvc.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad mssecsvc.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{7D1B0069-BDCC-41D1-B39F-AB8CA8B38D04}\WpadDecision = "0" mssecsvc.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\26-52-07-4d-4a-5c\WpadDecisionReason = "1" mssecsvc.exe -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 2416 wrote to memory of 1624 2416 rundll32.exe 30 PID 2416 wrote to memory of 1624 2416 rundll32.exe 30 PID 2416 wrote to memory of 1624 2416 rundll32.exe 30 PID 2416 wrote to memory of 1624 2416 rundll32.exe 30 PID 2416 wrote to memory of 1624 2416 rundll32.exe 30 PID 2416 wrote to memory of 1624 2416 rundll32.exe 30 PID 2416 wrote to memory of 1624 2416 rundll32.exe 30 PID 1624 wrote to memory of 2080 1624 rundll32.exe 31 PID 1624 wrote to memory of 2080 1624 rundll32.exe 31 PID 1624 wrote to memory of 2080 1624 rundll32.exe 31 PID 1624 wrote to memory of 2080 1624 rundll32.exe 31
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\d6d9deeb3e81eae9e76462684aba5cb2_JaffaCakes118.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:2416 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\d6d9deeb3e81eae9e76462684aba5cb2_JaffaCakes118.dll,#12⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1624 -
C:\WINDOWS\mssecsvc.exeC:\WINDOWS\mssecsvc.exe3⤵
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:2080 -
C:\WINDOWS\tasksche.exeC:\WINDOWS\tasksche.exe /i4⤵
- Executes dropped EXE
PID:2864
-
-
-
-
C:\WINDOWS\mssecsvc.exeC:\WINDOWS\mssecsvc.exe -m security1⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies data under HKEY_USERS
PID:2136
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3.6MB
MD53ad03d650836c3f5be1ad1f178bd736e
SHA1d47383102c807b09c7856f6e9a6fa3de5be4688a
SHA2565794ac6d6161471117ee3e240cf646bbb07725484e3bf40457881a9e72454d7e
SHA512a689104bb9924cd7258939add3dffa44de70e14aec84058370e83ffc4419253af11cd244e0d632222f524365817b90679eaab8d0b37c8eb279ccf6deef0ebd05
-
Filesize
3.4MB
MD5c8d22f30a5e4b35f916440823f318825
SHA1b0a9be583ecdf99d70c7920e468f53b32cf2285f
SHA256463860bc6523849aff3a676008f737ae56b37f04063dacc48aea196ed334291c
SHA5124e643f255d47b4f8778366ea69a2b9cbc3dea08098bd683cb335876d26649cda86e84747795577d388583685d447c36c545dd50459cb10390a9f50badb1daa90