Analysis
-
max time kernel
150s -
max time network
150s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
10-09-2024 22:10
Static task
static1
Behavioral task
behavioral1
Sample
d91f7855e93b37beb95078d0213fe6c0_JaffaCakes118.dll
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
d91f7855e93b37beb95078d0213fe6c0_JaffaCakes118.dll
Resource
win10v2004-20240802-en
General
-
Target
d91f7855e93b37beb95078d0213fe6c0_JaffaCakes118.dll
-
Size
5.0MB
-
MD5
d91f7855e93b37beb95078d0213fe6c0
-
SHA1
4b02ec3393b58fc922fa0e33a50a7597fb1f2652
-
SHA256
c5dcea9fb7b0f9017fc949b411d44bbf486fea0de66293c6d2df60d6b5443989
-
SHA512
fde40fa23d579f408340f161f111206622757b25e1e1dbdff88d7d83a6e5ff4bd28e0c21dc468d20e828332def9da1362e786deef639bd23ef516bae1551b550
-
SSDEEP
24576:SbLgddQhfdmMSirYbcMNgef09ME7A4kqAH1pNZtA0p+9XEk:SnAQqMSPbcBV9R8yAH1plAH
Malware Config
Signatures
-
Wannacry
WannaCry is a ransomware cryptoworm.
-
Contacts a large (3310) amount of remote hosts 1 TTPs
This may indicate a network scan to discover remotely running services.
-
Executes dropped EXE 3 IoCs
pid Process 2876 mssecsvc.exe 2516 mssecsvc.exe 2336 tasksche.exe -
Creates a large amount of network flows 1 TTPs
This may indicate a network scan to discover remotely running services.
-
Drops file in System32 directory 1 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\Temporary Internet Files\counters.dat mssecsvc.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\WINDOWS\mssecsvc.exe rundll32.exe File created C:\WINDOWS\tasksche.exe mssecsvc.exe -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mssecsvc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mssecsvc.exe -
Modifies data under HKEY_USERS 24 IoCs
description ioc Process Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\a2-ab-f2-bd-02-dc\WpadDecisionReason = "1" mssecsvc.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\a2-ab-f2-bd-02-dc\WpadDecision = "0" mssecsvc.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections mssecsvc.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\DefaultConnectionSettings = 4600000002000000090000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 mssecsvc.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\AutoDetect = "1" mssecsvc.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Content\CachePrefix mssecsvc.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{70FE9ADA-67BA-4B2A-AAB8-44EBE407B7CD}\WpadDecision = "0" mssecsvc.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{70FE9ADA-67BA-4B2A-AAB8-44EBE407B7CD}\WpadNetworkName = "Network 3" mssecsvc.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings mssecsvc.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Cookies\CachePrefix = "Cookie:" mssecsvc.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad mssecsvc.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\a2-ab-f2-bd-02-dc\WpadDecisionTime = 101cb141ce03db01 mssecsvc.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\SavedLegacySettings = 4600000002000000090000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 mssecsvc.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\History\CachePrefix = "Visited:" mssecsvc.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{70FE9ADA-67BA-4B2A-AAB8-44EBE407B7CD} mssecsvc.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{70FE9ADA-67BA-4B2A-AAB8-44EBE407B7CD}\WpadDecisionReason = "1" mssecsvc.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\a2-ab-f2-bd-02-dc mssecsvc.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{70FE9ADA-67BA-4B2A-AAB8-44EBE407B7CD}\a2-ab-f2-bd-02-dc mssecsvc.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings mssecsvc.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ProxyEnable = "0" mssecsvc.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ mssecsvc.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\UNCAsIntranet = "0" mssecsvc.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\DefaultConnectionSettings = 4600000003000000090000000000000000000000000000000400000000000000000000000000000000000000000000000000000001000000020000000a7f00eb000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 mssecsvc.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{70FE9ADA-67BA-4B2A-AAB8-44EBE407B7CD}\WpadDecisionTime = 101cb141ce03db01 mssecsvc.exe -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 2624 wrote to memory of 2904 2624 rundll32.exe 30 PID 2624 wrote to memory of 2904 2624 rundll32.exe 30 PID 2624 wrote to memory of 2904 2624 rundll32.exe 30 PID 2624 wrote to memory of 2904 2624 rundll32.exe 30 PID 2624 wrote to memory of 2904 2624 rundll32.exe 30 PID 2624 wrote to memory of 2904 2624 rundll32.exe 30 PID 2624 wrote to memory of 2904 2624 rundll32.exe 30 PID 2904 wrote to memory of 2876 2904 rundll32.exe 31 PID 2904 wrote to memory of 2876 2904 rundll32.exe 31 PID 2904 wrote to memory of 2876 2904 rundll32.exe 31 PID 2904 wrote to memory of 2876 2904 rundll32.exe 31
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\d91f7855e93b37beb95078d0213fe6c0_JaffaCakes118.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:2624 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\d91f7855e93b37beb95078d0213fe6c0_JaffaCakes118.dll,#12⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2904 -
C:\WINDOWS\mssecsvc.exeC:\WINDOWS\mssecsvc.exe3⤵
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:2876 -
C:\WINDOWS\tasksche.exeC:\WINDOWS\tasksche.exe /i4⤵
- Executes dropped EXE
PID:2336
-
-
-
-
C:\WINDOWS\mssecsvc.exeC:\WINDOWS\mssecsvc.exe -m security1⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies data under HKEY_USERS
PID:2516
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3.6MB
MD52204ea2b9427a0fd2b46b7bf62bd0212
SHA17e694d7492c784d1ad1af5ab4281432a6b93479c
SHA2566e9991a36d0e29d79d9f07fb02ff122e97b2392d8ab3e1eac06480e6ddd9b911
SHA51266e43c1de3763eac91e9d78e85482720c54ba8e9a87d34a0715a516e47dd47f4ccf48f0eb96d5910557aa5ad24e9d6cc80e0dc2ae46c7bfe52830b05540a6bab
-
Filesize
3.4MB
MD5646ed508c8a64664429075a93999fae6
SHA16b42ddfa009835973e399860ff185660a84bb5fe
SHA25694f6511befd927d7a894e90357d3c596ae62b1f3c63e75524ec7d9c8a2216f6d
SHA512b1077d1a1e64c9a471a048a81386903231a1890fb3333ff564b31cf709efe4af576a9eba87a8dd97301860181967d82b17a9d9065ba7c6fd311e05677d457296