Analysis
-
max time kernel
150s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
10-09-2024 22:10
Static task
static1
Behavioral task
behavioral1
Sample
d91f7855e93b37beb95078d0213fe6c0_JaffaCakes118.dll
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
d91f7855e93b37beb95078d0213fe6c0_JaffaCakes118.dll
Resource
win10v2004-20240802-en
General
-
Target
d91f7855e93b37beb95078d0213fe6c0_JaffaCakes118.dll
-
Size
5.0MB
-
MD5
d91f7855e93b37beb95078d0213fe6c0
-
SHA1
4b02ec3393b58fc922fa0e33a50a7597fb1f2652
-
SHA256
c5dcea9fb7b0f9017fc949b411d44bbf486fea0de66293c6d2df60d6b5443989
-
SHA512
fde40fa23d579f408340f161f111206622757b25e1e1dbdff88d7d83a6e5ff4bd28e0c21dc468d20e828332def9da1362e786deef639bd23ef516bae1551b550
-
SSDEEP
24576:SbLgddQhfdmMSirYbcMNgef09ME7A4kqAH1pNZtA0p+9XEk:SnAQqMSPbcBV9R8yAH1plAH
Malware Config
Signatures
-
Wannacry
WannaCry is a ransomware cryptoworm.
-
Contacts a large (3320) amount of remote hosts 1 TTPs
This may indicate a network scan to discover remotely running services.
-
Executes dropped EXE 3 IoCs
pid Process 228 mssecsvc.exe 1160 mssecsvc.exe 4956 tasksche.exe -
Creates a large amount of network flows 1 TTPs
This may indicate a network scan to discover remotely running services.
-
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\WINDOWS\mssecsvc.exe rundll32.exe File created C:\WINDOWS\tasksche.exe mssecsvc.exe -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mssecsvc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mssecsvc.exe -
Modifies data under HKEY_USERS 5 IoCs
description ioc Process Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ mssecsvc.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ProxyBypass = "1" mssecsvc.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\IntranetName = "1" mssecsvc.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\UNCAsIntranet = "1" mssecsvc.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\AutoDetect = "0" mssecsvc.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 2804 wrote to memory of 4692 2804 rundll32.exe 83 PID 2804 wrote to memory of 4692 2804 rundll32.exe 83 PID 2804 wrote to memory of 4692 2804 rundll32.exe 83 PID 4692 wrote to memory of 228 4692 rundll32.exe 85 PID 4692 wrote to memory of 228 4692 rundll32.exe 85 PID 4692 wrote to memory of 228 4692 rundll32.exe 85
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\d91f7855e93b37beb95078d0213fe6c0_JaffaCakes118.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:2804 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\d91f7855e93b37beb95078d0213fe6c0_JaffaCakes118.dll,#12⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4692 -
C:\WINDOWS\mssecsvc.exeC:\WINDOWS\mssecsvc.exe3⤵
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:228 -
C:\WINDOWS\tasksche.exeC:\WINDOWS\tasksche.exe /i4⤵
- Executes dropped EXE
PID:4956
-
-
-
-
C:\WINDOWS\mssecsvc.exeC:\WINDOWS\mssecsvc.exe -m security1⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Modifies data under HKEY_USERS
PID:1160
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3.6MB
MD52204ea2b9427a0fd2b46b7bf62bd0212
SHA17e694d7492c784d1ad1af5ab4281432a6b93479c
SHA2566e9991a36d0e29d79d9f07fb02ff122e97b2392d8ab3e1eac06480e6ddd9b911
SHA51266e43c1de3763eac91e9d78e85482720c54ba8e9a87d34a0715a516e47dd47f4ccf48f0eb96d5910557aa5ad24e9d6cc80e0dc2ae46c7bfe52830b05540a6bab
-
Filesize
3.4MB
MD5646ed508c8a64664429075a93999fae6
SHA16b42ddfa009835973e399860ff185660a84bb5fe
SHA25694f6511befd927d7a894e90357d3c596ae62b1f3c63e75524ec7d9c8a2216f6d
SHA512b1077d1a1e64c9a471a048a81386903231a1890fb3333ff564b31cf709efe4af576a9eba87a8dd97301860181967d82b17a9d9065ba7c6fd311e05677d457296