Analysis
-
max time kernel
150s -
max time network
151s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
10-09-2024 00:49
Static task
static1
Behavioral task
behavioral1
Sample
d75c541d0472028e2959890f9f41e270_JaffaCakes118.dll
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
d75c541d0472028e2959890f9f41e270_JaffaCakes118.dll
Resource
win10v2004-20240802-en
General
-
Target
d75c541d0472028e2959890f9f41e270_JaffaCakes118.dll
-
Size
5.0MB
-
MD5
d75c541d0472028e2959890f9f41e270
-
SHA1
354e644965b49fc9fc9c89336f77818420535558
-
SHA256
9a99cfd3b792f08aca555bd4486d6c402a7091640ff851b9000f4e07955e513d
-
SHA512
dec0c5f145fe52a5de1e45781c2d58a16c63d8cd12a084e62f35bbc52cb4e57e9e7c0eb047bcdf600cd401cd814c47d0ebcf1a7aed4d001bbab8a5e8c058c856
-
SSDEEP
12288:yvbLgPlu+QhMbaIMu7L5NVErCA4z2g6rTcbckPU82xi:SbLgddQhfdmMSirYbcMt
Malware Config
Signatures
-
Wannacry
WannaCry is a ransomware cryptoworm.
-
Contacts a large (3208) amount of remote hosts 1 TTPs
This may indicate a network scan to discover remotely running services.
-
Executes dropped EXE 3 IoCs
pid Process 2784 mssecsvc.exe 2800 mssecsvc.exe 2592 tasksche.exe -
Creates a large amount of network flows 1 TTPs
This may indicate a network scan to discover remotely running services.
-
Drops file in System32 directory 1 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\Temporary Internet Files\counters.dat mssecsvc.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\WINDOWS\mssecsvc.exe rundll32.exe File created C:\WINDOWS\tasksche.exe mssecsvc.exe -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mssecsvc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mssecsvc.exe -
Modifies data under HKEY_USERS 24 IoCs
description ioc Process Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections mssecsvc.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ mssecsvc.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\UNCAsIntranet = "0" mssecsvc.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\AutoDetect = "1" mssecsvc.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{2D2D6BE2-8CBC-4DC8-A90E-E05D9CE318A7}\WpadDecisionTime = 40b5d8451b03db01 mssecsvc.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{2D2D6BE2-8CBC-4DC8-A90E-E05D9CE318A7}\WpadDecision = "0" mssecsvc.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{2D2D6BE2-8CBC-4DC8-A90E-E05D9CE318A7}\WpadNetworkName = "Network 3" mssecsvc.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{2D2D6BE2-8CBC-4DC8-A90E-E05D9CE318A7}\0e-95-20-8c-0b-2e mssecsvc.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings mssecsvc.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\DefaultConnectionSettings = 4600000002000000090000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 mssecsvc.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings mssecsvc.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Content\CachePrefix mssecsvc.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Cookies\CachePrefix = "Cookie:" mssecsvc.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\History\CachePrefix = "Visited:" mssecsvc.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{2D2D6BE2-8CBC-4DC8-A90E-E05D9CE318A7} mssecsvc.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\0e-95-20-8c-0b-2e mssecsvc.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ProxyEnable = "0" mssecsvc.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad mssecsvc.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\DefaultConnectionSettings = 4600000003000000090000000000000000000000000000000400000000000000000000000000000000000000000000000000000001000000020000000a7f019a000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 mssecsvc.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{2D2D6BE2-8CBC-4DC8-A90E-E05D9CE318A7}\WpadDecisionReason = "1" mssecsvc.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\0e-95-20-8c-0b-2e\WpadDecisionReason = "1" mssecsvc.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\SavedLegacySettings = 4600000002000000090000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 mssecsvc.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\0e-95-20-8c-0b-2e\WpadDecisionTime = 40b5d8451b03db01 mssecsvc.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\0e-95-20-8c-0b-2e\WpadDecision = "0" mssecsvc.exe -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 2720 wrote to memory of 2728 2720 rundll32.exe 30 PID 2720 wrote to memory of 2728 2720 rundll32.exe 30 PID 2720 wrote to memory of 2728 2720 rundll32.exe 30 PID 2720 wrote to memory of 2728 2720 rundll32.exe 30 PID 2720 wrote to memory of 2728 2720 rundll32.exe 30 PID 2720 wrote to memory of 2728 2720 rundll32.exe 30 PID 2720 wrote to memory of 2728 2720 rundll32.exe 30 PID 2728 wrote to memory of 2784 2728 rundll32.exe 31 PID 2728 wrote to memory of 2784 2728 rundll32.exe 31 PID 2728 wrote to memory of 2784 2728 rundll32.exe 31 PID 2728 wrote to memory of 2784 2728 rundll32.exe 31
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\d75c541d0472028e2959890f9f41e270_JaffaCakes118.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:2720 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\d75c541d0472028e2959890f9f41e270_JaffaCakes118.dll,#12⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2728 -
C:\WINDOWS\mssecsvc.exeC:\WINDOWS\mssecsvc.exe3⤵
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:2784 -
C:\WINDOWS\tasksche.exeC:\WINDOWS\tasksche.exe /i4⤵
- Executes dropped EXE
PID:2592
-
-
-
-
C:\WINDOWS\mssecsvc.exeC:\WINDOWS\mssecsvc.exe -m security1⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies data under HKEY_USERS
PID:2800
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3.6MB
MD5a7bd361b5ada833d31eda6f03a454255
SHA17d08ae9d0dcc2d10ba2f91006f2e724e64c30ae0
SHA256fd12a65fa0e3fb765a22db7c8b538205c99ac16bea247b5f717b36f73ce6813b
SHA51287fd40c2876eaa0f41c26c4a81bf9ad96c5fdea5e1e6a6894765cbae64f6c9742f28d84fecbeb65772531e3c05f57b0d183c254d40a0b084e7670510374b7b04
-
Filesize
3.4MB
MD5eb555f071a3b70e1fdda000076bcb32e
SHA1a2f1fe800e534d64994c0da6b267aad33ceb06b0
SHA25681602293604804dc3364ba1187ac38086739670c7b397b139756e795b1788260
SHA512c225529492035506fd2bb583b16e82b8d04d730efa0de09fafb509b1f751f83c580aefae6028476395950cc8be4fae43b66fe66da3e052eb782e8908ef7f70e7