Analysis
-
max time kernel
150s -
max time network
150s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
10-09-2024 01:48
Static task
static1
Behavioral task
behavioral1
Sample
d76e42cd409b60f5c1136a69b152dd26_JaffaCakes118.dll
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
d76e42cd409b60f5c1136a69b152dd26_JaffaCakes118.dll
Resource
win10v2004-20240802-en
General
-
Target
d76e42cd409b60f5c1136a69b152dd26_JaffaCakes118.dll
-
Size
5.0MB
-
MD5
d76e42cd409b60f5c1136a69b152dd26
-
SHA1
f5ec1a81ed5328da56053f3ade254a223541b7c6
-
SHA256
cb1e1fd195be73533d6d7b56af2b79c87ee7de55da632d3063c70d7c85505452
-
SHA512
ea6f8c419238209aaf31b944849a168f7b661b1f21f825f80e7a1512ab18613a1bda341b9e4b97fc341f3eeba295dd53ca096c6e656c536fae6a6fc2292a6037
-
SSDEEP
12288:yvbLgPlu+QhMbaIMu7L5NVErCA4z2g6rTcbckPU82900VeT9W:SbLgddQhfdmMSirYbcMNgeT9W
Malware Config
Signatures
-
Wannacry
WannaCry is a ransomware cryptoworm.
-
Contacts a large (3321) amount of remote hosts 1 TTPs
This may indicate a network scan to discover remotely running services.
-
Executes dropped EXE 3 IoCs
pid Process 2880 mssecsvc.exe 2948 mssecsvc.exe 2576 tasksche.exe -
Creates a large amount of network flows 1 TTPs
This may indicate a network scan to discover remotely running services.
-
Drops file in System32 directory 1 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\Temporary Internet Files\counters.dat mssecsvc.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\WINDOWS\mssecsvc.exe rundll32.exe File created C:\WINDOWS\tasksche.exe mssecsvc.exe -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mssecsvc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mssecsvc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Modifies data under HKEY_USERS 24 IoCs
description ioc Process Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{953238C1-3374-47FD-ABFA-F1138ADEC9E6} mssecsvc.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{953238C1-3374-47FD-ABFA-F1138ADEC9E6}\WpadNetworkName = "Network 3" mssecsvc.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\96-9b-24-b5-e1-c8 mssecsvc.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{953238C1-3374-47FD-ABFA-F1138ADEC9E6}\96-9b-24-b5-e1-c8 mssecsvc.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings mssecsvc.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\DefaultConnectionSettings = 4600000002000000090000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 mssecsvc.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings mssecsvc.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ mssecsvc.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\96-9b-24-b5-e1-c8\WpadDecisionReason = "1" mssecsvc.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{953238C1-3374-47FD-ABFA-F1138ADEC9E6}\WpadDecisionReason = "1" mssecsvc.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{953238C1-3374-47FD-ABFA-F1138ADEC9E6}\WpadDecisionTime = f012e8842303db01 mssecsvc.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\96-9b-24-b5-e1-c8\WpadDecisionTime = f012e8842303db01 mssecsvc.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections mssecsvc.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ProxyEnable = "0" mssecsvc.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Content\CachePrefix mssecsvc.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad mssecsvc.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\96-9b-24-b5-e1-c8\WpadDecision = "0" mssecsvc.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\SavedLegacySettings = 4600000002000000090000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 mssecsvc.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\UNCAsIntranet = "0" mssecsvc.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Cookies\CachePrefix = "Cookie:" mssecsvc.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\History\CachePrefix = "Visited:" mssecsvc.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\AutoDetect = "1" mssecsvc.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\DefaultConnectionSettings = 4600000003000000090000000000000000000000000000000400000000000000000000000000000000000000000000000000000001000000020000000a7f0107000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 mssecsvc.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{953238C1-3374-47FD-ABFA-F1138ADEC9E6}\WpadDecision = "0" mssecsvc.exe -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 2824 wrote to memory of 2776 2824 rundll32.exe 30 PID 2824 wrote to memory of 2776 2824 rundll32.exe 30 PID 2824 wrote to memory of 2776 2824 rundll32.exe 30 PID 2824 wrote to memory of 2776 2824 rundll32.exe 30 PID 2824 wrote to memory of 2776 2824 rundll32.exe 30 PID 2824 wrote to memory of 2776 2824 rundll32.exe 30 PID 2824 wrote to memory of 2776 2824 rundll32.exe 30 PID 2776 wrote to memory of 2880 2776 rundll32.exe 31 PID 2776 wrote to memory of 2880 2776 rundll32.exe 31 PID 2776 wrote to memory of 2880 2776 rundll32.exe 31 PID 2776 wrote to memory of 2880 2776 rundll32.exe 31
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\d76e42cd409b60f5c1136a69b152dd26_JaffaCakes118.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:2824 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\d76e42cd409b60f5c1136a69b152dd26_JaffaCakes118.dll,#12⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2776 -
C:\WINDOWS\mssecsvc.exeC:\WINDOWS\mssecsvc.exe3⤵
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:2880 -
C:\WINDOWS\tasksche.exeC:\WINDOWS\tasksche.exe /i4⤵
- Executes dropped EXE
PID:2576
-
-
-
-
C:\WINDOWS\mssecsvc.exeC:\WINDOWS\mssecsvc.exe -m security1⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies data under HKEY_USERS
PID:2948
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3.6MB
MD5588410c60c4d476af94abeac347f78f5
SHA1aa7cd08b7275cecd3390880d3feb8646c04e8e7f
SHA2566a4cc6b0af6f97130083f4cd5273b9fadd7909154e3b616e0878d14a8f6f8d28
SHA5128aa25c5585738e9b83aa21fef2604025b92b6ee4509b0c536f05b60f5dd5c9785d9a0d6b9e29f30977615db62348d2feba9cdf6170a73affcfdaa33259b27c61
-
Filesize
3.4MB
MD5004e5295a8e65563bc5e827297e4990a
SHA18974eaab038f250c0ad40b3945fd1f05c77219cc
SHA256976b10fd4ead21e37f732a85811dbd3b3f739f98e181643309fb4d3efdd06dea
SHA512a329fc3dcf5382de6b5f70d5a200ef1184a26af6b8d0d0116f64012d622b3d0f292c7178b75be99ed054612f45accf60ced97840c0d091baf75c7be517ba7514