Analysis
-
max time kernel
150s -
max time network
150s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
10-09-2024 06:22
Static task
static1
Behavioral task
behavioral1
Sample
d7b4fcbe36322e50f111c03040829082_JaffaCakes118.dll
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
d7b4fcbe36322e50f111c03040829082_JaffaCakes118.dll
Resource
win10v2004-20240802-en
General
-
Target
d7b4fcbe36322e50f111c03040829082_JaffaCakes118.dll
-
Size
5.0MB
-
MD5
d7b4fcbe36322e50f111c03040829082
-
SHA1
a8beb663b0053f34927e0eac9ee1bee3da3278ed
-
SHA256
0422930aaaeae806bf3d9fa86c0f1163993bbb8985ce791ae312e73f12387555
-
SHA512
a8e2ed4224e5a6858a3c8265fca3d75d435c5acd7730a221c7f784dfa216208a2999c693bdea02de149533091dbda065fc6b2f2c17d31d218f79fa8c1ebb9696
-
SSDEEP
24576:SbLgddQhfdmMSirYbcMNgef0QeQjG/D8kIq+C+9XEk:SnAQqMSPbcBVQej/0
Malware Config
Signatures
-
Wannacry
WannaCry is a ransomware cryptoworm.
-
Contacts a large (3294) amount of remote hosts 1 TTPs
This may indicate a network scan to discover remotely running services.
-
Executes dropped EXE 3 IoCs
pid Process 2828 mssecsvc.exe 2708 mssecsvc.exe 2632 tasksche.exe -
Creates a large amount of network flows 1 TTPs
This may indicate a network scan to discover remotely running services.
-
Drops file in System32 directory 1 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\Temporary Internet Files\counters.dat mssecsvc.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\WINDOWS\mssecsvc.exe rundll32.exe File created C:\WINDOWS\tasksche.exe mssecsvc.exe -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mssecsvc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mssecsvc.exe -
Modifies data under HKEY_USERS 24 IoCs
description ioc Process Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings mssecsvc.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\UNCAsIntranet = "0" mssecsvc.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\History\CachePrefix = "Visited:" mssecsvc.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad mssecsvc.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{37C5064A-CF37-4728-970B-B9A205A27EFE}\WpadDecisionTime = f07c50e14903db01 mssecsvc.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{37C5064A-CF37-4728-970B-B9A205A27EFE}\WpadNetworkName = "Network 3" mssecsvc.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{37C5064A-CF37-4728-970B-B9A205A27EFE}\96-02-b2-f5-1a-e2 mssecsvc.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\DefaultConnectionSettings = 4600000002000000090000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 mssecsvc.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ mssecsvc.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Content\CachePrefix mssecsvc.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{37C5064A-CF37-4728-970B-B9A205A27EFE} mssecsvc.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{37C5064A-CF37-4728-970B-B9A205A27EFE}\WpadDecision = "0" mssecsvc.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\96-02-b2-f5-1a-e2\WpadDecisionTime = f07c50e14903db01 mssecsvc.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\96-02-b2-f5-1a-e2\WpadDecision = "0" mssecsvc.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ProxyEnable = "0" mssecsvc.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\SavedLegacySettings = 4600000002000000090000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 mssecsvc.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\DefaultConnectionSettings = 4600000003000000090000000000000000000000000000000400000000000000000000000000000000000000000000000000000001000000020000000a7f00fc000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 mssecsvc.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{37C5064A-CF37-4728-970B-B9A205A27EFE}\WpadDecisionReason = "1" mssecsvc.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections mssecsvc.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings mssecsvc.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\AutoDetect = "1" mssecsvc.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Cookies\CachePrefix = "Cookie:" mssecsvc.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\96-02-b2-f5-1a-e2 mssecsvc.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\96-02-b2-f5-1a-e2\WpadDecisionReason = "1" mssecsvc.exe -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 2848 wrote to memory of 2896 2848 rundll32.exe 30 PID 2848 wrote to memory of 2896 2848 rundll32.exe 30 PID 2848 wrote to memory of 2896 2848 rundll32.exe 30 PID 2848 wrote to memory of 2896 2848 rundll32.exe 30 PID 2848 wrote to memory of 2896 2848 rundll32.exe 30 PID 2848 wrote to memory of 2896 2848 rundll32.exe 30 PID 2848 wrote to memory of 2896 2848 rundll32.exe 30 PID 2896 wrote to memory of 2828 2896 rundll32.exe 31 PID 2896 wrote to memory of 2828 2896 rundll32.exe 31 PID 2896 wrote to memory of 2828 2896 rundll32.exe 31 PID 2896 wrote to memory of 2828 2896 rundll32.exe 31
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\d7b4fcbe36322e50f111c03040829082_JaffaCakes118.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:2848 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\d7b4fcbe36322e50f111c03040829082_JaffaCakes118.dll,#12⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2896 -
C:\WINDOWS\mssecsvc.exeC:\WINDOWS\mssecsvc.exe3⤵
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:2828 -
C:\WINDOWS\tasksche.exeC:\WINDOWS\tasksche.exe /i4⤵
- Executes dropped EXE
PID:2632
-
-
-
-
C:\WINDOWS\mssecsvc.exeC:\WINDOWS\mssecsvc.exe -m security1⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies data under HKEY_USERS
PID:2708
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3.6MB
MD5e8813239d34ba23cd225cc86d7a685be
SHA1cd40920c1d5117e0bab771432952a450c04ef07e
SHA2560c5a73ec4ff9ed5fa0300b75690acf44536c324ad43f80cb383a9ec6d1929df2
SHA5123d275b8ad3d91b308550cd660e20b449128c68ad252baaf549c97173e1f1a8d403dc145877d2f09d7c858093610ca6c1649054518b1ace9aeef917215a29e056
-
Filesize
3.4MB
MD502da6cbf33799be44363b4fc8cf3f95c
SHA1a28be1a702471915d8f8870a04329d4737f84cb8
SHA256085e106869e9d447e8145bcb89924a6b78fcd3194277caae34a33a97e77785d0
SHA5124a93348cceb45bdece61f8c9fadffc862bd0f159eb0d38a7485e9c77f3d65fede22b1b8c3b34f2ad1cf5609e4830c49f8a7ddc33d92b906ee7d3dccf52be9a3f