Analysis
-
max time kernel
150s -
max time network
151s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
10-09-2024 05:57
Static task
static1
Behavioral task
behavioral1
Sample
d7ad80f2f8d5b28983310cefffcf8878_JaffaCakes118.dll
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
d7ad80f2f8d5b28983310cefffcf8878_JaffaCakes118.dll
Resource
win10v2004-20240802-en
General
-
Target
d7ad80f2f8d5b28983310cefffcf8878_JaffaCakes118.dll
-
Size
5.0MB
-
MD5
d7ad80f2f8d5b28983310cefffcf8878
-
SHA1
5e51b23489c64b155b653669fd8c7fa882bfe50a
-
SHA256
1351f27d0b7e0d1f4700162d4f91dc93bb43a2aefa0ba22f86056bc6444a9703
-
SHA512
1af14e752d5e8e492d3f0d576f78674b81b5f15a55474299e6200826a66446c17c0c44a40fc27c60d906d03fabf368287e3707e71b2d46c7e409109307f0cf87
-
SSDEEP
98304:TDqPoBhz1aRxcSUDk36SAEdhvxWa9P59:TDqPe1Cxcxk3ZAEUad
Malware Config
Signatures
-
Wannacry
WannaCry is a ransomware cryptoworm.
-
Contacts a large (3248) amount of remote hosts 1 TTPs
This may indicate a network scan to discover remotely running services.
-
Executes dropped EXE 3 IoCs
pid Process 2188 mssecsvc.exe 1360 mssecsvc.exe 2280 tasksche.exe -
Creates a large amount of network flows 1 TTPs
This may indicate a network scan to discover remotely running services.
-
Drops file in System32 directory 1 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\Temporary Internet Files\counters.dat mssecsvc.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\WINDOWS\mssecsvc.exe rundll32.exe File created C:\WINDOWS\tasksche.exe mssecsvc.exe -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mssecsvc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mssecsvc.exe -
Modifies data under HKEY_USERS 24 IoCs
description ioc Process Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\DefaultConnectionSettings = 4600000003000000090000000000000000000000000000000400000000000000000000000000000000000000000000000000000001000000020000000a7f00f1000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 mssecsvc.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\7e-57-b4-c4-09-1c mssecsvc.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\7e-57-b4-c4-09-1c\WpadDecision = "0" mssecsvc.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings mssecsvc.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\DefaultConnectionSettings = 4600000002000000090000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 mssecsvc.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\SavedLegacySettings = 4600000002000000090000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 mssecsvc.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\AutoDetect = "1" mssecsvc.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{55A16186-0D08-4D6C-9D1F-AF23C6A18A9C} mssecsvc.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{55A16186-0D08-4D6C-9D1F-AF23C6A18A9C}\WpadDecision = "0" mssecsvc.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections mssecsvc.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\UNCAsIntranet = "0" mssecsvc.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Content\CachePrefix mssecsvc.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Cookies\CachePrefix = "Cookie:" mssecsvc.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad mssecsvc.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{55A16186-0D08-4D6C-9D1F-AF23C6A18A9C}\WpadDecisionReason = "1" mssecsvc.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{55A16186-0D08-4D6C-9D1F-AF23C6A18A9C}\WpadNetworkName = "Network 3" mssecsvc.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\7e-57-b4-c4-09-1c\WpadDecisionTime = d008054c4603db01 mssecsvc.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{55A16186-0D08-4D6C-9D1F-AF23C6A18A9C}\WpadDecisionTime = d008054c4603db01 mssecsvc.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{55A16186-0D08-4D6C-9D1F-AF23C6A18A9C}\7e-57-b4-c4-09-1c mssecsvc.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\7e-57-b4-c4-09-1c\WpadDecisionReason = "1" mssecsvc.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings mssecsvc.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ProxyEnable = "0" mssecsvc.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ mssecsvc.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\History\CachePrefix = "Visited:" mssecsvc.exe -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 2452 wrote to memory of 2192 2452 rundll32.exe 30 PID 2452 wrote to memory of 2192 2452 rundll32.exe 30 PID 2452 wrote to memory of 2192 2452 rundll32.exe 30 PID 2452 wrote to memory of 2192 2452 rundll32.exe 30 PID 2452 wrote to memory of 2192 2452 rundll32.exe 30 PID 2452 wrote to memory of 2192 2452 rundll32.exe 30 PID 2452 wrote to memory of 2192 2452 rundll32.exe 30 PID 2192 wrote to memory of 2188 2192 rundll32.exe 31 PID 2192 wrote to memory of 2188 2192 rundll32.exe 31 PID 2192 wrote to memory of 2188 2192 rundll32.exe 31 PID 2192 wrote to memory of 2188 2192 rundll32.exe 31
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\d7ad80f2f8d5b28983310cefffcf8878_JaffaCakes118.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:2452 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\d7ad80f2f8d5b28983310cefffcf8878_JaffaCakes118.dll,#12⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2192 -
C:\WINDOWS\mssecsvc.exeC:\WINDOWS\mssecsvc.exe3⤵
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:2188 -
C:\WINDOWS\tasksche.exeC:\WINDOWS\tasksche.exe /i4⤵
- Executes dropped EXE
PID:2280
-
-
-
-
C:\WINDOWS\mssecsvc.exeC:\WINDOWS\mssecsvc.exe -m security1⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies data under HKEY_USERS
PID:1360
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3.6MB
MD503ccdc10229d03163f6a336c20c0c387
SHA1ae3932c05191ed6c1f742fdac245a133389ba72f
SHA256b71c7a761c1fcf2ca362e4464762b760f406d171c4d087b3fa5ac8fef6f40e09
SHA51234cad2a062a4a31d1b5b3655fa398dbea66fa70c19cdb3725b1ea344d62b605e608610a327b68cb415b51511c26ad270be8d838dd3a050840855a190d8fb9ca0
-
Filesize
3.4MB
MD55a1596c30f0704edb074358c1b459cd0
SHA13a52cbf0571a55c93873a7d9212073ccdfea6655
SHA256aec6782163a899a2d26cdf3c83da1ab0adae7aeb885270c3835ea6c55e3a785a
SHA51235a0c6b9bab69f6e689d26a8f3efc58ebd9b0820096005841bc6a37562a7936ed9b2c326c50b3889f538a52a406148f10b060e2ebc3e1cd1a014210919cea24c