Analysis
-
max time kernel
150s -
max time network
150s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
10-09-2024 12:15
Static task
static1
Behavioral task
behavioral1
Sample
d84404fd96fca52bb8af403da29b5b2d_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
d84404fd96fca52bb8af403da29b5b2d_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
d84404fd96fca52bb8af403da29b5b2d_JaffaCakes118.exe
-
Size
3.6MB
-
MD5
d84404fd96fca52bb8af403da29b5b2d
-
SHA1
3a7ea9025de02dc3fd3d0ca1fc34ff9ebcf47b80
-
SHA256
9a4948fc1e1080e6e951ca91a1e6a063486dc228af0689cbe2dfcad919e356fe
-
SHA512
844626cb90136dfbe84ee70b5571b8e1aede8319cd608987b8637932519d3f53a4191356defa3298ae3806bd61fcd22f1a60429c6b70dceb13be42207bbd4abe
-
SSDEEP
49152:XnAQqMSPbcBVQej/1INRx+TSqTdX1HkQo6SA:XDqPoBhz1aRxcSUDk36SA
Malware Config
Signatures
-
Wannacry
WannaCry is a ransomware cryptoworm.
-
Contacts a large (2971) amount of remote hosts 1 TTPs
This may indicate a network scan to discover remotely running services.
-
Executes dropped EXE 1 IoCs
pid Process 2624 tasksche.exe -
Creates a large amount of network flows 1 TTPs
This may indicate a network scan to discover remotely running services.
-
Drops file in System32 directory 1 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\Temporary Internet Files\counters.dat d84404fd96fca52bb8af403da29b5b2d_JaffaCakes118.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\WINDOWS\tasksche.exe d84404fd96fca52bb8af403da29b5b2d_JaffaCakes118.exe -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language d84404fd96fca52bb8af403da29b5b2d_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language d84404fd96fca52bb8af403da29b5b2d_JaffaCakes118.exe -
Modifies data under HKEY_USERS 24 IoCs
description ioc Process Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad d84404fd96fca52bb8af403da29b5b2d_JaffaCakes118.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\DefaultConnectionSettings = 4600000003000000090000000000000000000000000000000400000000000000000000000000000000000000000000000000000001000000020000000a7f0163000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 d84404fd96fca52bb8af403da29b5b2d_JaffaCakes118.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{8D8B0467-6AFE-45A6-90FA-C1C66B17D708} d84404fd96fca52bb8af403da29b5b2d_JaffaCakes118.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{8D8B0467-6AFE-45A6-90FA-C1C66B17D708}\WpadDecision = "0" d84404fd96fca52bb8af403da29b5b2d_JaffaCakes118.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\b2-49-0a-32-dd-a4\WpadDecision = "0" d84404fd96fca52bb8af403da29b5b2d_JaffaCakes118.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings d84404fd96fca52bb8af403da29b5b2d_JaffaCakes118.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Cookies\CachePrefix = "Cookie:" d84404fd96fca52bb8af403da29b5b2d_JaffaCakes118.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\b2-49-0a-32-dd-a4 d84404fd96fca52bb8af403da29b5b2d_JaffaCakes118.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{8D8B0467-6AFE-45A6-90FA-C1C66B17D708}\b2-49-0a-32-dd-a4 d84404fd96fca52bb8af403da29b5b2d_JaffaCakes118.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\b2-49-0a-32-dd-a4\WpadDecisionReason = "1" d84404fd96fca52bb8af403da29b5b2d_JaffaCakes118.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings d84404fd96fca52bb8af403da29b5b2d_JaffaCakes118.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Content\CachePrefix d84404fd96fca52bb8af403da29b5b2d_JaffaCakes118.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\SavedLegacySettings = 4600000002000000090000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 d84404fd96fca52bb8af403da29b5b2d_JaffaCakes118.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\DefaultConnectionSettings = 4600000002000000090000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 d84404fd96fca52bb8af403da29b5b2d_JaffaCakes118.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ProxyEnable = "0" d84404fd96fca52bb8af403da29b5b2d_JaffaCakes118.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ d84404fd96fca52bb8af403da29b5b2d_JaffaCakes118.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\UNCAsIntranet = "0" d84404fd96fca52bb8af403da29b5b2d_JaffaCakes118.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\AutoDetect = "1" d84404fd96fca52bb8af403da29b5b2d_JaffaCakes118.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\History\CachePrefix = "Visited:" d84404fd96fca52bb8af403da29b5b2d_JaffaCakes118.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{8D8B0467-6AFE-45A6-90FA-C1C66B17D708}\WpadDecisionReason = "1" d84404fd96fca52bb8af403da29b5b2d_JaffaCakes118.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections d84404fd96fca52bb8af403da29b5b2d_JaffaCakes118.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{8D8B0467-6AFE-45A6-90FA-C1C66B17D708}\WpadNetworkName = "Network 3" d84404fd96fca52bb8af403da29b5b2d_JaffaCakes118.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\b2-49-0a-32-dd-a4\WpadDecisionTime = b02481217b03db01 d84404fd96fca52bb8af403da29b5b2d_JaffaCakes118.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{8D8B0467-6AFE-45A6-90FA-C1C66B17D708}\WpadDecisionTime = b02481217b03db01 d84404fd96fca52bb8af403da29b5b2d_JaffaCakes118.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\d84404fd96fca52bb8af403da29b5b2d_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\d84404fd96fca52bb8af403da29b5b2d_JaffaCakes118.exe"1⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:612 -
C:\WINDOWS\tasksche.exeC:\WINDOWS\tasksche.exe /i2⤵
- Executes dropped EXE
PID:2624
-
-
C:\Users\Admin\AppData\Local\Temp\d84404fd96fca52bb8af403da29b5b2d_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\d84404fd96fca52bb8af403da29b5b2d_JaffaCakes118.exe -m security1⤵
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies data under HKEY_USERS
PID:1424
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3.4MB
MD54613c0f230c795e3aee9638f769c8658
SHA127e4fe1102087a820b975b6f5190db71b16aeae6
SHA2560e6ba53dbfcfb9eed1ef7e20b1cc810ca607cdae3c75dc0293b966f8f499749d
SHA5126ef62683d31790f1539492b8929c30bdf39de665af318caa4f5737aa91b5e82b0ddd06a383bd9ae4e6dd15cf57af4a8dbc57614804ea41bf3c92b61dce0c3002