Analysis
-
max time kernel
150s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
10-09-2024 12:15
Static task
static1
Behavioral task
behavioral1
Sample
d84404fd96fca52bb8af403da29b5b2d_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
d84404fd96fca52bb8af403da29b5b2d_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
d84404fd96fca52bb8af403da29b5b2d_JaffaCakes118.exe
-
Size
3.6MB
-
MD5
d84404fd96fca52bb8af403da29b5b2d
-
SHA1
3a7ea9025de02dc3fd3d0ca1fc34ff9ebcf47b80
-
SHA256
9a4948fc1e1080e6e951ca91a1e6a063486dc228af0689cbe2dfcad919e356fe
-
SHA512
844626cb90136dfbe84ee70b5571b8e1aede8319cd608987b8637932519d3f53a4191356defa3298ae3806bd61fcd22f1a60429c6b70dceb13be42207bbd4abe
-
SSDEEP
49152:XnAQqMSPbcBVQej/1INRx+TSqTdX1HkQo6SA:XDqPoBhz1aRxcSUDk36SA
Malware Config
Signatures
-
Wannacry
WannaCry is a ransomware cryptoworm.
-
Contacts a large (3297) amount of remote hosts 1 TTPs
This may indicate a network scan to discover remotely running services.
-
Executes dropped EXE 1 IoCs
pid Process 4876 tasksche.exe -
Creates a large amount of network flows 1 TTPs
This may indicate a network scan to discover remotely running services.
-
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\WINDOWS\tasksche.exe d84404fd96fca52bb8af403da29b5b2d_JaffaCakes118.exe -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language d84404fd96fca52bb8af403da29b5b2d_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language d84404fd96fca52bb8af403da29b5b2d_JaffaCakes118.exe -
Modifies data under HKEY_USERS 5 IoCs
description ioc Process Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ d84404fd96fca52bb8af403da29b5b2d_JaffaCakes118.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ProxyBypass = "1" d84404fd96fca52bb8af403da29b5b2d_JaffaCakes118.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\IntranetName = "1" d84404fd96fca52bb8af403da29b5b2d_JaffaCakes118.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\UNCAsIntranet = "1" d84404fd96fca52bb8af403da29b5b2d_JaffaCakes118.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\AutoDetect = "0" d84404fd96fca52bb8af403da29b5b2d_JaffaCakes118.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\d84404fd96fca52bb8af403da29b5b2d_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\d84404fd96fca52bb8af403da29b5b2d_JaffaCakes118.exe"1⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:2400 -
C:\WINDOWS\tasksche.exeC:\WINDOWS\tasksche.exe /i2⤵
- Executes dropped EXE
PID:4876
-
-
C:\Users\Admin\AppData\Local\Temp\d84404fd96fca52bb8af403da29b5b2d_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\d84404fd96fca52bb8af403da29b5b2d_JaffaCakes118.exe -m security1⤵
- System Location Discovery: System Language Discovery
- Modifies data under HKEY_USERS
PID:3240
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3.4MB
MD54613c0f230c795e3aee9638f769c8658
SHA127e4fe1102087a820b975b6f5190db71b16aeae6
SHA2560e6ba53dbfcfb9eed1ef7e20b1cc810ca607cdae3c75dc0293b966f8f499749d
SHA5126ef62683d31790f1539492b8929c30bdf39de665af318caa4f5737aa91b5e82b0ddd06a383bd9ae4e6dd15cf57af4a8dbc57614804ea41bf3c92b61dce0c3002