Analysis
-
max time kernel
33s -
max time network
38s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
10-09-2024 14:35
Static task
static1
Behavioral task
behavioral1
Sample
d864a726081c0efb148b597a3bd94233_JaffaCakes118.dll
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
d864a726081c0efb148b597a3bd94233_JaffaCakes118.dll
Resource
win10v2004-20240802-en
General
-
Target
d864a726081c0efb148b597a3bd94233_JaffaCakes118.dll
-
Size
5.0MB
-
MD5
d864a726081c0efb148b597a3bd94233
-
SHA1
9b662a6671fea44ae301f7970f375818e96d1052
-
SHA256
1f04efbf85a2b196e5f696cb324936a0435effc516af128d32f1c101fe2640a8
-
SHA512
015bf40553c861381434b43fa796cd5621b08ce10328b14f1719171de4bc81d00702fe444685f4903ec3abd7ffa75dd8f4f96e198cca2dc7b54b8477eb0ccff5
-
SSDEEP
98304:TDqPoBhz1aRxcSUDk36SAEdhvxWa9P593d:TDqPe1Cxcxk3ZAEUadzd
Malware Config
Signatures
-
Wannacry
WannaCry is a ransomware cryptoworm.
-
Executes dropped EXE 3 IoCs
pid Process 1020 mssecsvc.exe 2884 mssecsvc.exe 2680 tasksche.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\Temporary Internet Files\counters.dat mssecsvc.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\WINDOWS\mssecsvc.exe rundll32.exe File created C:\WINDOWS\tasksche.exe mssecsvc.exe -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mssecsvc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mssecsvc.exe -
Modifies data under HKEY_USERS 24 IoCs
description ioc Process Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Cookies\CachePrefix = "Cookie:" mssecsvc.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\DefaultConnectionSettings = 4600000003000000090000000000000000000000000000000400000000000000000000000000000000000000000000000000000001000000020000000a7f00ce000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 mssecsvc.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{8E8D3A99-D70A-4C07-9E10-A481F371B7C3}\WpadDecisionTime = 804682b68e03db01 mssecsvc.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ProxyEnable = "0" mssecsvc.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ mssecsvc.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Content\CachePrefix mssecsvc.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad mssecsvc.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{8E8D3A99-D70A-4C07-9E10-A481F371B7C3}\WpadDecisionReason = "1" mssecsvc.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\fe-bc-6d-92-53-7b mssecsvc.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{8E8D3A99-D70A-4C07-9E10-A481F371B7C3}\fe-bc-6d-92-53-7b mssecsvc.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\fe-bc-6d-92-53-7b\WpadDecisionReason = "1" mssecsvc.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\DefaultConnectionSettings = 4600000002000000090000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 mssecsvc.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings mssecsvc.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\UNCAsIntranet = "0" mssecsvc.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\fe-bc-6d-92-53-7b\WpadDecisionTime = 804682b68e03db01 mssecsvc.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\History\CachePrefix = "Visited:" mssecsvc.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{8E8D3A99-D70A-4C07-9E10-A481F371B7C3}\WpadDecision = "0" mssecsvc.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\AutoDetect = "1" mssecsvc.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{8E8D3A99-D70A-4C07-9E10-A481F371B7C3} mssecsvc.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{8E8D3A99-D70A-4C07-9E10-A481F371B7C3}\WpadNetworkName = "Network 3" mssecsvc.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\fe-bc-6d-92-53-7b\WpadDecision = "0" mssecsvc.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings mssecsvc.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections mssecsvc.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\SavedLegacySettings = 4600000002000000090000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 mssecsvc.exe -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 3056 wrote to memory of 1320 3056 rundll32.exe 29 PID 3056 wrote to memory of 1320 3056 rundll32.exe 29 PID 3056 wrote to memory of 1320 3056 rundll32.exe 29 PID 3056 wrote to memory of 1320 3056 rundll32.exe 29 PID 3056 wrote to memory of 1320 3056 rundll32.exe 29 PID 3056 wrote to memory of 1320 3056 rundll32.exe 29 PID 3056 wrote to memory of 1320 3056 rundll32.exe 29 PID 1320 wrote to memory of 1020 1320 rundll32.exe 30 PID 1320 wrote to memory of 1020 1320 rundll32.exe 30 PID 1320 wrote to memory of 1020 1320 rundll32.exe 30 PID 1320 wrote to memory of 1020 1320 rundll32.exe 30
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\d864a726081c0efb148b597a3bd94233_JaffaCakes118.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:3056 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\d864a726081c0efb148b597a3bd94233_JaffaCakes118.dll,#12⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1320 -
C:\WINDOWS\mssecsvc.exeC:\WINDOWS\mssecsvc.exe3⤵
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:1020 -
C:\WINDOWS\tasksche.exeC:\WINDOWS\tasksche.exe /i4⤵
- Executes dropped EXE
PID:2680
-
-
-
-
C:\WINDOWS\mssecsvc.exeC:\WINDOWS\mssecsvc.exe -m security1⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies data under HKEY_USERS
PID:2884
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3.6MB
MD57d7b73a045d0e9cf63a6ad979dfd533c
SHA174c3da5742b78a20a68d7104c9b4bc9a1a8f1a95
SHA256124244c66879bd5b1693d1e68f6cafddc1e22af88587044bf684e47c6d2b7373
SHA51220390b60bc3bda51fdebe569acb959d7993352be88562f06b4af66656614b15ac410379c8c9471627a356426544b2145b9a589097ebfb416002f6ca9307b60da
-
Filesize
3.4MB
MD519d2d8ca2d14814ab80afb1eee596ff4
SHA1bdf13af32fba908ef8915c551ab862fbf8c74102
SHA2563013d22904bb73c0fb1de97c1a2430a60ba32cd666747c70b43c6701084ea69a
SHA5127af26324f164a9ee7bc892c5be4f34c12871c85cfcfd447c74f589739334c20985d8871abeed7a2c58fa325ae7ae02afe16b96570eea45c487d90e13cd8b322e