Analysis
-
max time kernel
150s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
10-09-2024 14:35
Static task
static1
Behavioral task
behavioral1
Sample
d864a726081c0efb148b597a3bd94233_JaffaCakes118.dll
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
d864a726081c0efb148b597a3bd94233_JaffaCakes118.dll
Resource
win10v2004-20240802-en
General
-
Target
d864a726081c0efb148b597a3bd94233_JaffaCakes118.dll
-
Size
5.0MB
-
MD5
d864a726081c0efb148b597a3bd94233
-
SHA1
9b662a6671fea44ae301f7970f375818e96d1052
-
SHA256
1f04efbf85a2b196e5f696cb324936a0435effc516af128d32f1c101fe2640a8
-
SHA512
015bf40553c861381434b43fa796cd5621b08ce10328b14f1719171de4bc81d00702fe444685f4903ec3abd7ffa75dd8f4f96e198cca2dc7b54b8477eb0ccff5
-
SSDEEP
98304:TDqPoBhz1aRxcSUDk36SAEdhvxWa9P593d:TDqPe1Cxcxk3ZAEUadzd
Malware Config
Signatures
-
Wannacry
WannaCry is a ransomware cryptoworm.
-
Contacts a large (3337) amount of remote hosts 1 TTPs
This may indicate a network scan to discover remotely running services.
-
Executes dropped EXE 3 IoCs
pid Process 4716 mssecsvc.exe 2204 mssecsvc.exe 5116 tasksche.exe -
Creates a large amount of network flows 1 TTPs
This may indicate a network scan to discover remotely running services.
-
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\WINDOWS\tasksche.exe mssecsvc.exe File created C:\WINDOWS\mssecsvc.exe rundll32.exe -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mssecsvc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mssecsvc.exe -
Modifies data under HKEY_USERS 5 IoCs
description ioc Process Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ProxyBypass = "1" mssecsvc.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\IntranetName = "1" mssecsvc.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\UNCAsIntranet = "1" mssecsvc.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\AutoDetect = "0" mssecsvc.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ mssecsvc.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 3056 wrote to memory of 4172 3056 rundll32.exe 83 PID 3056 wrote to memory of 4172 3056 rundll32.exe 83 PID 3056 wrote to memory of 4172 3056 rundll32.exe 83 PID 4172 wrote to memory of 4716 4172 rundll32.exe 85 PID 4172 wrote to memory of 4716 4172 rundll32.exe 85 PID 4172 wrote to memory of 4716 4172 rundll32.exe 85
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\d864a726081c0efb148b597a3bd94233_JaffaCakes118.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:3056 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\d864a726081c0efb148b597a3bd94233_JaffaCakes118.dll,#12⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4172 -
C:\WINDOWS\mssecsvc.exeC:\WINDOWS\mssecsvc.exe3⤵
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:4716 -
C:\WINDOWS\tasksche.exeC:\WINDOWS\tasksche.exe /i4⤵
- Executes dropped EXE
PID:5116
-
-
-
-
C:\WINDOWS\mssecsvc.exeC:\WINDOWS\mssecsvc.exe -m security1⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Modifies data under HKEY_USERS
PID:2204
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3.6MB
MD57d7b73a045d0e9cf63a6ad979dfd533c
SHA174c3da5742b78a20a68d7104c9b4bc9a1a8f1a95
SHA256124244c66879bd5b1693d1e68f6cafddc1e22af88587044bf684e47c6d2b7373
SHA51220390b60bc3bda51fdebe569acb959d7993352be88562f06b4af66656614b15ac410379c8c9471627a356426544b2145b9a589097ebfb416002f6ca9307b60da
-
Filesize
3.4MB
MD519d2d8ca2d14814ab80afb1eee596ff4
SHA1bdf13af32fba908ef8915c551ab862fbf8c74102
SHA2563013d22904bb73c0fb1de97c1a2430a60ba32cd666747c70b43c6701084ea69a
SHA5127af26324f164a9ee7bc892c5be4f34c12871c85cfcfd447c74f589739334c20985d8871abeed7a2c58fa325ae7ae02afe16b96570eea45c487d90e13cd8b322e