Analysis
-
max time kernel
150s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
11-09-2024 05:40
Static task
static1
Behavioral task
behavioral1
Sample
d9b74eee31998e83fdbda390976f0478_JaffaCakes118.dll
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
d9b74eee31998e83fdbda390976f0478_JaffaCakes118.dll
Resource
win10v2004-20240802-en
General
-
Target
d9b74eee31998e83fdbda390976f0478_JaffaCakes118.dll
-
Size
5.0MB
-
MD5
d9b74eee31998e83fdbda390976f0478
-
SHA1
30cf09c8e6408832f906b9e599780c8152a6cc0d
-
SHA256
e51312acc7bb484f92e75cd7815415bb0912fc69964f5b26db6b2a2a78ee220b
-
SHA512
81f9df85b8988ce8072989b109b6249ffaf61c9e2ff76be161962e9a677e7b59463459da8a11feb681be5bd43103f3fad058fea1e1306feb9767994c6b2ee130
-
SSDEEP
49152:znAQqMSPbcBVQej/1INRx+TSqTdX1HkQ:TDqPoBhz1aRxcSUDk
Malware Config
Signatures
-
Wannacry
WannaCry is a ransomware cryptoworm.
-
Contacts a large (3311) amount of remote hosts 1 TTPs
This may indicate a network scan to discover remotely running services.
-
Executes dropped EXE 3 IoCs
pid Process 4904 mssecsvc.exe 2568 mssecsvc.exe 2952 tasksche.exe -
Creates a large amount of network flows 1 TTPs
This may indicate a network scan to discover remotely running services.
-
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\WINDOWS\mssecsvc.exe rundll32.exe File created C:\WINDOWS\tasksche.exe mssecsvc.exe -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mssecsvc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mssecsvc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Modifies data under HKEY_USERS 5 IoCs
description ioc Process Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ mssecsvc.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ProxyBypass = "1" mssecsvc.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\IntranetName = "1" mssecsvc.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\UNCAsIntranet = "1" mssecsvc.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\AutoDetect = "0" mssecsvc.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 3664 wrote to memory of 1544 3664 rundll32.exe 83 PID 3664 wrote to memory of 1544 3664 rundll32.exe 83 PID 3664 wrote to memory of 1544 3664 rundll32.exe 83 PID 1544 wrote to memory of 4904 1544 rundll32.exe 84 PID 1544 wrote to memory of 4904 1544 rundll32.exe 84 PID 1544 wrote to memory of 4904 1544 rundll32.exe 84
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\d9b74eee31998e83fdbda390976f0478_JaffaCakes118.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:3664 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\d9b74eee31998e83fdbda390976f0478_JaffaCakes118.dll,#12⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1544 -
C:\WINDOWS\mssecsvc.exeC:\WINDOWS\mssecsvc.exe3⤵
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:4904 -
C:\WINDOWS\tasksche.exeC:\WINDOWS\tasksche.exe /i4⤵
- Executes dropped EXE
PID:2952
-
-
-
-
C:\WINDOWS\mssecsvc.exeC:\WINDOWS\mssecsvc.exe -m security1⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Modifies data under HKEY_USERS
PID:2568
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3.6MB
MD5244984b4d507fd1fcf405c46504ae113
SHA1555a8937fb1fd248e818227b2cd86ad19bbaea74
SHA256b49139f4c29eaa95d3f188b348fbe8c17cf0f4359a9948fe673b8ba075f5da85
SHA5129c0390c771390102f97f3d16b9e4f9facdee9d44883a02811ff12c9fa27c184049fb7b8ea4aa4b469c8b839faeb36d5a08e70811ddf84333f61c17edded5f240
-
Filesize
3.4MB
MD52c8472da3bf7aea7575f62975e0d1c4e
SHA11bdbbd87f440db805fd0912cde7f23eebd7a6ecd
SHA2562a963939c6b31e6a8a7de7ce96e1e6130639e046d3a2377e8ee5009f50c12a29
SHA5125cdf476e9f9f397193fcd77b5ef1816b6449c6fa7fac208e7241f3aa57e94b9ec633a8d0a1271365b67e5524e9d8210bd3bb54d796b7101d91378408f344645e