Analysis
-
max time kernel
150s -
max time network
150s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
11-09-2024 08:18
Static task
static1
Behavioral task
behavioral1
Sample
d9f276855355882bfa1f070b80ab4d11_JaffaCakes118.dll
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
d9f276855355882bfa1f070b80ab4d11_JaffaCakes118.dll
Resource
win10v2004-20240802-en
General
-
Target
d9f276855355882bfa1f070b80ab4d11_JaffaCakes118.dll
-
Size
5.0MB
-
MD5
d9f276855355882bfa1f070b80ab4d11
-
SHA1
a0444e21e92b42487388093c9ce1cb63063ec81c
-
SHA256
c7741037bc7fc317020d9b7bed2000d83b8f54847866c4f524275210ea244275
-
SHA512
1653f7cede7b1bac6136e8ecac07e111434a090076a740778fa584cf4d0ca78650176d119c6f2b5e3dd4507c64ebfda6a3d8e113f1338fccf65e63a88f518eb5
-
SSDEEP
98304:TDqPoBhz1aRxcSUDk36SAEdhvxWa9P593R8yAV:TDqPe1Cxcxk3ZAEUadzR8yc
Malware Config
Signatures
-
Wannacry
WannaCry is a ransomware cryptoworm.
-
Contacts a large (3267) amount of remote hosts 1 TTPs
This may indicate a network scan to discover remotely running services.
-
Executes dropped EXE 3 IoCs
pid Process 1440 mssecsvc.exe 2988 mssecsvc.exe 3012 tasksche.exe -
Creates a large amount of network flows 1 TTPs
This may indicate a network scan to discover remotely running services.
-
Drops file in System32 directory 1 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\Temporary Internet Files\counters.dat mssecsvc.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\WINDOWS\mssecsvc.exe rundll32.exe File created C:\WINDOWS\tasksche.exe mssecsvc.exe -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mssecsvc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mssecsvc.exe -
Modifies data under HKEY_USERS 24 IoCs
description ioc Process Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{4B0B934F-A7FB-4C1E-AE1C-5C660A29FA5A}\WpadDecisionTime = 706fc13c2304db01 mssecsvc.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{4B0B934F-A7FB-4C1E-AE1C-5C660A29FA5A}\WpadDecision = "0" mssecsvc.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\46-09-0e-fb-72-83\WpadDecisionReason = "1" mssecsvc.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\46-09-0e-fb-72-83\WpadDecisionTime = 706fc13c2304db01 mssecsvc.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings mssecsvc.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ mssecsvc.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\DefaultConnectionSettings = 4600000003000000090000000000000000000000000000000400000000000000000000000000000000000000000000000000000001000000020000000a7f01a3000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 mssecsvc.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings mssecsvc.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ProxyEnable = "0" mssecsvc.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{4B0B934F-A7FB-4C1E-AE1C-5C660A29FA5A}\WpadNetworkName = "Network 3" mssecsvc.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Cookies\CachePrefix = "Cookie:" mssecsvc.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad mssecsvc.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{4B0B934F-A7FB-4C1E-AE1C-5C660A29FA5A}\46-09-0e-fb-72-83 mssecsvc.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\46-09-0e-fb-72-83\WpadDecision = "0" mssecsvc.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\DefaultConnectionSettings = 4600000002000000090000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 mssecsvc.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\SavedLegacySettings = 4600000002000000090000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 mssecsvc.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Content\CachePrefix mssecsvc.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\History\CachePrefix = "Visited:" mssecsvc.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{4B0B934F-A7FB-4C1E-AE1C-5C660A29FA5A} mssecsvc.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{4B0B934F-A7FB-4C1E-AE1C-5C660A29FA5A}\WpadDecisionReason = "1" mssecsvc.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\46-09-0e-fb-72-83 mssecsvc.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections mssecsvc.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\UNCAsIntranet = "0" mssecsvc.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\AutoDetect = "1" mssecsvc.exe -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 1988 wrote to memory of 2036 1988 rundll32.exe 31 PID 1988 wrote to memory of 2036 1988 rundll32.exe 31 PID 1988 wrote to memory of 2036 1988 rundll32.exe 31 PID 1988 wrote to memory of 2036 1988 rundll32.exe 31 PID 1988 wrote to memory of 2036 1988 rundll32.exe 31 PID 1988 wrote to memory of 2036 1988 rundll32.exe 31 PID 1988 wrote to memory of 2036 1988 rundll32.exe 31 PID 2036 wrote to memory of 1440 2036 rundll32.exe 32 PID 2036 wrote to memory of 1440 2036 rundll32.exe 32 PID 2036 wrote to memory of 1440 2036 rundll32.exe 32 PID 2036 wrote to memory of 1440 2036 rundll32.exe 32
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\d9f276855355882bfa1f070b80ab4d11_JaffaCakes118.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1988 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\d9f276855355882bfa1f070b80ab4d11_JaffaCakes118.dll,#12⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2036 -
C:\WINDOWS\mssecsvc.exeC:\WINDOWS\mssecsvc.exe3⤵
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:1440 -
C:\WINDOWS\tasksche.exeC:\WINDOWS\tasksche.exe /i4⤵
- Executes dropped EXE
PID:3012
-
-
-
-
C:\WINDOWS\mssecsvc.exeC:\WINDOWS\mssecsvc.exe -m security1⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies data under HKEY_USERS
PID:2988
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3.6MB
MD5e8ec8d022c75a50305b66194763d59eb
SHA1dda0b7d8c649881c4a4ecbc375cda877ba5779b9
SHA256ff2403342dedf1103bcd46381cdd3144a080fafd96061064739dc6113e9327e9
SHA512341d46e4707d65ab4461fdd877c14ef84118d6a1682137e6a09669346d4112c275a09aaa67e5149a2c1c735b8b3a57b8323389321174fe0747e29675069f409e
-
Filesize
3.4MB
MD55636549068640d39a0efa734f2a22847
SHA1d076ba8c112b3a30f566c996965a34f364d227b1
SHA25612524d66aa1831993918fec79663b0860ee8c2ea5ce6e508394c88ed5534e6fb
SHA5126bf2aea5e5e9a42beb097798b0acb2f4f960fe31a26c9075c1c208c217f6ec5bbe28ae71e18d3410995625aa57becb17829123d2469c6bef99b3e5d4d00ea066