Analysis
-
max time kernel
150s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
11-09-2024 08:18
Static task
static1
Behavioral task
behavioral1
Sample
d9f276855355882bfa1f070b80ab4d11_JaffaCakes118.dll
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
d9f276855355882bfa1f070b80ab4d11_JaffaCakes118.dll
Resource
win10v2004-20240802-en
General
-
Target
d9f276855355882bfa1f070b80ab4d11_JaffaCakes118.dll
-
Size
5.0MB
-
MD5
d9f276855355882bfa1f070b80ab4d11
-
SHA1
a0444e21e92b42487388093c9ce1cb63063ec81c
-
SHA256
c7741037bc7fc317020d9b7bed2000d83b8f54847866c4f524275210ea244275
-
SHA512
1653f7cede7b1bac6136e8ecac07e111434a090076a740778fa584cf4d0ca78650176d119c6f2b5e3dd4507c64ebfda6a3d8e113f1338fccf65e63a88f518eb5
-
SSDEEP
98304:TDqPoBhz1aRxcSUDk36SAEdhvxWa9P593R8yAV:TDqPe1Cxcxk3ZAEUadzR8yc
Malware Config
Signatures
-
Wannacry
WannaCry is a ransomware cryptoworm.
-
Contacts a large (3199) amount of remote hosts 1 TTPs
This may indicate a network scan to discover remotely running services.
-
Executes dropped EXE 3 IoCs
pid Process 5028 mssecsvc.exe 2616 mssecsvc.exe 1248 tasksche.exe -
Creates a large amount of network flows 1 TTPs
This may indicate a network scan to discover remotely running services.
-
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\WINDOWS\mssecsvc.exe rundll32.exe File created C:\WINDOWS\tasksche.exe mssecsvc.exe -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mssecsvc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mssecsvc.exe -
Modifies data under HKEY_USERS 5 IoCs
description ioc Process Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\AutoDetect = "0" mssecsvc.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ mssecsvc.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ProxyBypass = "1" mssecsvc.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\IntranetName = "1" mssecsvc.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\UNCAsIntranet = "1" mssecsvc.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 3460 wrote to memory of 4356 3460 rundll32.exe 83 PID 3460 wrote to memory of 4356 3460 rundll32.exe 83 PID 3460 wrote to memory of 4356 3460 rundll32.exe 83 PID 4356 wrote to memory of 5028 4356 rundll32.exe 85 PID 4356 wrote to memory of 5028 4356 rundll32.exe 85 PID 4356 wrote to memory of 5028 4356 rundll32.exe 85
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\d9f276855355882bfa1f070b80ab4d11_JaffaCakes118.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:3460 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\d9f276855355882bfa1f070b80ab4d11_JaffaCakes118.dll,#12⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4356 -
C:\WINDOWS\mssecsvc.exeC:\WINDOWS\mssecsvc.exe3⤵
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:5028 -
C:\WINDOWS\tasksche.exeC:\WINDOWS\tasksche.exe /i4⤵
- Executes dropped EXE
PID:1248
-
-
-
-
C:\WINDOWS\mssecsvc.exeC:\WINDOWS\mssecsvc.exe -m security1⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Modifies data under HKEY_USERS
PID:2616
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3.6MB
MD5e8ec8d022c75a50305b66194763d59eb
SHA1dda0b7d8c649881c4a4ecbc375cda877ba5779b9
SHA256ff2403342dedf1103bcd46381cdd3144a080fafd96061064739dc6113e9327e9
SHA512341d46e4707d65ab4461fdd877c14ef84118d6a1682137e6a09669346d4112c275a09aaa67e5149a2c1c735b8b3a57b8323389321174fe0747e29675069f409e
-
Filesize
3.4MB
MD55636549068640d39a0efa734f2a22847
SHA1d076ba8c112b3a30f566c996965a34f364d227b1
SHA25612524d66aa1831993918fec79663b0860ee8c2ea5ce6e508394c88ed5534e6fb
SHA5126bf2aea5e5e9a42beb097798b0acb2f4f960fe31a26c9075c1c208c217f6ec5bbe28ae71e18d3410995625aa57becb17829123d2469c6bef99b3e5d4d00ea066