Analysis
-
max time kernel
150s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
11-09-2024 14:11
Static task
static1
Behavioral task
behavioral1
Sample
da849935ded74d6ec67b3f675a077773_JaffaCakes118.dll
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
da849935ded74d6ec67b3f675a077773_JaffaCakes118.dll
Resource
win10v2004-20240802-en
General
-
Target
da849935ded74d6ec67b3f675a077773_JaffaCakes118.dll
-
Size
5.0MB
-
MD5
da849935ded74d6ec67b3f675a077773
-
SHA1
7ba5ee4385357d8aaef913a1d072f05abd8065ae
-
SHA256
f917542e700119900587223373bbb702b82bb3aa50d8d672e5c14cc93d00182f
-
SHA512
c189587eba7d75188bb0619456d7f0c7517bd121e4f11a4f55cd036ed47e6faaf44c74f8787082e582a2f2fec41c0ad8f08b60e4457277d0015739d382800b0b
-
SSDEEP
98304:+8qPoB2z1aRxcSUDk36SAEdhvxWa9P593R8yAVp2H:+8qPd1Cxcxk3ZAEUadzR8yc4H
Malware Config
Signatures
-
Wannacry
WannaCry is a ransomware cryptoworm.
-
Contacts a large (3329) amount of remote hosts 1 TTPs
This may indicate a network scan to discover remotely running services.
-
Executes dropped EXE 3 IoCs
pid Process 1652 mssecsvc.exe 3884 mssecsvc.exe 3756 tasksche.exe -
Creates a large amount of network flows 1 TTPs
This may indicate a network scan to discover remotely running services.
-
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\WINDOWS\mssecsvc.exe rundll32.exe File created C:\WINDOWS\tasksche.exe mssecsvc.exe -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mssecsvc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mssecsvc.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 4616 wrote to memory of 3060 4616 rundll32.exe 85 PID 4616 wrote to memory of 3060 4616 rundll32.exe 85 PID 4616 wrote to memory of 3060 4616 rundll32.exe 85 PID 3060 wrote to memory of 1652 3060 rundll32.exe 86 PID 3060 wrote to memory of 1652 3060 rundll32.exe 86 PID 3060 wrote to memory of 1652 3060 rundll32.exe 86
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\da849935ded74d6ec67b3f675a077773_JaffaCakes118.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:4616 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\da849935ded74d6ec67b3f675a077773_JaffaCakes118.dll,#12⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3060 -
C:\WINDOWS\mssecsvc.exeC:\WINDOWS\mssecsvc.exe3⤵
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:1652 -
C:\WINDOWS\tasksche.exeC:\WINDOWS\tasksche.exe /i4⤵
- Executes dropped EXE
PID:3756
-
-
-
-
C:\WINDOWS\mssecsvc.exeC:\WINDOWS\mssecsvc.exe -m security1⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:3884
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3.6MB
MD59337a95307e7145667d7a3156f44637a
SHA1630051b3d8a9d692ac2198d26a0d841bfaa0a3ba
SHA2567175eb4a0fc7945714fed6bb9cf05bbd8870914b584f130515a687348e711f32
SHA5123b2a0da359f358753286cd16fea0db0bd7a59b4df12ab23f5dad4be36b03c017246f03f3565d8045a7c0cb5dcbd89be140c1ec0e9492c60a6ee9725b5d2e92c2
-
Filesize
3.4MB
MD577fbbb801b6e5c730340c2252e9162d2
SHA17228db01c1e35c6ac0870903550f233a7069c237
SHA256ff9cb2920c8cd813b6af613e6a0d5c7a5d4459d6508ea650e7293055d84ec835
SHA51227933b53ff414bc852655a02de005e47c286dec0503900b4eff1c6f72e4f62bf226ebb3f5267c7fc3299c8965f0c635c6c6bb464cb8a98fd0ae7f8eac36268f7