Analysis
-
max time kernel
150s -
max time network
150s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
12-09-2024 09:11
Static task
static1
Behavioral task
behavioral1
Sample
dc2652699bfb0a04b639db5b7ea17f99_JaffaCakes118.dll
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
dc2652699bfb0a04b639db5b7ea17f99_JaffaCakes118.dll
Resource
win10v2004-20240802-en
General
-
Target
dc2652699bfb0a04b639db5b7ea17f99_JaffaCakes118.dll
-
Size
5.0MB
-
MD5
dc2652699bfb0a04b639db5b7ea17f99
-
SHA1
bf5e71c716c8a6a3632a1f0ca631faf942ce0b9e
-
SHA256
993e5aec92db5f75b29d8f25ede03682f41f5a1e0dff2891a468dd29fd495911
-
SHA512
f65a9b62c282b21e1d2237ced8b8fafb242e22a917222fc00250b2fa56bd7a3d0cc7a8ecf6540d8f7b0d0c5bbb46ecf892ad347f96f64e7b0e84de6f00a56a31
-
SSDEEP
98304:+DqPoBhz1aRxcSUDk36SA+4sssPRh5EXaeCpL4:+DqPe1Cxcxk3ZAyRhWXaN4
Malware Config
Signatures
-
Wannacry
WannaCry is a ransomware cryptoworm.
-
Contacts a large (3205) amount of remote hosts 1 TTPs
This may indicate a network scan to discover remotely running services.
-
Executes dropped EXE 3 IoCs
pid Process 1700 mssecsvc.exe 1988 mssecsvc.exe 2744 tasksche.exe -
Creates a large amount of network flows 1 TTPs
This may indicate a network scan to discover remotely running services.
-
Drops file in System32 directory 1 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\Temporary Internet Files\counters.dat mssecsvc.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\WINDOWS\mssecsvc.exe rundll32.exe File created C:\WINDOWS\tasksche.exe mssecsvc.exe -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mssecsvc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mssecsvc.exe -
Modifies data under HKEY_USERS 24 IoCs
description ioc Process Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\AutoDetect = "1" mssecsvc.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad mssecsvc.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{BBC3B5B5-7C1A-4E0A-A6FA-AB6C406C9350} mssecsvc.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{BBC3B5B5-7C1A-4E0A-A6FA-AB6C406C9350}\WpadDecisionReason = "1" mssecsvc.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\62-4b-8f-c1-b3-91 mssecsvc.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\62-4b-8f-c1-b3-91\WpadDecisionReason = "1" mssecsvc.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections mssecsvc.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\DefaultConnectionSettings = 4600000002000000090000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 mssecsvc.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings mssecsvc.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Cookies\CachePrefix = "Cookie:" mssecsvc.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{BBC3B5B5-7C1A-4E0A-A6FA-AB6C406C9350}\WpadDecisionTime = 400e70c1f304db01 mssecsvc.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{BBC3B5B5-7C1A-4E0A-A6FA-AB6C406C9350}\WpadDecision = "0" mssecsvc.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\62-4b-8f-c1-b3-91\WpadDecisionTime = 400e70c1f304db01 mssecsvc.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings mssecsvc.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\History\CachePrefix = "Visited:" mssecsvc.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{BBC3B5B5-7C1A-4E0A-A6FA-AB6C406C9350}\WpadNetworkName = "Network 3" mssecsvc.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\SavedLegacySettings = 4600000002000000090000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 mssecsvc.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ mssecsvc.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\UNCAsIntranet = "0" mssecsvc.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Content\CachePrefix mssecsvc.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\DefaultConnectionSettings = 4600000003000000090000000000000000000000000000000400000000000000000000000000000000000000000000000000000001000000020000000a7f00ad000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 mssecsvc.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{BBC3B5B5-7C1A-4E0A-A6FA-AB6C406C9350}\62-4b-8f-c1-b3-91 mssecsvc.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\62-4b-8f-c1-b3-91\WpadDecision = "0" mssecsvc.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ProxyEnable = "0" mssecsvc.exe -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 2504 wrote to memory of 2368 2504 rundll32.exe 30 PID 2504 wrote to memory of 2368 2504 rundll32.exe 30 PID 2504 wrote to memory of 2368 2504 rundll32.exe 30 PID 2504 wrote to memory of 2368 2504 rundll32.exe 30 PID 2504 wrote to memory of 2368 2504 rundll32.exe 30 PID 2504 wrote to memory of 2368 2504 rundll32.exe 30 PID 2504 wrote to memory of 2368 2504 rundll32.exe 30 PID 2368 wrote to memory of 1700 2368 rundll32.exe 31 PID 2368 wrote to memory of 1700 2368 rundll32.exe 31 PID 2368 wrote to memory of 1700 2368 rundll32.exe 31 PID 2368 wrote to memory of 1700 2368 rundll32.exe 31
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\dc2652699bfb0a04b639db5b7ea17f99_JaffaCakes118.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:2504 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\dc2652699bfb0a04b639db5b7ea17f99_JaffaCakes118.dll,#12⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2368 -
C:\WINDOWS\mssecsvc.exeC:\WINDOWS\mssecsvc.exe3⤵
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:1700 -
C:\WINDOWS\tasksche.exeC:\WINDOWS\tasksche.exe /i4⤵
- Executes dropped EXE
PID:2744
-
-
-
-
C:\WINDOWS\mssecsvc.exeC:\WINDOWS\mssecsvc.exe -m security1⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies data under HKEY_USERS
PID:1988
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3.6MB
MD591f85880056b94e83a0f368f13d4b13d
SHA137b91eadc85259d644fe1869c76ac04676f996de
SHA2560a7cb7e432754cf56ccd147f6d4ab96e5f6a89711e83c9644593eab68dc00dcc
SHA5120385d3b796a344bfcfeb91fd4ef8818574d50da163b5a5f5432ec16982afe8da2258f59f3222fe267d7439fd9fe5121889a055f60d312585da3931c04bc9300d
-
Filesize
3.4MB
MD513edf5ab66f6af92531ef08c010459bf
SHA1e69b2b4a375f82f8d99eb2c972eb60743e239212
SHA2561a1649b6b6c0e6846ec7337e1e2a522a374f8a1f2a119e6819f968379e9a372b
SHA51233a32b5eb984925d13cef484d8abe6b39882029f0890e8f78f410659f71fe43cbc81992d9ec178efc5e61a71a6eb9667dbb9ccdbfa75dedc2acd8381fa254f67