Analysis
-
max time kernel
150s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
12-09-2024 18:20
Static task
static1
Behavioral task
behavioral1
Sample
dccb6ff69d6cf9021be27fd3a555fceb_JaffaCakes118.dll
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
dccb6ff69d6cf9021be27fd3a555fceb_JaffaCakes118.dll
Resource
win10v2004-20240802-en
General
-
Target
dccb6ff69d6cf9021be27fd3a555fceb_JaffaCakes118.dll
-
Size
5.0MB
-
MD5
dccb6ff69d6cf9021be27fd3a555fceb
-
SHA1
3142b09f7c36cf468c54eb8d5383e680caa9ae75
-
SHA256
d77c2654998c833dce98951f8ea663e248da995bce80fe7e9237d793e097cde9
-
SHA512
61900cfef72a61862290974f6dec80750fbfe61073dcda20511f155362a71426efa3f7b204859611b7884ee03b37d37af11e0f0da1b4e8423c0ea1e7ec41c2db
-
SSDEEP
24576:SbLgddQhfdmMSirYbcMNgef0vcH9PO6LLuYAMEcpcL7nEaut/8ukE7A4i0:SnAQqMSPbcBVkH9PAMEcaEau358
Malware Config
Signatures
-
Wannacry
WannaCry is a ransomware cryptoworm.
-
Contacts a large (3232) amount of remote hosts 1 TTPs
This may indicate a network scan to discover remotely running services.
-
Executes dropped EXE 3 IoCs
pid Process 1212 mssecsvc.exe 2820 mssecsvc.exe 1260 tasksche.exe -
Creates a large amount of network flows 1 TTPs
This may indicate a network scan to discover remotely running services.
-
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\WINDOWS\mssecsvc.exe rundll32.exe File created C:\WINDOWS\tasksche.exe mssecsvc.exe -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mssecsvc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mssecsvc.exe -
Modifies data under HKEY_USERS 5 IoCs
description ioc Process Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\UNCAsIntranet = "1" mssecsvc.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\AutoDetect = "0" mssecsvc.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ mssecsvc.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ProxyBypass = "1" mssecsvc.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\IntranetName = "1" mssecsvc.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 4928 wrote to memory of 3644 4928 rundll32.exe 83 PID 4928 wrote to memory of 3644 4928 rundll32.exe 83 PID 4928 wrote to memory of 3644 4928 rundll32.exe 83 PID 3644 wrote to memory of 1212 3644 rundll32.exe 84 PID 3644 wrote to memory of 1212 3644 rundll32.exe 84 PID 3644 wrote to memory of 1212 3644 rundll32.exe 84
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\dccb6ff69d6cf9021be27fd3a555fceb_JaffaCakes118.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:4928 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\dccb6ff69d6cf9021be27fd3a555fceb_JaffaCakes118.dll,#12⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3644 -
C:\WINDOWS\mssecsvc.exeC:\WINDOWS\mssecsvc.exe3⤵
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:1212 -
C:\WINDOWS\tasksche.exeC:\WINDOWS\tasksche.exe /i4⤵
- Executes dropped EXE
PID:1260
-
-
-
-
C:\WINDOWS\mssecsvc.exeC:\WINDOWS\mssecsvc.exe -m security1⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Modifies data under HKEY_USERS
PID:2820
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3.6MB
MD5bce7209c8304d5ffbcb024a9743455e5
SHA108f513c1282d7a745b78c759a8474f40f0c25c9d
SHA256552208482c576951f304ae3c75bdf6f95c8608eb53f46b47d503d56c931758e9
SHA51299483a76d267d1503d9f4f7742dc3b766f25a62c29e7a212d08e3c6fdff1d7e78c17550445a143d66fee096fdd8b4458fdb2b3215ade8f97e5ebc9340a361604
-
Filesize
3.4MB
MD57ec79ca030cec0964ad826eb287e5c13
SHA1f100af87bc0505c3ce7030ebc1d6eb8edf6fddb2
SHA256a6c447a87ec4397600e5233d79cc6aacef13b39e571c59aa1dc9e6dcf5a54bf6
SHA5128ddbed2aaa48cc4332628cd1427a879f14fa4ae085c7544483ace3d62291cc92ebf06b658862e2180b31d964dd583c9f1208da240c11f9e543be8ab757da5de9