Analysis
-
max time kernel
150s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
13-09-2024 20:37
Static task
static1
Behavioral task
behavioral1
Sample
dedb733526d470764804c1336ad7826c_JaffaCakes118.dll
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
dedb733526d470764804c1336ad7826c_JaffaCakes118.dll
Resource
win10v2004-20240802-en
General
-
Target
dedb733526d470764804c1336ad7826c_JaffaCakes118.dll
-
Size
5.0MB
-
MD5
dedb733526d470764804c1336ad7826c
-
SHA1
4a09a6c2f70cb72d54b30012a2da5797c36381db
-
SHA256
c3f2e0f4d75c0cd434aa2c67592dd63cce88785337448a1a6e07b288c35d2e59
-
SHA512
835ef81d9b64dc1e9160ec44fd6335e01d45b890dce79e976cac41b7ed554340621212d3a944e8eafc285ceb414c80271a2dae79440863449882027620013f34
-
SSDEEP
49152:SnAQqMSPbcBVQej/aAMEbaEau3R8yAH1plAH:+DqPoBhza5a3R8yAVp2H
Malware Config
Signatures
-
Wannacry
WannaCry is a ransomware cryptoworm.
-
Contacts a large (3246) amount of remote hosts 1 TTPs
This may indicate a network scan to discover remotely running services.
-
Executes dropped EXE 3 IoCs
pid Process 4900 mssecsvc.exe 2292 mssecsvc.exe 3340 tasksche.exe -
Creates a large amount of network flows 1 TTPs
This may indicate a network scan to discover remotely running services.
-
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\WINDOWS\mssecsvc.exe rundll32.exe File created C:\WINDOWS\tasksche.exe mssecsvc.exe -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mssecsvc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mssecsvc.exe -
Modifies data under HKEY_USERS 5 IoCs
description ioc Process Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ mssecsvc.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ProxyBypass = "1" mssecsvc.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\IntranetName = "1" mssecsvc.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\UNCAsIntranet = "1" mssecsvc.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\AutoDetect = "0" mssecsvc.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 872 wrote to memory of 4412 872 rundll32.exe 83 PID 872 wrote to memory of 4412 872 rundll32.exe 83 PID 872 wrote to memory of 4412 872 rundll32.exe 83 PID 4412 wrote to memory of 4900 4412 rundll32.exe 84 PID 4412 wrote to memory of 4900 4412 rundll32.exe 84 PID 4412 wrote to memory of 4900 4412 rundll32.exe 84
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\dedb733526d470764804c1336ad7826c_JaffaCakes118.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:872 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\dedb733526d470764804c1336ad7826c_JaffaCakes118.dll,#12⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4412 -
C:\WINDOWS\mssecsvc.exeC:\WINDOWS\mssecsvc.exe3⤵
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:4900 -
C:\WINDOWS\tasksche.exeC:\WINDOWS\tasksche.exe /i4⤵
- Executes dropped EXE
PID:3340
-
-
-
-
C:\WINDOWS\mssecsvc.exeC:\WINDOWS\mssecsvc.exe -m security1⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Modifies data under HKEY_USERS
PID:2292
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3.6MB
MD5e8a7cc07f9766c9873cc2146766cf1e9
SHA16ccf9bb08cec405b50b7787bf2b71a94b18ab5ae
SHA2569b7d66190d08fa83794d816d4836a6c69de15aaffa1fdc3c8104b7baf8f7e70e
SHA5127d3042e4c9506af30bda4400de0636cbc334555b230b793238a1d5e46457aefbaaf3540f96632100c4bd0216879f99bf198f9e8c2b94b5e4e3039ee057cedcbb
-
Filesize
3.4MB
MD59f4314682bba3dff34732a57e895e724
SHA1260fe6537435359421aaf1f1e26f0d54000cc8b1
SHA25607fa4525ce76f4cd00e2fad66cb65e56cf452679528c4e74440a423029297c06
SHA512f9239565ea35de5be797907f6231e7f9e0ad28ac67183ef38a5c99f33a744325275ce7796a2d90cf6cc6241f79bfadc78dfea699a2910128b00ae26368696a80