Analysis
-
max time kernel
150s -
max time network
150s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
15-09-2024 10:11
Static task
static1
Behavioral task
behavioral1
Sample
e23d03b064eceeaf1c2bdcd6308f261f_JaffaCakes118.dll
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
e23d03b064eceeaf1c2bdcd6308f261f_JaffaCakes118.dll
Resource
win10v2004-20240802-en
General
-
Target
e23d03b064eceeaf1c2bdcd6308f261f_JaffaCakes118.dll
-
Size
5.0MB
-
MD5
e23d03b064eceeaf1c2bdcd6308f261f
-
SHA1
46958336ce0138c57858c6ee3ffb5b0fa518cc3c
-
SHA256
daa4dd128d047cde2736817f228249a58d91e646ed771303f2829d048454f512
-
SHA512
63cdf6634ef3a1210db23491b0175294807c9ce1fdaba8695ab4842e03f0e245ca554522ee7331cde9a69e709228384d312350ae1e6bf4c13209ead55076cc71
-
SSDEEP
98304:+DqPolz1aRxcSUDk36SAEdhvxWa9P593R8yAVp2H:+DqPw1Cxcxk3ZAEUadzR8yc4H
Malware Config
Signatures
-
Wannacry
WannaCry is a ransomware cryptoworm.
-
Contacts a large (3338) amount of remote hosts 1 TTPs
This may indicate a network scan to discover remotely running services.
-
Executes dropped EXE 3 IoCs
pid Process 2888 mssecsvc.exe 2764 mssecsvc.exe 2256 tasksche.exe -
Creates a large amount of network flows 1 TTPs
This may indicate a network scan to discover remotely running services.
-
Drops file in System32 directory 1 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\Temporary Internet Files\counters.dat mssecsvc.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\WINDOWS\mssecsvc.exe rundll32.exe File created C:\WINDOWS\tasksche.exe mssecsvc.exe -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mssecsvc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mssecsvc.exe -
Modifies data under HKEY_USERS 24 IoCs
description ioc Process Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{A5A695E9-3D7E-4707-8B9E-5C42B799B32A}\WpadDecisionReason = "1" mssecsvc.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{A5A695E9-3D7E-4707-8B9E-5C42B799B32A}\WpadDecision = "0" mssecsvc.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{A5A695E9-3D7E-4707-8B9E-5C42B799B32A}\WpadNetworkName = "Network 3" mssecsvc.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\76-5f-4c-45-83-f4 mssecsvc.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ProxyEnable = "0" mssecsvc.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\SavedLegacySettings = 4600000002000000090000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 mssecsvc.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Content\CachePrefix mssecsvc.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\DefaultConnectionSettings = 4600000003000000090000000000000000000000000000000400000000000000000000000000000000000000000000000000000001000000020000000a7f0077000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 mssecsvc.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\76-5f-4c-45-83-f4\WpadDecisionReason = "1" mssecsvc.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\76-5f-4c-45-83-f4\WpadDecision = "0" mssecsvc.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings mssecsvc.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\AutoDetect = "1" mssecsvc.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad mssecsvc.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{A5A695E9-3D7E-4707-8B9E-5C42B799B32A}\76-5f-4c-45-83-f4 mssecsvc.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\76-5f-4c-45-83-f4\WpadDecisionTime = 80c978b65707db01 mssecsvc.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections mssecsvc.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ mssecsvc.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Cookies\CachePrefix = "Cookie:" mssecsvc.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{A5A695E9-3D7E-4707-8B9E-5C42B799B32A} mssecsvc.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{A5A695E9-3D7E-4707-8B9E-5C42B799B32A}\WpadDecisionTime = 80c978b65707db01 mssecsvc.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\DefaultConnectionSettings = 4600000002000000090000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 mssecsvc.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings mssecsvc.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\UNCAsIntranet = "0" mssecsvc.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\History\CachePrefix = "Visited:" mssecsvc.exe -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 3036 wrote to memory of 2096 3036 rundll32.exe 30 PID 3036 wrote to memory of 2096 3036 rundll32.exe 30 PID 3036 wrote to memory of 2096 3036 rundll32.exe 30 PID 3036 wrote to memory of 2096 3036 rundll32.exe 30 PID 3036 wrote to memory of 2096 3036 rundll32.exe 30 PID 3036 wrote to memory of 2096 3036 rundll32.exe 30 PID 3036 wrote to memory of 2096 3036 rundll32.exe 30 PID 2096 wrote to memory of 2888 2096 rundll32.exe 31 PID 2096 wrote to memory of 2888 2096 rundll32.exe 31 PID 2096 wrote to memory of 2888 2096 rundll32.exe 31 PID 2096 wrote to memory of 2888 2096 rundll32.exe 31
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\e23d03b064eceeaf1c2bdcd6308f261f_JaffaCakes118.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:3036 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\e23d03b064eceeaf1c2bdcd6308f261f_JaffaCakes118.dll,#12⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2096 -
C:\WINDOWS\mssecsvc.exeC:\WINDOWS\mssecsvc.exe3⤵
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:2888 -
C:\WINDOWS\tasksche.exeC:\WINDOWS\tasksche.exe /i4⤵
- Executes dropped EXE
PID:2256
-
-
-
-
C:\WINDOWS\mssecsvc.exeC:\WINDOWS\mssecsvc.exe -m security1⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies data under HKEY_USERS
PID:2764
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3.6MB
MD5d48db9c62c672623b0ad75f21827970a
SHA1607641fc794828e311a32951bcf5ba167630e863
SHA256e6e05fb897dd25507e8372bb391f1c6fe05025b15323a9490b7696001e03c550
SHA512050ac0bac2c3ba58e5dde205bf002ecf1f12cbed8f7c310760311bec934a5a9936e7f90fba75ad72b81a768d35da6dac51f40d6f0037b15bc772e9db468f9fd7
-
Filesize
3.4MB
MD578c4027e3434e7eb99f0283d50ba84c9
SHA1433b861ecfba384a44e5cb8674800b5c50524e9c
SHA256ecf72a26bbb96a8fe305a049ed53d913fc33b84a6ab52dda5478037994dcc75d
SHA5128fa7c3d0f53d924ae22a7bc497f821acde54407095afdfa02b750020e2fb9677cbcedda116aab8b9eb89cfa99bb7ddd6a4f5b33eef6d34507ee73900c236c27b