Analysis
-
max time kernel
150s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
15-09-2024 11:48
Static task
static1
Behavioral task
behavioral1
Sample
e2692f0709f518e53b864d24049e324a_JaffaCakes118.dll
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
e2692f0709f518e53b864d24049e324a_JaffaCakes118.dll
Resource
win10v2004-20240802-en
General
-
Target
e2692f0709f518e53b864d24049e324a_JaffaCakes118.dll
-
Size
5.0MB
-
MD5
e2692f0709f518e53b864d24049e324a
-
SHA1
4fb94d563e918d476712600895e46623ab8b19ae
-
SHA256
95ffbaebeaef2a3354564a46b7c4bbb566694b3b3cbcf6f1092b2a501dcf97f8
-
SHA512
af88644577052b43b0e8c77118b328a1b78014d70a24effd421c6ef7a544e008df019a2acc6dcb93d640046180330b1517c8513b570a915505a7115dc277615b
-
SSDEEP
49152:SnAQqMSPbcBVQej/1INRx+TSqTdX1HkQo6SAAKAMEcaEaue5c/bXZROAx:+DqPoBhz1aRxcSUDk36SAZ59Uc/J
Malware Config
Signatures
-
Wannacry
WannaCry is a ransomware cryptoworm.
-
Contacts a large (3347) amount of remote hosts 1 TTPs
This may indicate a network scan to discover remotely running services.
-
Executes dropped EXE 3 IoCs
pid Process 2056 mssecsvc.exe 4032 mssecsvc.exe 1132 tasksche.exe -
Creates a large amount of network flows 1 TTPs
This may indicate a network scan to discover remotely running services.
-
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\WINDOWS\mssecsvc.exe rundll32.exe File created C:\WINDOWS\tasksche.exe mssecsvc.exe -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mssecsvc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mssecsvc.exe -
Modifies data under HKEY_USERS 5 IoCs
description ioc Process Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ mssecsvc.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ProxyBypass = "1" mssecsvc.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\IntranetName = "1" mssecsvc.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\UNCAsIntranet = "1" mssecsvc.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\AutoDetect = "0" mssecsvc.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 1256 wrote to memory of 4488 1256 rundll32.exe 85 PID 1256 wrote to memory of 4488 1256 rundll32.exe 85 PID 1256 wrote to memory of 4488 1256 rundll32.exe 85 PID 4488 wrote to memory of 2056 4488 rundll32.exe 87 PID 4488 wrote to memory of 2056 4488 rundll32.exe 87 PID 4488 wrote to memory of 2056 4488 rundll32.exe 87
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\e2692f0709f518e53b864d24049e324a_JaffaCakes118.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1256 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\e2692f0709f518e53b864d24049e324a_JaffaCakes118.dll,#12⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4488 -
C:\WINDOWS\mssecsvc.exeC:\WINDOWS\mssecsvc.exe3⤵
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:2056 -
C:\WINDOWS\tasksche.exeC:\WINDOWS\tasksche.exe /i4⤵
- Executes dropped EXE
PID:1132
-
-
-
-
C:\WINDOWS\mssecsvc.exeC:\WINDOWS\mssecsvc.exe -m security1⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Modifies data under HKEY_USERS
PID:4032
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3.6MB
MD5405225fbead6aa70e58c57a89d908e98
SHA1cbb7f3ef14cb6d0d2e33d184caf697ec920631ff
SHA2561a9e7b00b68020fd4fd8016278cc161d14ab7ce0fa1ab2e03ec0c1adbc41d4e5
SHA5124b808c83bb2ff1f529d0a0a20e9a1f191b558fdda0fdcd273c35980b7a186c9acebe2115b2093167f1750868aa014ae159db15b6b9122114c057d9a58d3fc1e8
-
Filesize
3.4MB
MD5ea4a3a376f0d13be957338954e4f1272
SHA1ee3ca7a7a6b094d6ad888c134f3625abb79b5788
SHA256f2484eae21e4b0e433386d23bbdb883a7af3f136151b3e46001fbf083c337b8a
SHA51237931593d06acd4417baeea5fb78f7649b8a98d7ae94b5d4aa34f1b36a7e82b89dc661abded93caf5c3fbd80aa38c5f1a98a7c85cabf43dacd0301afc903a761