Analysis
-
max time kernel
150s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
15-09-2024 13:52
Static task
static1
Behavioral task
behavioral1
Sample
e2a1ddae708d58a3dcca4d82ca2624b4_JaffaCakes118.dll
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
e2a1ddae708d58a3dcca4d82ca2624b4_JaffaCakes118.dll
Resource
win10v2004-20240802-en
General
-
Target
e2a1ddae708d58a3dcca4d82ca2624b4_JaffaCakes118.dll
-
Size
5.0MB
-
MD5
e2a1ddae708d58a3dcca4d82ca2624b4
-
SHA1
995c96ea89c573364d834bdc4ed0a2a443e2da55
-
SHA256
63550051238d068efd2c0ade82a3ae4f28bda37bae2d92b55e9a6ecb336fab82
-
SHA512
36548df4f70b8d448791d9127eb81e262484d300815de51ae3996810aa7646c2438ba4ba0099fd4318a4b33a7fedc199589be2743f28b4b0a35c772f38e7b43b
-
SSDEEP
49152:SnAQqMSPbcBVQej/1INRx+TSqTdX1HkQo6SAARdhnvxJM0H9:+DqPoBhz1aRxcSUDk36SAEdhvxWa9
Malware Config
Signatures
-
Wannacry
WannaCry is a ransomware cryptoworm.
-
Contacts a large (3260) amount of remote hosts 1 TTPs
This may indicate a network scan to discover remotely running services.
-
Executes dropped EXE 3 IoCs
pid Process 2164 mssecsvc.exe 1864 mssecsvc.exe 1408 tasksche.exe -
Creates a large amount of network flows 1 TTPs
This may indicate a network scan to discover remotely running services.
-
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\WINDOWS\mssecsvc.exe rundll32.exe File created C:\WINDOWS\tasksche.exe mssecsvc.exe -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mssecsvc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mssecsvc.exe -
Modifies data under HKEY_USERS 5 IoCs
description ioc Process Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ mssecsvc.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ProxyBypass = "1" mssecsvc.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\IntranetName = "1" mssecsvc.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\UNCAsIntranet = "1" mssecsvc.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\AutoDetect = "0" mssecsvc.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 2060 wrote to memory of 2960 2060 rundll32.exe 84 PID 2060 wrote to memory of 2960 2060 rundll32.exe 84 PID 2060 wrote to memory of 2960 2060 rundll32.exe 84 PID 2960 wrote to memory of 2164 2960 rundll32.exe 85 PID 2960 wrote to memory of 2164 2960 rundll32.exe 85 PID 2960 wrote to memory of 2164 2960 rundll32.exe 85
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\e2a1ddae708d58a3dcca4d82ca2624b4_JaffaCakes118.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:2060 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\e2a1ddae708d58a3dcca4d82ca2624b4_JaffaCakes118.dll,#12⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2960 -
C:\WINDOWS\mssecsvc.exeC:\WINDOWS\mssecsvc.exe3⤵
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:2164 -
C:\WINDOWS\tasksche.exeC:\WINDOWS\tasksche.exe /i4⤵
- Executes dropped EXE
PID:1408
-
-
-
-
C:\WINDOWS\mssecsvc.exeC:\WINDOWS\mssecsvc.exe -m security1⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Modifies data under HKEY_USERS
PID:1864
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3.6MB
MD562bfe9d50c643b8d745b82cda2ac8502
SHA15cfe9c4a300b4321921c8fa9ac3465f6dfc63577
SHA2563693ecc69ca804527ddbdd9cd6d5157263ce537564400504380a8d23605e7d15
SHA512662d2e2da259628019a7862595032c5901ed900d14c8e07811949d495ba82570e0c91ecde8153a672895ff199986cfd29780a6f12a92046704c17d34258b531b
-
Filesize
3.4MB
MD569fa253911ff4509b0fac9a6196b6d6c
SHA1326514f0734ffa20c07bad20582a0f3046f1cf97
SHA2560a0857386684539ba55b0203b5b95b6be6ccce0d64fc27cad62ddbe694ec0596
SHA512b83395b9e2c62206f57c5c59b9be3c941a193e519e1879dc8e7f7c8ebd9767df7aff3767fac4500a484f0fa1204c98686434a25f727bcc53eef783868423b92d