Analysis
-
max time kernel
126s -
max time network
150s -
platform
windows7_x64 -
resource
win7-20240729-en -
resource tags
arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system -
submitted
17-09-2024 09:31
Static task
static1
Behavioral task
behavioral1
Sample
e6855434ad2a02e8bc34813775695668_JaffaCakes118.dll
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
e6855434ad2a02e8bc34813775695668_JaffaCakes118.dll
Resource
win10v2004-20240802-en
General
-
Target
e6855434ad2a02e8bc34813775695668_JaffaCakes118.dll
-
Size
5.0MB
-
MD5
e6855434ad2a02e8bc34813775695668
-
SHA1
ff68c8f1f3b9d8954f77d6884bcd29d4c7d48af1
-
SHA256
1c2cb3a8cbcfd685562e382651218cc0f0b18589482402ae4d3c4a5ab266c39d
-
SHA512
6057946841388660d82708aaac0fab22547d631b1a2c0dfd0aebf56ac07116ee583fe8dda31e45fa1e1069791cf3f42cc699639a47556b778bf546b8847545af
-
SSDEEP
98304:+DqPoBhz1aRxcSUDk36SAEdhvxWa9P593R8yAVp2H:+DqPe1Cxcxk3ZAEUadzR8yc4H
Malware Config
Signatures
-
Wannacry
WannaCry is a ransomware cryptoworm.
-
Contacts a large (3281) amount of remote hosts 1 TTPs
This may indicate a network scan to discover remotely running services.
-
Executes dropped EXE 5 IoCs
pid Process 3000 mssecsvc.exe 2668 mssecsvc.exe 2580 tasksche.exe 2808 tasksche.exe 1928 tasksche.exe -
Loads dropped DLL 4 IoCs
pid Process 2472 WerFault.exe 2472 WerFault.exe 2472 WerFault.exe 2472 WerFault.exe -
Creates a large amount of network flows 1 TTPs
This may indicate a network scan to discover remotely running services.
-
Drops file in System32 directory 1 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\Temporary Internet Files\counters.dat mssecsvc.exe -
Drops file in Windows directory 3 IoCs
description ioc Process File created C:\WINDOWS\mssecsvc.exe rundll32.exe File created C:\WINDOWS\tasksche.exe mssecsvc.exe File created C:\WINDOWS\ tasksche.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 2472 2808 WerFault.exe 35 -
System Location Discovery: System Language Discovery 1 TTPs 6 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tasksche.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tasksche.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mssecsvc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mssecsvc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tasksche.exe -
Modifies data under HKEY_USERS 24 IoCs
description ioc Process Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\72-6e-d9-07-51-f5\WpadDecisionReason = "1" mssecsvc.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\72-6e-d9-07-51-f5\WpadDecision = "0" mssecsvc.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\AutoDetect = "1" mssecsvc.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Cookies\CachePrefix = "Cookie:" mssecsvc.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{77C8295A-ECC8-4A25-ABF2-8470148D81F1}\WpadNetworkName = "Network 3" mssecsvc.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\72-6e-d9-07-51-f5 mssecsvc.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{77C8295A-ECC8-4A25-ABF2-8470148D81F1}\72-6e-d9-07-51-f5 mssecsvc.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\DefaultConnectionSettings = 4600000002000000090000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 mssecsvc.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings mssecsvc.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\UNCAsIntranet = "0" mssecsvc.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad mssecsvc.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\72-6e-d9-07-51-f5\WpadDecisionTime = 80a6846ce408db01 mssecsvc.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ProxyEnable = "0" mssecsvc.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Content\CachePrefix mssecsvc.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\History\CachePrefix = "Visited:" mssecsvc.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\DefaultConnectionSettings = 4600000003000000090000000000000000000000000000000400000000000000000000000000000000000000000000000000000001000000020000000a7f012c000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 mssecsvc.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{77C8295A-ECC8-4A25-ABF2-8470148D81F1}\WpadDecision = "0" mssecsvc.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{77C8295A-ECC8-4A25-ABF2-8470148D81F1}\WpadDecisionReason = "1" mssecsvc.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{77C8295A-ECC8-4A25-ABF2-8470148D81F1}\WpadDecisionTime = 80a6846ce408db01 mssecsvc.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings mssecsvc.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections mssecsvc.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\SavedLegacySettings = 4600000002000000090000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 mssecsvc.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ mssecsvc.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{77C8295A-ECC8-4A25-ABF2-8470148D81F1} mssecsvc.exe -
Suspicious behavior: CmdExeWriteProcessMemorySpam 1 IoCs
pid Process 2808 tasksche.exe -
Suspicious use of WriteProcessMemory 27 IoCs
description pid Process procid_target PID 2100 wrote to memory of 2316 2100 rundll32.exe 30 PID 2100 wrote to memory of 2316 2100 rundll32.exe 30 PID 2100 wrote to memory of 2316 2100 rundll32.exe 30 PID 2100 wrote to memory of 2316 2100 rundll32.exe 30 PID 2100 wrote to memory of 2316 2100 rundll32.exe 30 PID 2100 wrote to memory of 2316 2100 rundll32.exe 30 PID 2100 wrote to memory of 2316 2100 rundll32.exe 30 PID 2316 wrote to memory of 3000 2316 rundll32.exe 31 PID 2316 wrote to memory of 3000 2316 rundll32.exe 31 PID 2316 wrote to memory of 3000 2316 rundll32.exe 31 PID 2316 wrote to memory of 3000 2316 rundll32.exe 31 PID 3000 wrote to memory of 2580 3000 mssecsvc.exe 33 PID 3000 wrote to memory of 2580 3000 mssecsvc.exe 33 PID 3000 wrote to memory of 2580 3000 mssecsvc.exe 33 PID 3000 wrote to memory of 2580 3000 mssecsvc.exe 33 PID 2480 wrote to memory of 2808 2480 cmd.exe 35 PID 2480 wrote to memory of 2808 2480 cmd.exe 35 PID 2480 wrote to memory of 2808 2480 cmd.exe 35 PID 2480 wrote to memory of 2808 2480 cmd.exe 35 PID 2808 wrote to memory of 2472 2808 tasksche.exe 36 PID 2808 wrote to memory of 2472 2808 tasksche.exe 36 PID 2808 wrote to memory of 2472 2808 tasksche.exe 36 PID 2808 wrote to memory of 2472 2808 tasksche.exe 36 PID 2580 wrote to memory of 1928 2580 tasksche.exe 37 PID 2580 wrote to memory of 1928 2580 tasksche.exe 37 PID 2580 wrote to memory of 1928 2580 tasksche.exe 37 PID 2580 wrote to memory of 1928 2580 tasksche.exe 37
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\e6855434ad2a02e8bc34813775695668_JaffaCakes118.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:2100 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\e6855434ad2a02e8bc34813775695668_JaffaCakes118.dll,#12⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2316 -
C:\WINDOWS\mssecsvc.exeC:\WINDOWS\mssecsvc.exe3⤵
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3000 -
C:\WINDOWS\tasksche.exeC:\WINDOWS\tasksche.exe /i4⤵
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2580 -
C:\ProgramData\xzylnmtyo879\tasksche.exeC:\ProgramData\xzylnmtyo879\tasksche.exe5⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1928
-
-
-
-
-
C:\WINDOWS\mssecsvc.exeC:\WINDOWS\mssecsvc.exe -m security1⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies data under HKEY_USERS
PID:2668
-
C:\Windows\system32\cmd.execmd.exe /c "C:\ProgramData\xzylnmtyo879\tasksche.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2480 -
C:\ProgramData\xzylnmtyo879\tasksche.exeC:\ProgramData\xzylnmtyo879\tasksche.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: CmdExeWriteProcessMemorySpam
- Suspicious use of WriteProcessMemory
PID:2808 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2808 -s 923⤵
- Loads dropped DLL
- Program crash
PID:2472
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3.6MB
MD5c223a0feb037ab17cc273a40856395b0
SHA1d4f498435c23027ee324bc93494f871dfe8ad7a9
SHA25647a0caff0fa7159652f377ab3ac01b70771aa45cbd3b1567f752194c38f4ee6c
SHA51269ea8339e33c5c7706411da7e2d0c8d2b8cdd4516f72a05aa62ba9093014e3d7542345af9c00e9f36c53f674b1cc2a6546bdad2c303c1cb3aae795bbdba01be9
-
Filesize
3.4MB
MD5e56fca813e300a87483824b2924a9b45
SHA1e2055d48fc7999dd8cc9f5b3e94ba12948d5a8e2
SHA256bf9b9e4b3b71a9cc47af24acbd525dd76a7c956049029e714c3e31b21507c70b
SHA512246a0868b687a0ed8c22b5cfcdf8a8b36d3e40100c8ddad65a491418192889ba9a77ed238ed3c921812a1654287b7de437f89a014070dbf3f5378c547cb45e10