Analysis
-
max time kernel
150s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
19-09-2024 12:46
Static task
static1
Behavioral task
behavioral1
Sample
eb5cfaec3e10350749c9d2064c09a65c_JaffaCakes118.dll
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
eb5cfaec3e10350749c9d2064c09a65c_JaffaCakes118.dll
Resource
win10v2004-20240802-en
General
-
Target
eb5cfaec3e10350749c9d2064c09a65c_JaffaCakes118.dll
-
Size
5.0MB
-
MD5
eb5cfaec3e10350749c9d2064c09a65c
-
SHA1
e13b2463a99748fe34f02aa1bfbaaee73a6a09a5
-
SHA256
dd8fd179929723fc686a7e53f36572cb11e1743b52384a6fe02a4768e383892f
-
SHA512
8e13793da28c7b316b99238312fe7f347ef7c536376110c72279ff71e989979f13a5e51dc9689113a4b1ba989df0e514b90cbfe8a485944de982f7e9ed983bf2
-
SSDEEP
98304:+DqPoBhz1aRxcSUDk36SAEdhvxWa9P593R8y:+DqPe1Cxcxk3ZAEUadzR8y
Malware Config
Signatures
-
Wannacry
WannaCry is a ransomware cryptoworm.
-
Contacts a large (3324) amount of remote hosts 1 TTPs
This may indicate a network scan to discover remotely running services.
-
Executes dropped EXE 3 IoCs
pid Process 3240 mssecsvc.exe 1048 mssecsvc.exe 1864 tasksche.exe -
Creates a large amount of network flows 1 TTPs
This may indicate a network scan to discover remotely running services.
-
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\WINDOWS\mssecsvc.exe rundll32.exe File created C:\WINDOWS\tasksche.exe mssecsvc.exe -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mssecsvc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mssecsvc.exe -
Modifies data under HKEY_USERS 5 IoCs
description ioc Process Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ mssecsvc.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ProxyBypass = "1" mssecsvc.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\IntranetName = "1" mssecsvc.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\UNCAsIntranet = "1" mssecsvc.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\AutoDetect = "0" mssecsvc.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 4672 wrote to memory of 3372 4672 rundll32.exe 82 PID 4672 wrote to memory of 3372 4672 rundll32.exe 82 PID 4672 wrote to memory of 3372 4672 rundll32.exe 82 PID 3372 wrote to memory of 3240 3372 rundll32.exe 83 PID 3372 wrote to memory of 3240 3372 rundll32.exe 83 PID 3372 wrote to memory of 3240 3372 rundll32.exe 83
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\eb5cfaec3e10350749c9d2064c09a65c_JaffaCakes118.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:4672 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\eb5cfaec3e10350749c9d2064c09a65c_JaffaCakes118.dll,#12⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3372 -
C:\WINDOWS\mssecsvc.exeC:\WINDOWS\mssecsvc.exe3⤵
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:3240 -
C:\WINDOWS\tasksche.exeC:\WINDOWS\tasksche.exe /i4⤵
- Executes dropped EXE
PID:1864
-
-
-
-
C:\WINDOWS\mssecsvc.exeC:\WINDOWS\mssecsvc.exe -m security1⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Modifies data under HKEY_USERS
PID:1048
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3.6MB
MD52ea856120a0106ce16b78144a74d3399
SHA1658815f14862629524389bf8132412ae1b388579
SHA2569aaea64d0597d7d7065f0727f48616c91c0190c2f26fc6b0a390d1638897923c
SHA512a634f8d3af0945b61f7fc66c7df4e84ec763910d5f9d2277b72bbaf83100ca35e78ac6a43640d9589e3bd7d3cb9bfa301a422491a212456a9effc55e4637b354
-
Filesize
3.4MB
MD5af61bc24c3ef9bff7e018fd61bf11439
SHA1a0342f37bbaaf0411fa5689fe8f3dba5905e5247
SHA256a7d0e297456fb4511858bac104b9bc9ea85e73609a375c3289b5cd98c702adbc
SHA51214b157e512bb3462109c32c449d5a401b1142d81c21a96c9e685a7926c1a0b6a912f271d1518ebea402e085d210b61e5e30f8e2d885dfc60a2fe2a2938b72bcc