Analysis
-
max time kernel
150s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
20-09-2024 00:29
Static task
static1
Behavioral task
behavioral1
Sample
ec7c04d35c2286c9d7ece311567c5d9f_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
ec7c04d35c2286c9d7ece311567c5d9f_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
ec7c04d35c2286c9d7ece311567c5d9f_JaffaCakes118.exe
-
Size
3.6MB
-
MD5
ec7c04d35c2286c9d7ece311567c5d9f
-
SHA1
7d87103843cade4ce5b4c22a9291beec79175e13
-
SHA256
eedad52a0ea9b2141fd4d2a952404901e6b06fe1b773c7891653bed557b124c4
-
SHA512
da7c6cf3a1955de4889915f0468696f73d92b9169ab084724b9d05fe100796cc2251345a6e318a5e333ee40abbd433fb142c20332a9a74dc9d60ed97199aa0b8
-
SSDEEP
98304:yDqPoBhz1aRxcSUDk36SAEdhvxWa9P538yAVp2HI:yDqPe1Cxcxk3ZAEUadl8yc4HI
Malware Config
Signatures
-
Wannacry
WannaCry is a ransomware cryptoworm.
-
Contacts a large (3168) amount of remote hosts 1 TTPs
This may indicate a network scan to discover remotely running services.
-
Executes dropped EXE 1 IoCs
pid Process 3352 tasksche.exe -
Creates a large amount of network flows 1 TTPs
This may indicate a network scan to discover remotely running services.
-
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\WINDOWS\tasksche.exe ec7c04d35c2286c9d7ece311567c5d9f_JaffaCakes118.exe -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ec7c04d35c2286c9d7ece311567c5d9f_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ec7c04d35c2286c9d7ece311567c5d9f_JaffaCakes118.exe -
Modifies data under HKEY_USERS 5 IoCs
description ioc Process Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ ec7c04d35c2286c9d7ece311567c5d9f_JaffaCakes118.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ProxyBypass = "1" ec7c04d35c2286c9d7ece311567c5d9f_JaffaCakes118.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\IntranetName = "1" ec7c04d35c2286c9d7ece311567c5d9f_JaffaCakes118.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\UNCAsIntranet = "1" ec7c04d35c2286c9d7ece311567c5d9f_JaffaCakes118.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\AutoDetect = "0" ec7c04d35c2286c9d7ece311567c5d9f_JaffaCakes118.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\ec7c04d35c2286c9d7ece311567c5d9f_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\ec7c04d35c2286c9d7ece311567c5d9f_JaffaCakes118.exe"1⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:4116 -
C:\WINDOWS\tasksche.exeC:\WINDOWS\tasksche.exe /i2⤵
- Executes dropped EXE
PID:3352
-
-
C:\Users\Admin\AppData\Local\Temp\ec7c04d35c2286c9d7ece311567c5d9f_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\ec7c04d35c2286c9d7ece311567c5d9f_JaffaCakes118.exe -m security1⤵
- System Location Discovery: System Language Discovery
- Modifies data under HKEY_USERS
PID:1404
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3.4MB
MD5e68c05730b569d934ae8ef96cb9aa325
SHA1668ba1e111db89469ce41256f8bfc36a2b2f7167
SHA2564f6cb1e935d15a61868d021cc9c4d0762bcb6d16d782065500e172abfd69fbe4
SHA5126bafc7076182066c36ef71e6969d67700b3b78b152139e62ccf795c4ac1125a76d8a9954424eaa598279192a13aefa580efd8a880a86d3e2ec4b469b8137d5eb