Analysis
-
max time kernel
150s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
20-09-2024 02:13
Static task
static1
Behavioral task
behavioral1
Sample
eca40b7a3db3d35f1575bba318cddc18_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
eca40b7a3db3d35f1575bba318cddc18_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
eca40b7a3db3d35f1575bba318cddc18_JaffaCakes118.exe
-
Size
3.6MB
-
MD5
eca40b7a3db3d35f1575bba318cddc18
-
SHA1
5c9109c28f8ee858f379da48da779e59c9f4fa63
-
SHA256
0f52571c0ecae900ecec1d3675562678eaff257b7c45cf2630d3076f1005e768
-
SHA512
a359d725865a9fca4c4d9575ef167b462a4f63893f2107a6fea38ea087e27911ede47e45e4cbe83defe72e3a72ee22141d54724e3ffe9425cd3196d33a114557
-
SSDEEP
98304:XDqPoBhz1aRxcSUDk36SAEdhvxWa9P593R8yAVp2bC7:XDqPe1Cxcxk3ZAEUadzR8yc4U
Malware Config
Signatures
-
Wannacry
WannaCry is a ransomware cryptoworm.
-
Contacts a large (3361) amount of remote hosts 1 TTPs
This may indicate a network scan to discover remotely running services.
-
Executes dropped EXE 1 IoCs
pid Process 2896 tasksche.exe -
Creates a large amount of network flows 1 TTPs
This may indicate a network scan to discover remotely running services.
-
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\WINDOWS\tasksche.exe eca40b7a3db3d35f1575bba318cddc18_JaffaCakes118.exe -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language eca40b7a3db3d35f1575bba318cddc18_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language eca40b7a3db3d35f1575bba318cddc18_JaffaCakes118.exe -
Modifies data under HKEY_USERS 5 IoCs
description ioc Process Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ProxyBypass = "1" eca40b7a3db3d35f1575bba318cddc18_JaffaCakes118.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\IntranetName = "1" eca40b7a3db3d35f1575bba318cddc18_JaffaCakes118.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\UNCAsIntranet = "1" eca40b7a3db3d35f1575bba318cddc18_JaffaCakes118.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\AutoDetect = "0" eca40b7a3db3d35f1575bba318cddc18_JaffaCakes118.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ eca40b7a3db3d35f1575bba318cddc18_JaffaCakes118.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\eca40b7a3db3d35f1575bba318cddc18_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\eca40b7a3db3d35f1575bba318cddc18_JaffaCakes118.exe"1⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:916 -
C:\WINDOWS\tasksche.exeC:\WINDOWS\tasksche.exe /i2⤵
- Executes dropped EXE
PID:2896
-
-
C:\Users\Admin\AppData\Local\Temp\eca40b7a3db3d35f1575bba318cddc18_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\eca40b7a3db3d35f1575bba318cddc18_JaffaCakes118.exe -m security1⤵
- System Location Discovery: System Language Discovery
- Modifies data under HKEY_USERS
PID:4176
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3.4MB
MD591fa7351595c35f5714efeedaf6f8c41
SHA12853412b31e22cb8f155b62421e3b934a259738a
SHA25677e26681ff771508e6dc59107ddd1f87bbbb012513fd06e1c0331f2c6307ce3c
SHA512fd8a7bed8147fd38f0cd11b15a5ee34b63c3b2a8c3f75d638a6a44a71f534de392b02a087f2bc502846796ea87c05182e39e2b4b199f5b86625996ed07239712