Analysis
-
max time kernel
150s -
max time network
150s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
20-09-2024 11:47
Static task
static1
Behavioral task
behavioral1
Sample
ed83a264c15eed00180b921b5669a0f3_JaffaCakes118.dll
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
ed83a264c15eed00180b921b5669a0f3_JaffaCakes118.dll
Resource
win10v2004-20240802-en
General
-
Target
ed83a264c15eed00180b921b5669a0f3_JaffaCakes118.dll
-
Size
5.0MB
-
MD5
ed83a264c15eed00180b921b5669a0f3
-
SHA1
8949c64f65c678c9b593ea35ac1dfa97af18f713
-
SHA256
c7c1b3d588adc6f9c5d4f9cd20991d6272deb9e414c5ee41e966256d34f8f24e
-
SHA512
f7573dfd9f0d7761b635f0895abeee84d9d626a6649b31ab6d5a71a0b0bc1f8c3336278df32e11af47201aa3270c128c77c14f61240f6939b5c5f301598d65e8
-
SSDEEP
49152:znAQqMSPbcBVQej/1INRx+TSqTdX1HkQtvxJM0HS:TDqPoBhz1aRxcSUDkQxWaS
Malware Config
Signatures
-
Wannacry
WannaCry is a ransomware cryptoworm.
-
Contacts a large (3177) amount of remote hosts 1 TTPs
This may indicate a network scan to discover remotely running services.
-
Executes dropped EXE 3 IoCs
pid Process 2764 mssecsvc.exe 2836 mssecsvc.exe 2800 tasksche.exe -
Creates a large amount of network flows 1 TTPs
This may indicate a network scan to discover remotely running services.
-
Drops file in System32 directory 1 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\Temporary Internet Files\counters.dat mssecsvc.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\WINDOWS\tasksche.exe mssecsvc.exe File created C:\WINDOWS\mssecsvc.exe rundll32.exe -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mssecsvc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mssecsvc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Modifies data under HKEY_USERS 24 IoCs
description ioc Process Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{7FCF7EAE-89CE-48B9-895D-717E8F5ACF29}\WpadDecisionTime = 801820df520bdb01 mssecsvc.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{7FCF7EAE-89CE-48B9-895D-717E8F5ACF29}\WpadNetworkName = "Network 3" mssecsvc.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\9a-12-fd-6f-04-ae\WpadDecisionTime = 801820df520bdb01 mssecsvc.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\9a-12-fd-6f-04-ae\WpadDecision = "0" mssecsvc.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{7FCF7EAE-89CE-48B9-895D-717E8F5ACF29}\WpadDecision = "0" mssecsvc.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings mssecsvc.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\DefaultConnectionSettings = 4600000002000000090000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 mssecsvc.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ProxyEnable = "0" mssecsvc.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\SavedLegacySettings = 4600000002000000090000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 mssecsvc.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ mssecsvc.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\AutoDetect = "1" mssecsvc.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\DefaultConnectionSettings = 4600000003000000090000000000000000000000000000000400000000000000000000000000000000000000000000000000000001000000020000000a7f00ba000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 mssecsvc.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\9a-12-fd-6f-04-ae\WpadDecisionReason = "1" mssecsvc.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{7FCF7EAE-89CE-48B9-895D-717E8F5ACF29}\9a-12-fd-6f-04-ae mssecsvc.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings mssecsvc.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\UNCAsIntranet = "0" mssecsvc.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Content\CachePrefix mssecsvc.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Cookies\CachePrefix = "Cookie:" mssecsvc.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\History\CachePrefix = "Visited:" mssecsvc.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad mssecsvc.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{7FCF7EAE-89CE-48B9-895D-717E8F5ACF29}\WpadDecisionReason = "1" mssecsvc.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections mssecsvc.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{7FCF7EAE-89CE-48B9-895D-717E8F5ACF29} mssecsvc.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\9a-12-fd-6f-04-ae mssecsvc.exe -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 2712 wrote to memory of 2776 2712 rundll32.exe 30 PID 2712 wrote to memory of 2776 2712 rundll32.exe 30 PID 2712 wrote to memory of 2776 2712 rundll32.exe 30 PID 2712 wrote to memory of 2776 2712 rundll32.exe 30 PID 2712 wrote to memory of 2776 2712 rundll32.exe 30 PID 2712 wrote to memory of 2776 2712 rundll32.exe 30 PID 2712 wrote to memory of 2776 2712 rundll32.exe 30 PID 2776 wrote to memory of 2764 2776 rundll32.exe 31 PID 2776 wrote to memory of 2764 2776 rundll32.exe 31 PID 2776 wrote to memory of 2764 2776 rundll32.exe 31 PID 2776 wrote to memory of 2764 2776 rundll32.exe 31
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\ed83a264c15eed00180b921b5669a0f3_JaffaCakes118.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:2712 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\ed83a264c15eed00180b921b5669a0f3_JaffaCakes118.dll,#12⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2776 -
C:\WINDOWS\mssecsvc.exeC:\WINDOWS\mssecsvc.exe3⤵
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:2764 -
C:\WINDOWS\tasksche.exeC:\WINDOWS\tasksche.exe /i4⤵
- Executes dropped EXE
PID:2800
-
-
-
-
C:\WINDOWS\mssecsvc.exeC:\WINDOWS\mssecsvc.exe -m security1⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies data under HKEY_USERS
PID:2836
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3.6MB
MD5686b27de08ff86e9298de7ab0604520d
SHA1954f88574ea5ccaf363ef7a4096a824389896fdf
SHA256299101fcd2e0582f3a6e23a25791eded6c92562838c4807ab4b61e8cf773a3b4
SHA512af20a5005ebe97deb7cc7c0fee9f53f27ffe425103c9b665f436dca4a7946ceab536aa4ae90d6bee8192ee0d578d93227f0feb3445517fdd87f89f3e8cde113c
-
Filesize
3.4MB
MD554f3a772371fdb509a6cb59989daf3a0
SHA185a7693231e4b2e6e4be02dd56308537ab39a7a0
SHA2567c89c05b0c492bd4e3e9bbb2311e9216d94e213caa289e2c3eced5dc6c490572
SHA5126a2f79c933735467ab90685d0908673a01c47e33cd126a70edc475440c0db52115a69389a2d2f1a9091b66d51fd1b1dbcc31b0ac3f9208ed8ab2bc2e0d7dd679