Analysis
-
max time kernel
150s -
max time network
150s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
20-09-2024 13:58
Static task
static1
Behavioral task
behavioral1
Sample
edbd2dfd6334fb23e5bf3faa24556a4a_JaffaCakes118.dll
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
edbd2dfd6334fb23e5bf3faa24556a4a_JaffaCakes118.dll
Resource
win10v2004-20240802-en
General
-
Target
edbd2dfd6334fb23e5bf3faa24556a4a_JaffaCakes118.dll
-
Size
5.0MB
-
MD5
edbd2dfd6334fb23e5bf3faa24556a4a
-
SHA1
d98673cd23f664b32ced72a47e94c9dfe2fbc41e
-
SHA256
d20278b518a4592122279ad93c96fae5ad9fdca4dc038352c794f5030dc6d54c
-
SHA512
793008c5e90e7cdaf986f8d489320ea39bba074797583593345fd344b11e7643862c2849bde9b732cff00144780eeada91f7d51cd235fc5ca30ac014ac98ab8a
-
SSDEEP
98304:+DqPoBhz1avBiGkEJMkEBaXTddktRzVJr0O+jM1BU8C4q6ohRMkP/:+DqPe16BiKqkEWcZJAdG68A
Malware Config
Signatures
-
Wannacry
WannaCry is a ransomware cryptoworm.
-
Contacts a large (3216) amount of remote hosts 1 TTPs
This may indicate a network scan to discover remotely running services.
-
Executes dropped EXE 3 IoCs
pid Process 1652 mssecsvc.exe 2072 mssecsvc.exe 2832 tasksche.exe -
Creates a large amount of network flows 1 TTPs
This may indicate a network scan to discover remotely running services.
-
Drops file in System32 directory 1 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\Temporary Internet Files\counters.dat mssecsvc.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\WINDOWS\mssecsvc.exe rundll32.exe File created C:\WINDOWS\tasksche.exe mssecsvc.exe -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mssecsvc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mssecsvc.exe -
Modifies data under HKEY_USERS 24 IoCs
description ioc Process Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\da-4f-33-8d-3d-8c\WpadDecision = "0" mssecsvc.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\DefaultConnectionSettings = 4600000002000000090000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 mssecsvc.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{3258774B-C9CB-4688-BFA2-927802793410}\WpadDecisionReason = "1" mssecsvc.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Cookies\CachePrefix = "Cookie:" mssecsvc.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{3258774B-C9CB-4688-BFA2-927802793410}\WpadDecisionTime = b062452d650bdb01 mssecsvc.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\da-4f-33-8d-3d-8c mssecsvc.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{3258774B-C9CB-4688-BFA2-927802793410}\da-4f-33-8d-3d-8c mssecsvc.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings mssecsvc.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Content\CachePrefix mssecsvc.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\SavedLegacySettings = 4600000002000000090000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 mssecsvc.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\History\CachePrefix = "Visited:" mssecsvc.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\DefaultConnectionSettings = 4600000003000000090000000000000000000000000000000400000000000000000000000000000000000000000000000000000001000000020000000a7f0068000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 mssecsvc.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{3258774B-C9CB-4688-BFA2-927802793410}\WpadDecision = "0" mssecsvc.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{3258774B-C9CB-4688-BFA2-927802793410}\WpadNetworkName = "Network 3" mssecsvc.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\da-4f-33-8d-3d-8c\WpadDecisionReason = "1" mssecsvc.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings mssecsvc.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ProxyEnable = "0" mssecsvc.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\da-4f-33-8d-3d-8c\WpadDecisionTime = b062452d650bdb01 mssecsvc.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\UNCAsIntranet = "0" mssecsvc.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\AutoDetect = "1" mssecsvc.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad mssecsvc.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{3258774B-C9CB-4688-BFA2-927802793410} mssecsvc.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections mssecsvc.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ mssecsvc.exe -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 2544 wrote to memory of 1256 2544 rundll32.exe 31 PID 2544 wrote to memory of 1256 2544 rundll32.exe 31 PID 2544 wrote to memory of 1256 2544 rundll32.exe 31 PID 2544 wrote to memory of 1256 2544 rundll32.exe 31 PID 2544 wrote to memory of 1256 2544 rundll32.exe 31 PID 2544 wrote to memory of 1256 2544 rundll32.exe 31 PID 2544 wrote to memory of 1256 2544 rundll32.exe 31 PID 1256 wrote to memory of 1652 1256 rundll32.exe 32 PID 1256 wrote to memory of 1652 1256 rundll32.exe 32 PID 1256 wrote to memory of 1652 1256 rundll32.exe 32 PID 1256 wrote to memory of 1652 1256 rundll32.exe 32
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\edbd2dfd6334fb23e5bf3faa24556a4a_JaffaCakes118.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:2544 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\edbd2dfd6334fb23e5bf3faa24556a4a_JaffaCakes118.dll,#12⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1256 -
C:\WINDOWS\mssecsvc.exeC:\WINDOWS\mssecsvc.exe3⤵
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:1652 -
C:\WINDOWS\tasksche.exeC:\WINDOWS\tasksche.exe /i4⤵
- Executes dropped EXE
PID:2832
-
-
-
-
C:\WINDOWS\mssecsvc.exeC:\WINDOWS\mssecsvc.exe -m security1⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies data under HKEY_USERS
PID:2072
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3.6MB
MD5432b9974f5d2d125836aa256c0561c35
SHA147c9d035c8f3f597f1edf1b30fcefc503663a004
SHA256657d88e66980b8fd5e59288ff183fba1263e2c07eb743a9e2b2db9b1696fd34b
SHA512057e64217ef94b2a727928558e89305c8dc830679d2f2511d505b2e670aad9fb40d91df0b561aa9c578a8ac5bc8ecf6ffccc034db58ad707bf424e387c82b2fb
-
Filesize
3.4MB
MD5a544fceb57911ff07042edc3f297b00c
SHA1c7ab030800401d9ac174475d4429a41731930bef
SHA2565edc477c1b65657cc143ce3abad4d764c45ce4e35de859313208a3eca9202a80
SHA512192dd15dde13a8e866536db96e4d68d1e67903f305fe2f770cb052cc178b0504674c4d98d3d9068e34b2fd74733693cb420320d2a8a817fcea9805f1a5e8b13f