Analysis
-
max time kernel
150s -
max time network
151s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
21-09-2024 20:26
Static task
static1
Behavioral task
behavioral1
Sample
f08c407de6e22ce3bbe53946f04b3709_JaffaCakes118.dll
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
f08c407de6e22ce3bbe53946f04b3709_JaffaCakes118.dll
Resource
win10v2004-20240802-en
General
-
Target
f08c407de6e22ce3bbe53946f04b3709_JaffaCakes118.dll
-
Size
5.0MB
-
MD5
f08c407de6e22ce3bbe53946f04b3709
-
SHA1
5637e34b9b2c09d60db257f5b1686e825226ba95
-
SHA256
bf617a8d7e19719a7a568f9a80e79e34e1997c9e856bf61e1161e6dd7ad544bd
-
SHA512
43431f0a32597be007b17a51d89a9872d7fc6d4f2249ada09eb2810fc0a7dafefece83b3489ec07d878cef289de1a354b3bf806cea3bf4a743a30aba4f14e043
-
SSDEEP
98304:+DqPoBhz1aRxcSUDk36SAQ593R8yAVp2H:+DqPe1Cxcxk3ZAQzR8yc4H
Malware Config
Signatures
-
Wannacry
WannaCry is a ransomware cryptoworm.
-
Contacts a large (3292) amount of remote hosts 1 TTPs
This may indicate a network scan to discover remotely running services.
-
Executes dropped EXE 3 IoCs
pid Process 1156 mssecsvc.exe 1716 mssecsvc.exe 2472 tasksche.exe -
Creates a large amount of network flows 1 TTPs
This may indicate a network scan to discover remotely running services.
-
Drops file in System32 directory 1 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\Temporary Internet Files\counters.dat mssecsvc.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\WINDOWS\tasksche.exe mssecsvc.exe File created C:\WINDOWS\mssecsvc.exe rundll32.exe -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mssecsvc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mssecsvc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Modifies data under HKEY_USERS 24 IoCs
description ioc Process Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{57B3FFFB-207B-4ECB-B6BF-EDCF9B9D5C7E}\WpadDecision = "0" mssecsvc.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\86-aa-82-d4-75-75\WpadDecisionReason = "1" mssecsvc.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings mssecsvc.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\UNCAsIntranet = "0" mssecsvc.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Cookies\CachePrefix = "Cookie:" mssecsvc.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\History\CachePrefix = "Visited:" mssecsvc.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{57B3FFFB-207B-4ECB-B6BF-EDCF9B9D5C7E}\WpadDecisionTime = a06e698f640cdb01 mssecsvc.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections mssecsvc.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ProxyEnable = "0" mssecsvc.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{57B3FFFB-207B-4ECB-B6BF-EDCF9B9D5C7E}\WpadNetworkName = "Network 2" mssecsvc.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\86-aa-82-d4-75-75 mssecsvc.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{57B3FFFB-207B-4ECB-B6BF-EDCF9B9D5C7E}\86-aa-82-d4-75-75 mssecsvc.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\86-aa-82-d4-75-75\WpadDecisionTime = a06e698f640cdb01 mssecsvc.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\DefaultConnectionSettings = 4600000002000000090000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 mssecsvc.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings mssecsvc.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ mssecsvc.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Content\CachePrefix mssecsvc.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad mssecsvc.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\86-aa-82-d4-75-75\WpadDecision = "0" mssecsvc.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\SavedLegacySettings = 4600000002000000090000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 mssecsvc.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\AutoDetect = "1" mssecsvc.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\DefaultConnectionSettings = 4600000003000000090000000000000000000000000000000400000000000000000000000000000000000000000000000000000001000000020000000a7f0186000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 mssecsvc.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{57B3FFFB-207B-4ECB-B6BF-EDCF9B9D5C7E} mssecsvc.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{57B3FFFB-207B-4ECB-B6BF-EDCF9B9D5C7E}\WpadDecisionReason = "1" mssecsvc.exe -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 2548 wrote to memory of 1700 2548 rundll32.exe 30 PID 2548 wrote to memory of 1700 2548 rundll32.exe 30 PID 2548 wrote to memory of 1700 2548 rundll32.exe 30 PID 2548 wrote to memory of 1700 2548 rundll32.exe 30 PID 2548 wrote to memory of 1700 2548 rundll32.exe 30 PID 2548 wrote to memory of 1700 2548 rundll32.exe 30 PID 2548 wrote to memory of 1700 2548 rundll32.exe 30 PID 1700 wrote to memory of 1156 1700 rundll32.exe 31 PID 1700 wrote to memory of 1156 1700 rundll32.exe 31 PID 1700 wrote to memory of 1156 1700 rundll32.exe 31 PID 1700 wrote to memory of 1156 1700 rundll32.exe 31
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\f08c407de6e22ce3bbe53946f04b3709_JaffaCakes118.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:2548 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\f08c407de6e22ce3bbe53946f04b3709_JaffaCakes118.dll,#12⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1700 -
C:\WINDOWS\mssecsvc.exeC:\WINDOWS\mssecsvc.exe3⤵
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:1156 -
C:\WINDOWS\tasksche.exeC:\WINDOWS\tasksche.exe /i4⤵
- Executes dropped EXE
PID:2472
-
-
-
-
C:\WINDOWS\mssecsvc.exeC:\WINDOWS\mssecsvc.exe -m security1⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies data under HKEY_USERS
PID:1716
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3.6MB
MD5d409956c355ccf276223cd5e55ce5a4d
SHA1576981afb99f7b3dc61cccab842910886e6991e7
SHA256953c1d65ffb029ff2b8b26dd67583c83861ef52b66db1f6b5db03dfc33044d97
SHA51219bef5a9b03a28daa10a9d444c863122c0a90f4371eef2cce10197e6fb41db8791dc3e85070dc6b8846ae436ce2f63c1c278deed04b520260f2b2203636314d6
-
Filesize
3.4MB
MD58ecf2a77fbc2a49749409dcc7fd8445c
SHA1207663726684eb84d34d16df2a389b2892e333c5
SHA25659c3d851ddff0463e6683b4353c23ce0fd67dfa2d7ffe259e806c1dafb69d6e2
SHA512a8c567193cf2d1521f850789127bf2c814a7f95c2bd05899cf4a6a8b1dd25da9a7861c0f60f3172523f1c0302d27e88a79b3950d7ba086ecf4dfde5f6e7ad7e7