Analysis
-
max time kernel
150s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
21-09-2024 20:26
Static task
static1
Behavioral task
behavioral1
Sample
f08c407de6e22ce3bbe53946f04b3709_JaffaCakes118.dll
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
f08c407de6e22ce3bbe53946f04b3709_JaffaCakes118.dll
Resource
win10v2004-20240802-en
General
-
Target
f08c407de6e22ce3bbe53946f04b3709_JaffaCakes118.dll
-
Size
5.0MB
-
MD5
f08c407de6e22ce3bbe53946f04b3709
-
SHA1
5637e34b9b2c09d60db257f5b1686e825226ba95
-
SHA256
bf617a8d7e19719a7a568f9a80e79e34e1997c9e856bf61e1161e6dd7ad544bd
-
SHA512
43431f0a32597be007b17a51d89a9872d7fc6d4f2249ada09eb2810fc0a7dafefece83b3489ec07d878cef289de1a354b3bf806cea3bf4a743a30aba4f14e043
-
SSDEEP
98304:+DqPoBhz1aRxcSUDk36SAQ593R8yAVp2H:+DqPe1Cxcxk3ZAQzR8yc4H
Malware Config
Signatures
-
Wannacry
WannaCry is a ransomware cryptoworm.
-
Contacts a large (3312) amount of remote hosts 1 TTPs
This may indicate a network scan to discover remotely running services.
-
Executes dropped EXE 3 IoCs
pid Process 4364 mssecsvc.exe 3352 mssecsvc.exe 4648 tasksche.exe -
Creates a large amount of network flows 1 TTPs
This may indicate a network scan to discover remotely running services.
-
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\WINDOWS\mssecsvc.exe rundll32.exe File created C:\WINDOWS\tasksche.exe mssecsvc.exe -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mssecsvc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mssecsvc.exe -
Modifies data under HKEY_USERS 5 IoCs
description ioc Process Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ProxyBypass = "1" mssecsvc.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\IntranetName = "1" mssecsvc.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\UNCAsIntranet = "1" mssecsvc.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\AutoDetect = "0" mssecsvc.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ mssecsvc.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 916 wrote to memory of 4204 916 rundll32.exe 82 PID 916 wrote to memory of 4204 916 rundll32.exe 82 PID 916 wrote to memory of 4204 916 rundll32.exe 82 PID 4204 wrote to memory of 4364 4204 rundll32.exe 83 PID 4204 wrote to memory of 4364 4204 rundll32.exe 83 PID 4204 wrote to memory of 4364 4204 rundll32.exe 83
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\f08c407de6e22ce3bbe53946f04b3709_JaffaCakes118.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:916 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\f08c407de6e22ce3bbe53946f04b3709_JaffaCakes118.dll,#12⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4204 -
C:\WINDOWS\mssecsvc.exeC:\WINDOWS\mssecsvc.exe3⤵
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:4364 -
C:\WINDOWS\tasksche.exeC:\WINDOWS\tasksche.exe /i4⤵
- Executes dropped EXE
PID:4648
-
-
-
-
C:\WINDOWS\mssecsvc.exeC:\WINDOWS\mssecsvc.exe -m security1⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Modifies data under HKEY_USERS
PID:3352
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3.6MB
MD5d409956c355ccf276223cd5e55ce5a4d
SHA1576981afb99f7b3dc61cccab842910886e6991e7
SHA256953c1d65ffb029ff2b8b26dd67583c83861ef52b66db1f6b5db03dfc33044d97
SHA51219bef5a9b03a28daa10a9d444c863122c0a90f4371eef2cce10197e6fb41db8791dc3e85070dc6b8846ae436ce2f63c1c278deed04b520260f2b2203636314d6
-
Filesize
3.4MB
MD58ecf2a77fbc2a49749409dcc7fd8445c
SHA1207663726684eb84d34d16df2a389b2892e333c5
SHA25659c3d851ddff0463e6683b4353c23ce0fd67dfa2d7ffe259e806c1dafb69d6e2
SHA512a8c567193cf2d1521f850789127bf2c814a7f95c2bd05899cf4a6a8b1dd25da9a7861c0f60f3172523f1c0302d27e88a79b3950d7ba086ecf4dfde5f6e7ad7e7