Analysis
-
max time kernel
150s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
25-09-2024 02:13
Static task
static1
Behavioral task
behavioral1
Sample
f4f2e35feb96f5f48daa5f8ce69448d7_JaffaCakes118.dll
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
f4f2e35feb96f5f48daa5f8ce69448d7_JaffaCakes118.dll
Resource
win10v2004-20240802-en
General
-
Target
f4f2e35feb96f5f48daa5f8ce69448d7_JaffaCakes118.dll
-
Size
5.0MB
-
MD5
f4f2e35feb96f5f48daa5f8ce69448d7
-
SHA1
6f3a3b86f22d55c2ddfbe1ab316089c07ba030b9
-
SHA256
ef376214f178669b0a57bd061bf6b34e1631fcb4831ede7ab204588657d44596
-
SHA512
2476e65afbaf13a3a4c620bb0d0067bbc8a8eefefcf018b4adbf76107ce7dca5469c2b335fa7ed6778613fb79a354a775ab06becb139fe019464514c3e09e5d2
-
SSDEEP
49152:SnAQqMSPbcBVQej/1INRx+TSqTdX1HkQo6SAAxxJM:+DqPoBhz1aRxcSUDk36SA4xW
Malware Config
Signatures
-
Wannacry
WannaCry is a ransomware cryptoworm.
-
Contacts a large (3291) amount of remote hosts 1 TTPs
This may indicate a network scan to discover remotely running services.
-
Executes dropped EXE 3 IoCs
pid Process 1420 mssecsvc.exe 4416 mssecsvc.exe 396 tasksche.exe -
Creates a large amount of network flows 1 TTPs
This may indicate a network scan to discover remotely running services.
-
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\WINDOWS\mssecsvc.exe rundll32.exe File created C:\WINDOWS\tasksche.exe mssecsvc.exe -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mssecsvc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mssecsvc.exe -
Modifies data under HKEY_USERS 5 IoCs
description ioc Process Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\IntranetName = "1" mssecsvc.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\UNCAsIntranet = "1" mssecsvc.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\AutoDetect = "0" mssecsvc.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ mssecsvc.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ProxyBypass = "1" mssecsvc.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 3916 wrote to memory of 2476 3916 rundll32.exe 82 PID 3916 wrote to memory of 2476 3916 rundll32.exe 82 PID 3916 wrote to memory of 2476 3916 rundll32.exe 82 PID 2476 wrote to memory of 1420 2476 rundll32.exe 83 PID 2476 wrote to memory of 1420 2476 rundll32.exe 83 PID 2476 wrote to memory of 1420 2476 rundll32.exe 83
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\f4f2e35feb96f5f48daa5f8ce69448d7_JaffaCakes118.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:3916 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\f4f2e35feb96f5f48daa5f8ce69448d7_JaffaCakes118.dll,#12⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2476 -
C:\WINDOWS\mssecsvc.exeC:\WINDOWS\mssecsvc.exe3⤵
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:1420 -
C:\WINDOWS\tasksche.exeC:\WINDOWS\tasksche.exe /i4⤵
- Executes dropped EXE
PID:396
-
-
-
-
C:\WINDOWS\mssecsvc.exeC:\WINDOWS\mssecsvc.exe -m security1⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Modifies data under HKEY_USERS
PID:4416
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3.6MB
MD5ef8f9a175c2c3817acccfbe1ab0902bf
SHA1a3b2e0b0fc085a3e57e75fe36a8f8183843fb7dc
SHA256e84558e2d07783e5fc7ed1b8716d6e6671c165eb9e67e916f015d1865b0f0372
SHA51230106874f0fb5ad55828743c6a457f843cdece10b11da4079aad05a661fe12a9de987700d85f790b81bf7cc82f5d3e8dbd953dc04b64e4dba7d7d31ad2f29fd3
-
Filesize
3.4MB
MD5902e9fd67b647b82a14752162a55179c
SHA15e724824b4a0fb4461f872a715876b151e1bba2d
SHA256d8a947c7b002dbaeb34b42a0ece3d2d7f6f29b364b1c49fb3a9f6eaca9b08286
SHA512e77107cb9d82553f9bcd7cddfa4664e9a64afbcc21b9d1279cd20145eb0ea367b502f17c1e0e32d4a07655e3a76c7e7a1afe5e9fa958f030b5d4e18f1f36c390