Analysis
-
max time kernel
150s -
max time network
150s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
25-09-2024 11:38
Static task
static1
Behavioral task
behavioral1
Sample
f5edfb2c732e903f70e6f59b95b11337_JaffaCakes118.dll
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
f5edfb2c732e903f70e6f59b95b11337_JaffaCakes118.dll
Resource
win10v2004-20240802-en
General
-
Target
f5edfb2c732e903f70e6f59b95b11337_JaffaCakes118.dll
-
Size
5.0MB
-
MD5
f5edfb2c732e903f70e6f59b95b11337
-
SHA1
896bee860f09bd7a8afe993ea4e5930ebe1d0184
-
SHA256
883724cb261e190d56d9d07b33538157d4f9cb8c1c0b8f943058444544ddfe7d
-
SHA512
c1283596f13b3d5b64f1dcc88d55fd06e6ff3a1444787b09639e3e6bf6f3b6b723ab927c37d7eec55cd1277da33823584b224ccbf207f506b55e220c41b3dd78
-
SSDEEP
49152:JnjQqMSPbcBVQej/1INRx+TSqTdX1HkQo6SAARdhnvxJM0H9PAME:d8qPoBhz1aRxcSUDk36SAEdhvxWa9P5
Malware Config
Signatures
-
Wannacry
WannaCry is a ransomware cryptoworm.
-
Contacts a large (3187) amount of remote hosts 1 TTPs
This may indicate a network scan to discover remotely running services.
-
Executes dropped EXE 3 IoCs
pid Process 1200 mssecsvc.exe 2080 mssecsvc.exe 484 tasksche.exe -
Creates a large amount of network flows 1 TTPs
This may indicate a network scan to discover remotely running services.
-
Drops file in System32 directory 1 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\Temporary Internet Files\counters.dat mssecsvc.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\WINDOWS\tasksche.exe mssecsvc.exe File created C:\WINDOWS\mssecsvc.exe rundll32.exe -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mssecsvc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mssecsvc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Modifies data under HKEY_USERS 1 IoCs
description ioc Process Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings mssecsvc.exe -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 2336 wrote to memory of 2348 2336 rundll32.exe 31 PID 2336 wrote to memory of 2348 2336 rundll32.exe 31 PID 2336 wrote to memory of 2348 2336 rundll32.exe 31 PID 2336 wrote to memory of 2348 2336 rundll32.exe 31 PID 2336 wrote to memory of 2348 2336 rundll32.exe 31 PID 2336 wrote to memory of 2348 2336 rundll32.exe 31 PID 2336 wrote to memory of 2348 2336 rundll32.exe 31 PID 2348 wrote to memory of 1200 2348 rundll32.exe 32 PID 2348 wrote to memory of 1200 2348 rundll32.exe 32 PID 2348 wrote to memory of 1200 2348 rundll32.exe 32 PID 2348 wrote to memory of 1200 2348 rundll32.exe 32
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\f5edfb2c732e903f70e6f59b95b11337_JaffaCakes118.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:2336 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\f5edfb2c732e903f70e6f59b95b11337_JaffaCakes118.dll,#12⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2348 -
C:\WINDOWS\mssecsvc.exeC:\WINDOWS\mssecsvc.exe3⤵
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:1200 -
C:\WINDOWS\tasksche.exeC:\WINDOWS\tasksche.exe /i4⤵
- Executes dropped EXE
PID:484
-
-
-
-
C:\WINDOWS\mssecsvc.exeC:\WINDOWS\mssecsvc.exe -m security1⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies data under HKEY_USERS
PID:2080
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3.6MB
MD5bcfe18815382d5d14bcd57c1df126da7
SHA1d73879391096217b18f57ee3a14e863f1eae7554
SHA256de5c754ff8e64887297554047008b2aaffcc3b8a109cfe2c902a86d360006250
SHA512503babe036e6b2eb26fe35457920a511c8f1d645b99ac62b16484578c5254a31d8e396a261065f1594b5de0a0c795f38b5cc78fc9571ddaed28b5573b8664723
-
Filesize
3.4MB
MD517f4431421c689b216d1e0407d68cc6e
SHA1ed6e9893eef369aa2285b14271900766d77bbae4
SHA2564190bfd1100c9800f8fdf3eaadafe69bb3450d680d0136d2b430882578ef8e37
SHA51296c03ac3d5841c271f61c3dd47c48adae45d9e560aecb45fad5c84612e9a4ac5486f20fb96ceb759567cb9f2df4572d02c3da00fe9492e40e6478eb28d38b287