Analysis
-
max time kernel
150s -
max time network
150s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
27-09-2024 11:35
Static task
static1
Behavioral task
behavioral1
Sample
fa54c6f948949abcc7e6e125e6de6f78_JaffaCakes118.dll
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
fa54c6f948949abcc7e6e125e6de6f78_JaffaCakes118.dll
Resource
win10v2004-20240802-en
General
-
Target
fa54c6f948949abcc7e6e125e6de6f78_JaffaCakes118.dll
-
Size
5.0MB
-
MD5
fa54c6f948949abcc7e6e125e6de6f78
-
SHA1
deb48ea1fd7cb6089199d6ea82a54d9c9fcb323d
-
SHA256
740175806b713aa062e1bc41c8cae34d7d8e1696757389a47ebf95a94195842d
-
SHA512
fa6cd5afa1f4727fb5081177f25e78c27fa135b545c275ee8e33d38a330d8bc6c3ce69fd4745c3b229185ad58808ce7e678806c5f05acadeeb3024668e9778a7
-
SSDEEP
98304:TDqPoBhz1aRxcSUDk36SAEdhvxWa9P5wyAVp2:TDqPe1Cxcxk3ZAEUadSyc4
Malware Config
Signatures
-
Wannacry
WannaCry is a ransomware cryptoworm.
-
Contacts a large (3337) amount of remote hosts 1 TTPs
This may indicate a network scan to discover remotely running services.
-
Executes dropped EXE 3 IoCs
pid Process 2908 mssecsvc.exe 1916 mssecsvc.exe 2384 tasksche.exe -
Creates a large amount of network flows 1 TTPs
This may indicate a network scan to discover remotely running services.
-
Drops file in System32 directory 1 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\Temporary Internet Files\counters.dat mssecsvc.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\WINDOWS\mssecsvc.exe rundll32.exe File created C:\WINDOWS\tasksche.exe mssecsvc.exe -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mssecsvc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mssecsvc.exe -
Modifies data under HKEY_USERS 24 IoCs
description ioc Process Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\DefaultConnectionSettings = 4600000002000000090000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 mssecsvc.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings mssecsvc.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\History\CachePrefix = "Visited:" mssecsvc.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad mssecsvc.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\DefaultConnectionSettings = 4600000003000000090000000000000000000000000000000400000000000000000000000000000000000000000000000000000001000000020000000a7f00dd000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 mssecsvc.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{42B21C9F-19A9-428F-8161-A7E3744F218E}\WpadNetworkName = "Network 3" mssecsvc.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\72-18-c8-2e-b8-34\WpadDecisionTime = c0c36b5bd110db01 mssecsvc.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections mssecsvc.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\SavedLegacySettings = 4600000002000000090000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 mssecsvc.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{42B21C9F-19A9-428F-8161-A7E3744F218E} mssecsvc.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{42B21C9F-19A9-428F-8161-A7E3744F218E}\WpadDecisionTime = c0c36b5bd110db01 mssecsvc.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\72-18-c8-2e-b8-34 mssecsvc.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ProxyEnable = "0" mssecsvc.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Content\CachePrefix mssecsvc.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Cookies\CachePrefix = "Cookie:" mssecsvc.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{42B21C9F-19A9-428F-8161-A7E3744F218E}\WpadDecisionReason = "1" mssecsvc.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\72-18-c8-2e-b8-34\WpadDecision = "0" mssecsvc.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings mssecsvc.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ mssecsvc.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\UNCAsIntranet = "0" mssecsvc.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\AutoDetect = "1" mssecsvc.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{42B21C9F-19A9-428F-8161-A7E3744F218E}\WpadDecision = "0" mssecsvc.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{42B21C9F-19A9-428F-8161-A7E3744F218E}\72-18-c8-2e-b8-34 mssecsvc.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\72-18-c8-2e-b8-34\WpadDecisionReason = "1" mssecsvc.exe -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 2844 wrote to memory of 2860 2844 rundll32.exe 28 PID 2844 wrote to memory of 2860 2844 rundll32.exe 28 PID 2844 wrote to memory of 2860 2844 rundll32.exe 28 PID 2844 wrote to memory of 2860 2844 rundll32.exe 28 PID 2844 wrote to memory of 2860 2844 rundll32.exe 28 PID 2844 wrote to memory of 2860 2844 rundll32.exe 28 PID 2844 wrote to memory of 2860 2844 rundll32.exe 28 PID 2860 wrote to memory of 2908 2860 rundll32.exe 29 PID 2860 wrote to memory of 2908 2860 rundll32.exe 29 PID 2860 wrote to memory of 2908 2860 rundll32.exe 29 PID 2860 wrote to memory of 2908 2860 rundll32.exe 29
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\fa54c6f948949abcc7e6e125e6de6f78_JaffaCakes118.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:2844 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\fa54c6f948949abcc7e6e125e6de6f78_JaffaCakes118.dll,#12⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2860 -
C:\WINDOWS\mssecsvc.exeC:\WINDOWS\mssecsvc.exe3⤵
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:2908 -
C:\WINDOWS\tasksche.exeC:\WINDOWS\tasksche.exe /i4⤵
- Executes dropped EXE
PID:2384
-
-
-
-
C:\WINDOWS\mssecsvc.exeC:\WINDOWS\mssecsvc.exe -m security1⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies data under HKEY_USERS
PID:1916
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3.6MB
MD50a305cb00f5b5ccee3eeb839d59dcc29
SHA15dcacb4a9c827fb5493834fcc458e566c2025dcd
SHA2561242a277ebc04329df04b9e56768e0d3d7efb8aa159f950fdb7a43c68b3b80d5
SHA512894bd48c3d328dc63f34e0c15ee8bad4a484d856eb8f5e5b318b581e4497ed4739575cdbfafebb7c9ef84d3eb00ed8819e3633c9d9074bdc0b7203221f524a9c
-
Filesize
3.4MB
MD55ff644bf9ddb7607f493572489cb5fe6
SHA15e7452c49ef2fae9b777a84154a99a6fb683f34e
SHA256405fa830e11193f4280f8a0ca28ce20c445967e828d710a6f24043f9488e8267
SHA5125fb304f44bc98c17ce42e71b44f92ce02badf529b6e6891623fb69461fe5837db1444f580c6f6a0920839b7f4c4a0bfa1d9b58549bbf03300c4d7ac8c5da6203