Analysis
-
max time kernel
150s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
27-09-2024 11:35
Static task
static1
Behavioral task
behavioral1
Sample
fa54c6f948949abcc7e6e125e6de6f78_JaffaCakes118.dll
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
fa54c6f948949abcc7e6e125e6de6f78_JaffaCakes118.dll
Resource
win10v2004-20240802-en
General
-
Target
fa54c6f948949abcc7e6e125e6de6f78_JaffaCakes118.dll
-
Size
5.0MB
-
MD5
fa54c6f948949abcc7e6e125e6de6f78
-
SHA1
deb48ea1fd7cb6089199d6ea82a54d9c9fcb323d
-
SHA256
740175806b713aa062e1bc41c8cae34d7d8e1696757389a47ebf95a94195842d
-
SHA512
fa6cd5afa1f4727fb5081177f25e78c27fa135b545c275ee8e33d38a330d8bc6c3ce69fd4745c3b229185ad58808ce7e678806c5f05acadeeb3024668e9778a7
-
SSDEEP
98304:TDqPoBhz1aRxcSUDk36SAEdhvxWa9P5wyAVp2:TDqPe1Cxcxk3ZAEUadSyc4
Malware Config
Signatures
-
Wannacry
WannaCry is a ransomware cryptoworm.
-
Contacts a large (3335) amount of remote hosts 1 TTPs
This may indicate a network scan to discover remotely running services.
-
Executes dropped EXE 3 IoCs
pid Process 3020 mssecsvc.exe 1860 mssecsvc.exe 3936 tasksche.exe -
Creates a large amount of network flows 1 TTPs
This may indicate a network scan to discover remotely running services.
-
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\WINDOWS\tasksche.exe mssecsvc.exe File created C:\WINDOWS\mssecsvc.exe rundll32.exe -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mssecsvc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mssecsvc.exe -
Modifies data under HKEY_USERS 5 IoCs
description ioc Process Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\IntranetName = "1" mssecsvc.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\UNCAsIntranet = "1" mssecsvc.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\AutoDetect = "0" mssecsvc.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ mssecsvc.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ProxyBypass = "1" mssecsvc.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 1780 wrote to memory of 1732 1780 rundll32.exe 82 PID 1780 wrote to memory of 1732 1780 rundll32.exe 82 PID 1780 wrote to memory of 1732 1780 rundll32.exe 82 PID 1732 wrote to memory of 3020 1732 rundll32.exe 83 PID 1732 wrote to memory of 3020 1732 rundll32.exe 83 PID 1732 wrote to memory of 3020 1732 rundll32.exe 83
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\fa54c6f948949abcc7e6e125e6de6f78_JaffaCakes118.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1780 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\fa54c6f948949abcc7e6e125e6de6f78_JaffaCakes118.dll,#12⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1732 -
C:\WINDOWS\mssecsvc.exeC:\WINDOWS\mssecsvc.exe3⤵
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:3020 -
C:\WINDOWS\tasksche.exeC:\WINDOWS\tasksche.exe /i4⤵
- Executes dropped EXE
PID:3936
-
-
-
-
C:\WINDOWS\mssecsvc.exeC:\WINDOWS\mssecsvc.exe -m security1⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Modifies data under HKEY_USERS
PID:1860
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3.6MB
MD50a305cb00f5b5ccee3eeb839d59dcc29
SHA15dcacb4a9c827fb5493834fcc458e566c2025dcd
SHA2561242a277ebc04329df04b9e56768e0d3d7efb8aa159f950fdb7a43c68b3b80d5
SHA512894bd48c3d328dc63f34e0c15ee8bad4a484d856eb8f5e5b318b581e4497ed4739575cdbfafebb7c9ef84d3eb00ed8819e3633c9d9074bdc0b7203221f524a9c
-
Filesize
3.4MB
MD55ff644bf9ddb7607f493572489cb5fe6
SHA15e7452c49ef2fae9b777a84154a99a6fb683f34e
SHA256405fa830e11193f4280f8a0ca28ce20c445967e828d710a6f24043f9488e8267
SHA5125fb304f44bc98c17ce42e71b44f92ce02badf529b6e6891623fb69461fe5837db1444f580c6f6a0920839b7f4c4a0bfa1d9b58549bbf03300c4d7ac8c5da6203