Analysis
-
max time kernel
150s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
27-09-2024 16:38
Static task
static1
Behavioral task
behavioral1
Sample
fac31665f283cd03275732939e3fbc58_JaffaCakes118.dll
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
fac31665f283cd03275732939e3fbc58_JaffaCakes118.dll
Resource
win10v2004-20240802-en
General
-
Target
fac31665f283cd03275732939e3fbc58_JaffaCakes118.dll
-
Size
5.0MB
-
MD5
fac31665f283cd03275732939e3fbc58
-
SHA1
5812c2bfcf8d92293396e47ed5e250d57878d7e2
-
SHA256
c8e1f103e2313c54a080542f8a88e0f06204654ff99963add4ecb95e726c0564
-
SHA512
65ae586ccc9a824be82463569118cfe4dee0e324f6ba94ac4fc368abe694ca39af0d89974a89a29c780c50048998b1ea8e504355ec51fc006aa705d6f2ac0751
-
SSDEEP
24576:SbLgddQhfdmMSirYbcMNgef0QeQjG/D8kIqRYoAdNLKz6626M+vbOSSqTPV0:SnAQqMSPbcBVQej/1INRx+TSqTd0
Malware Config
Signatures
-
Wannacry
WannaCry is a ransomware cryptoworm.
-
Contacts a large (3342) amount of remote hosts 1 TTPs
This may indicate a network scan to discover remotely running services.
-
Executes dropped EXE 3 IoCs
pid Process 4972 mssecsvc.exe 4564 mssecsvc.exe 2704 tasksche.exe -
Creates a large amount of network flows 1 TTPs
This may indicate a network scan to discover remotely running services.
-
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\WINDOWS\mssecsvc.exe rundll32.exe File created C:\WINDOWS\tasksche.exe mssecsvc.exe -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mssecsvc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mssecsvc.exe -
Modifies data under HKEY_USERS 5 IoCs
description ioc Process Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ mssecsvc.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ProxyBypass = "1" mssecsvc.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\IntranetName = "1" mssecsvc.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\UNCAsIntranet = "1" mssecsvc.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\AutoDetect = "0" mssecsvc.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 5116 wrote to memory of 3980 5116 rundll32.exe 82 PID 5116 wrote to memory of 3980 5116 rundll32.exe 82 PID 5116 wrote to memory of 3980 5116 rundll32.exe 82 PID 3980 wrote to memory of 4972 3980 rundll32.exe 83 PID 3980 wrote to memory of 4972 3980 rundll32.exe 83 PID 3980 wrote to memory of 4972 3980 rundll32.exe 83
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\fac31665f283cd03275732939e3fbc58_JaffaCakes118.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:5116 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\fac31665f283cd03275732939e3fbc58_JaffaCakes118.dll,#12⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3980 -
C:\WINDOWS\mssecsvc.exeC:\WINDOWS\mssecsvc.exe3⤵
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:4972 -
C:\WINDOWS\tasksche.exeC:\WINDOWS\tasksche.exe /i4⤵
- Executes dropped EXE
PID:2704
-
-
-
-
C:\WINDOWS\mssecsvc.exeC:\WINDOWS\mssecsvc.exe -m security1⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Modifies data under HKEY_USERS
PID:4564
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3.6MB
MD56f5cf0fd18d2d90d6491bad093acde66
SHA15f7608d88bf0a1a4caa3da7f9923676c36b0892e
SHA2562ec11092c246683c17777011a5a51a762d7d1ec654606471f92d4f7021b6c052
SHA51205c1b149d73b1ea086df5bf7c9e93ccc49787a182b14619360620d7434ec19b499e800f2ba0ae88a3e8c9b25165b446c2bd401b3f48ffceeb3dd91449e80996b
-
Filesize
3.4MB
MD575e78aeb2ec468c9b0e3e5e83d22fb4b
SHA129d04a0c7ffcdec17f008d0594126014504e0d90
SHA256b4cae3760d43f4aba45c7b49652662d304d942642189801209434cc551ad488d
SHA5126c29195016e5456e3d245f55000b8c5918ba7348687ffc45f50e089d1c118f26ee0586b8cbaa072345b8244c52b90c8e904c3d2caf8822d8667a8fea265d66e5