Analysis
-
max time kernel
150s -
max time network
152s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
28-09-2024 02:55
Static task
static1
Behavioral task
behavioral1
Sample
fb5de52c034669c51327ab62cc751ca3_JaffaCakes118.dll
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
fb5de52c034669c51327ab62cc751ca3_JaffaCakes118.dll
Resource
win10v2004-20240802-en
General
-
Target
fb5de52c034669c51327ab62cc751ca3_JaffaCakes118.dll
-
Size
5.0MB
-
MD5
fb5de52c034669c51327ab62cc751ca3
-
SHA1
10f84fa83905dda60ecbb009abd48d236e6431c6
-
SHA256
bc618b7ddd672c575e8a624d50d21a9ac6ce33df9ca62fb42f72d1a50b0e0489
-
SHA512
0d5fd1a5619aaff0d45459e289cc8ff30701cc32ad44adfca7179bdc284ddca4d9ee3c52b12ad260a2749752af080ad7633e55e78eae0997644917802aed7cf1
-
SSDEEP
49152:SnjQqMSPbcBVQej/1INRx+TSqTdX1HkQYAMEcaEau3R8yAFHAD:+8qPoBhz1aRxcSUDkn593R8yA
Malware Config
Signatures
-
Wannacry
WannaCry is a ransomware cryptoworm.
-
Contacts a large (3331) amount of remote hosts 1 TTPs
This may indicate a network scan to discover remotely running services.
-
Executes dropped EXE 3 IoCs
pid Process 2988 mssecsvc.exe 3032 mssecsvc.exe 2080 tasksche.exe -
Creates a large amount of network flows 1 TTPs
This may indicate a network scan to discover remotely running services.
-
Drops file in System32 directory 1 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\Temporary Internet Files\counters.dat mssecsvc.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\WINDOWS\mssecsvc.exe rundll32.exe File created C:\WINDOWS\tasksche.exe mssecsvc.exe -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mssecsvc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mssecsvc.exe -
Modifies data under HKEY_USERS 1 IoCs
description ioc Process Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings mssecsvc.exe -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 2328 wrote to memory of 2972 2328 rundll32.exe 31 PID 2328 wrote to memory of 2972 2328 rundll32.exe 31 PID 2328 wrote to memory of 2972 2328 rundll32.exe 31 PID 2328 wrote to memory of 2972 2328 rundll32.exe 31 PID 2328 wrote to memory of 2972 2328 rundll32.exe 31 PID 2328 wrote to memory of 2972 2328 rundll32.exe 31 PID 2328 wrote to memory of 2972 2328 rundll32.exe 31 PID 2972 wrote to memory of 2988 2972 rundll32.exe 32 PID 2972 wrote to memory of 2988 2972 rundll32.exe 32 PID 2972 wrote to memory of 2988 2972 rundll32.exe 32 PID 2972 wrote to memory of 2988 2972 rundll32.exe 32
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\fb5de52c034669c51327ab62cc751ca3_JaffaCakes118.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:2328 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\fb5de52c034669c51327ab62cc751ca3_JaffaCakes118.dll,#12⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2972 -
C:\WINDOWS\mssecsvc.exeC:\WINDOWS\mssecsvc.exe3⤵
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:2988 -
C:\WINDOWS\tasksche.exeC:\WINDOWS\tasksche.exe /i4⤵
- Executes dropped EXE
PID:2080
-
-
-
-
C:\WINDOWS\mssecsvc.exeC:\WINDOWS\mssecsvc.exe -m security1⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies data under HKEY_USERS
PID:3032
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3.6MB
MD5ea8097eab115bd657a19c29ac3b37d86
SHA1dfa70772d299e4074156edd79cfc40c9fc7de45f
SHA25674ebf956d373dd23e9678bf4b9d884d011248e3a7ef4b4ee2b5481b11b791a18
SHA5123b314ee9e0fb9d4dd69f436771cd6232940d5343aaf2f65126e394ea2765b857b64aa40233845b060f373ad74621c604a0598696e785427826a324ce28c6f058
-
Filesize
3.4MB
MD5e2a2138a1b3a86f2709abb37791ce846
SHA19985c8a25c9036ecf3a003c160a4c456d7f387ca
SHA256f9d6691d392786b9c1e8837591daaf088ad15d09703042813c3ec05658d8f42b
SHA512b841be76136f17d392bd7447961ffd3bfbc114e1f073b38d5207032ffa9e77fd0d7654ee5532e6c71cab6bb4cbae3bf22b533387a13df58004ac1cadb65a21dc