Analysis
-
max time kernel
150s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
28-09-2024 02:55
Static task
static1
Behavioral task
behavioral1
Sample
fb5de52c034669c51327ab62cc751ca3_JaffaCakes118.dll
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
fb5de52c034669c51327ab62cc751ca3_JaffaCakes118.dll
Resource
win10v2004-20240802-en
General
-
Target
fb5de52c034669c51327ab62cc751ca3_JaffaCakes118.dll
-
Size
5.0MB
-
MD5
fb5de52c034669c51327ab62cc751ca3
-
SHA1
10f84fa83905dda60ecbb009abd48d236e6431c6
-
SHA256
bc618b7ddd672c575e8a624d50d21a9ac6ce33df9ca62fb42f72d1a50b0e0489
-
SHA512
0d5fd1a5619aaff0d45459e289cc8ff30701cc32ad44adfca7179bdc284ddca4d9ee3c52b12ad260a2749752af080ad7633e55e78eae0997644917802aed7cf1
-
SSDEEP
49152:SnjQqMSPbcBVQej/1INRx+TSqTdX1HkQYAMEcaEau3R8yAFHAD:+8qPoBhz1aRxcSUDkn593R8yA
Malware Config
Signatures
-
Wannacry
WannaCry is a ransomware cryptoworm.
-
Contacts a large (3221) amount of remote hosts 1 TTPs
This may indicate a network scan to discover remotely running services.
-
Executes dropped EXE 3 IoCs
pid Process 4464 mssecsvc.exe 4920 mssecsvc.exe 4552 tasksche.exe -
Creates a large amount of network flows 1 TTPs
This may indicate a network scan to discover remotely running services.
-
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\WINDOWS\tasksche.exe mssecsvc.exe File created C:\WINDOWS\mssecsvc.exe rundll32.exe -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mssecsvc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mssecsvc.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 2748 wrote to memory of 904 2748 rundll32.exe 82 PID 2748 wrote to memory of 904 2748 rundll32.exe 82 PID 2748 wrote to memory of 904 2748 rundll32.exe 82 PID 904 wrote to memory of 4464 904 rundll32.exe 83 PID 904 wrote to memory of 4464 904 rundll32.exe 83 PID 904 wrote to memory of 4464 904 rundll32.exe 83
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\fb5de52c034669c51327ab62cc751ca3_JaffaCakes118.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:2748 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\fb5de52c034669c51327ab62cc751ca3_JaffaCakes118.dll,#12⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:904 -
C:\WINDOWS\mssecsvc.exeC:\WINDOWS\mssecsvc.exe3⤵
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:4464 -
C:\WINDOWS\tasksche.exeC:\WINDOWS\tasksche.exe /i4⤵
- Executes dropped EXE
PID:4552
-
-
-
-
C:\WINDOWS\mssecsvc.exeC:\WINDOWS\mssecsvc.exe -m security1⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4920
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3.6MB
MD5ea8097eab115bd657a19c29ac3b37d86
SHA1dfa70772d299e4074156edd79cfc40c9fc7de45f
SHA25674ebf956d373dd23e9678bf4b9d884d011248e3a7ef4b4ee2b5481b11b791a18
SHA5123b314ee9e0fb9d4dd69f436771cd6232940d5343aaf2f65126e394ea2765b857b64aa40233845b060f373ad74621c604a0598696e785427826a324ce28c6f058
-
Filesize
3.4MB
MD5e2a2138a1b3a86f2709abb37791ce846
SHA19985c8a25c9036ecf3a003c160a4c456d7f387ca
SHA256f9d6691d392786b9c1e8837591daaf088ad15d09703042813c3ec05658d8f42b
SHA512b841be76136f17d392bd7447961ffd3bfbc114e1f073b38d5207032ffa9e77fd0d7654ee5532e6c71cab6bb4cbae3bf22b533387a13df58004ac1cadb65a21dc