Analysis
-
max time kernel
150s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
29-09-2024 01:12
Static task
static1
Behavioral task
behavioral1
Sample
fd8298ebba1dc354cd09685e4545142b_JaffaCakes118.dll
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
fd8298ebba1dc354cd09685e4545142b_JaffaCakes118.dll
Resource
win10v2004-20240802-en
General
-
Target
fd8298ebba1dc354cd09685e4545142b_JaffaCakes118.dll
-
Size
5.0MB
-
MD5
fd8298ebba1dc354cd09685e4545142b
-
SHA1
f9eac2afca1cf17a5f6938a4f2d83fc6b30b5d68
-
SHA256
3f7f0404c5ebf091c0f79f3b4351541115f7634d6f41d16b607f54cac1b69f89
-
SHA512
d910e8a057f5c11375657b0cd48d3c4a58cfd338f71eacda1f477e0527f3025e622dece71967ff96e1ca93ad9fe4c9908caa36d6d91a5ef6875545ec91782caa
-
SSDEEP
98304:+DqPoBhT1aRxcSUDk36SAEdhvxWa9P593R8yAVp2H:+DqPu1Cxcxk3ZAEUadzR8yc4H
Malware Config
Signatures
-
Wannacry
WannaCry is a ransomware cryptoworm.
-
Contacts a large (3285) amount of remote hosts 1 TTPs
This may indicate a network scan to discover remotely running services.
-
Executes dropped EXE 3 IoCs
pid Process 4920 mssecsvc.exe 1504 mssecsvc.exe 4624 tasksche.exe -
Creates a large amount of network flows 1 TTPs
This may indicate a network scan to discover remotely running services.
-
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\WINDOWS\mssecsvc.exe rundll32.exe File created C:\WINDOWS\tasksche.exe mssecsvc.exe -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mssecsvc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mssecsvc.exe -
Modifies data under HKEY_USERS 5 IoCs
description ioc Process Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\AutoDetect = "0" mssecsvc.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ mssecsvc.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ProxyBypass = "1" mssecsvc.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\IntranetName = "1" mssecsvc.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\UNCAsIntranet = "1" mssecsvc.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 4428 wrote to memory of 2540 4428 rundll32.exe 82 PID 4428 wrote to memory of 2540 4428 rundll32.exe 82 PID 4428 wrote to memory of 2540 4428 rundll32.exe 82 PID 2540 wrote to memory of 4920 2540 rundll32.exe 83 PID 2540 wrote to memory of 4920 2540 rundll32.exe 83 PID 2540 wrote to memory of 4920 2540 rundll32.exe 83
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\fd8298ebba1dc354cd09685e4545142b_JaffaCakes118.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:4428 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\fd8298ebba1dc354cd09685e4545142b_JaffaCakes118.dll,#12⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2540 -
C:\WINDOWS\mssecsvc.exeC:\WINDOWS\mssecsvc.exe3⤵
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:4920 -
C:\WINDOWS\tasksche.exeC:\WINDOWS\tasksche.exe /i4⤵
- Executes dropped EXE
PID:4624
-
-
-
-
C:\WINDOWS\mssecsvc.exeC:\WINDOWS\mssecsvc.exe -m security1⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Modifies data under HKEY_USERS
PID:1504
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3.6MB
MD55b7ab954103cef132b1d333729ae622a
SHA1a1db6c2ddcbbcd2c7a3f7bf50f3b012c6b974557
SHA25648c216ef9688aaf9dc2680cb3e9eb10ae13d4ad3e663a50007cc47b226c73f9a
SHA512c80bf957acbeb8a0685a1550ffaf2a3dca8d79e5a223ed92052d58f770574dd1131375eea6cfa803d38a66e897f4174a8a397317e299e13bdf8898df99ba495b
-
Filesize
3.4MB
MD543bd6f578da5e40d92f9cb4ff6adde2b
SHA173a62b848a276eff63cafcf3261a1f0ecb83d6b2
SHA25673b1b10cc67e25e21bcfb955a6a5c286e98ca1fc0c634c33874e63cd39ee9227
SHA51261fb6807f5c31f51709d49a3ddd873e34d9c8bfdf49a9ba04dedfa2070ee7fb08aab42ab343d550b13b42cdcd1333d76f8d30a5ed0725b58153f45d7aceb5020