Analysis
-
max time kernel
150s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
29-09-2024 02:08
Static task
static1
Behavioral task
behavioral1
Sample
fd976b085ff92b83ca0ab285e359a80a_JaffaCakes118.dll
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
fd976b085ff92b83ca0ab285e359a80a_JaffaCakes118.dll
Resource
win10v2004-20240802-en
General
-
Target
fd976b085ff92b83ca0ab285e359a80a_JaffaCakes118.dll
-
Size
5.0MB
-
MD5
fd976b085ff92b83ca0ab285e359a80a
-
SHA1
323b1b8166b7bce110785efe64913729a488cdd9
-
SHA256
5daad8d4baee8e1ab6732095cf818e70352a420551eb194c19703fc1b92c58f3
-
SHA512
d6f2e80ebd6a32a967355a476bb25812e464be2b918830a590be8646d67c5a79f284652bdcc920f5e1f8f87ac500d1fc1f0938713d15ee8dd38cfc872d27db32
-
SSDEEP
98304:+DqPoBhz1aRxcSUDk36SAEdhvxWa9P593R8L:+DqPe1Cxcxk3ZAEUadzR8
Malware Config
Signatures
-
Wannacry
WannaCry is a ransomware cryptoworm.
-
Contacts a large (3350) amount of remote hosts 1 TTPs
This may indicate a network scan to discover remotely running services.
-
Executes dropped EXE 3 IoCs
pid Process 1748 mssecsvc.exe 3836 mssecsvc.exe 3528 tasksche.exe -
Creates a large amount of network flows 1 TTPs
This may indicate a network scan to discover remotely running services.
-
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\WINDOWS\mssecsvc.exe rundll32.exe File created C:\WINDOWS\tasksche.exe mssecsvc.exe -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mssecsvc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mssecsvc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Modifies data under HKEY_USERS 5 IoCs
description ioc Process Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ mssecsvc.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ProxyBypass = "1" mssecsvc.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\IntranetName = "1" mssecsvc.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\UNCAsIntranet = "1" mssecsvc.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\AutoDetect = "0" mssecsvc.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 1180 wrote to memory of 712 1180 rundll32.exe 82 PID 1180 wrote to memory of 712 1180 rundll32.exe 82 PID 1180 wrote to memory of 712 1180 rundll32.exe 82 PID 712 wrote to memory of 1748 712 rundll32.exe 83 PID 712 wrote to memory of 1748 712 rundll32.exe 83 PID 712 wrote to memory of 1748 712 rundll32.exe 83
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\fd976b085ff92b83ca0ab285e359a80a_JaffaCakes118.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1180 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\fd976b085ff92b83ca0ab285e359a80a_JaffaCakes118.dll,#12⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:712 -
C:\WINDOWS\mssecsvc.exeC:\WINDOWS\mssecsvc.exe3⤵
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:1748 -
C:\WINDOWS\tasksche.exeC:\WINDOWS\tasksche.exe /i4⤵
- Executes dropped EXE
PID:3528
-
-
-
-
C:\WINDOWS\mssecsvc.exeC:\WINDOWS\mssecsvc.exe -m security1⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Modifies data under HKEY_USERS
PID:3836
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3.6MB
MD525fd1bb236666d54bee64fb2ad074d53
SHA15aff71b3a67bad5d783bd26013b91a2692cd7886
SHA25634d199b192b5deb4794c35039781566874326afb544114249eba26e9c742c524
SHA512f92893c312f87290ea65b9581eda054786e61a32e6cbbc1092c947b1aacee01e9c645309eb0fbb9c0afb03a38ce289230a6764590a950815069d5413138f8da9
-
Filesize
3.4MB
MD559188fc76996c910404a3254b5d2644c
SHA1bd6e30c2f7c3c66ddda5d7a23f21e267be1464e3
SHA25639a567c71bbb6d87e38118410d2ee6888581c27226c244b8ba24c78320f7773a
SHA51251c82dde8e7162b84962724a0c369ebc69a83d1245ba3965649ffe1009c26ecb58b21065cfb720c9a541b3754598cb59b26258fd18ac6a5255a698363dc5c887