Analysis
-
max time kernel
150s -
max time network
150s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
29-09-2024 05:35
Static task
static1
Behavioral task
behavioral1
Sample
fde4cd87fefc2f7c7c9bb3de815d34aa_JaffaCakes118.dll
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
fde4cd87fefc2f7c7c9bb3de815d34aa_JaffaCakes118.dll
Resource
win10v2004-20240802-en
General
-
Target
fde4cd87fefc2f7c7c9bb3de815d34aa_JaffaCakes118.dll
-
Size
5.0MB
-
MD5
fde4cd87fefc2f7c7c9bb3de815d34aa
-
SHA1
794c19b000e8fef33bcfa1558aa6807d6e544b56
-
SHA256
05eb6f2b91bc1c30f75d869bf7ebd14331d68216d14d278d663a1587d8ee9c49
-
SHA512
74901cc8ac44730caa4364d93266205e960641b4298e6d258ee61082e31ebc5f32e7b91377f6e928aa030cf9b03ff0ab3c80dbe449bef1df72531b1b24c7fe46
-
SSDEEP
49152:SnAQqMSPbcBVQej/1INRAqxJM0H9PAMEcaEau3R8yAH1plAH:+DqPoBhz1aRAqxWa9P593R8yAVp2H
Malware Config
Signatures
-
Wannacry
WannaCry is a ransomware cryptoworm.
-
Contacts a large (3325) amount of remote hosts 1 TTPs
This may indicate a network scan to discover remotely running services.
-
Executes dropped EXE 3 IoCs
pid Process 2848 mssecsvc.exe 1896 mssecsvc.exe 2520 tasksche.exe -
Creates a large amount of network flows 1 TTPs
This may indicate a network scan to discover remotely running services.
-
Drops file in System32 directory 1 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\Temporary Internet Files\counters.dat mssecsvc.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\WINDOWS\mssecsvc.exe rundll32.exe File created C:\WINDOWS\tasksche.exe mssecsvc.exe -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mssecsvc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mssecsvc.exe -
Modifies data under HKEY_USERS 24 IoCs
description ioc Process Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{42B21C9F-19A9-428F-8161-A7E3744F218E}\WpadDecisionReason = "1" mssecsvc.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\72-18-c8-2e-b8-34 mssecsvc.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections mssecsvc.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\SavedLegacySettings = 4600000002000000090000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 mssecsvc.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ mssecsvc.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{42B21C9F-19A9-428F-8161-A7E3744F218E} mssecsvc.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{42B21C9F-19A9-428F-8161-A7E3744F218E}\72-18-c8-2e-b8-34 mssecsvc.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ProxyEnable = "0" mssecsvc.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\AutoDetect = "1" mssecsvc.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad mssecsvc.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{42B21C9F-19A9-428F-8161-A7E3744F218E}\WpadNetworkName = "Network 3" mssecsvc.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\72-18-c8-2e-b8-34\WpadDecisionTime = 60b44a5d3112db01 mssecsvc.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\72-18-c8-2e-b8-34\WpadDecision = "0" mssecsvc.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings mssecsvc.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\DefaultConnectionSettings = 4600000002000000090000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 mssecsvc.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\History\CachePrefix = "Visited:" mssecsvc.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{42B21C9F-19A9-428F-8161-A7E3744F218E}\WpadDecisionTime = 60b44a5d3112db01 mssecsvc.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\DefaultConnectionSettings = 4600000003000000090000000000000000000000000000000400000000000000000000000000000000000000000000000000000001000000020000000a7f00dd000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 mssecsvc.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{42B21C9F-19A9-428F-8161-A7E3744F218E}\WpadDecision = "0" mssecsvc.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\72-18-c8-2e-b8-34\WpadDecisionReason = "1" mssecsvc.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings mssecsvc.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\UNCAsIntranet = "0" mssecsvc.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Content\CachePrefix mssecsvc.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Cookies\CachePrefix = "Cookie:" mssecsvc.exe -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 1632 wrote to memory of 1872 1632 rundll32.exe 28 PID 1632 wrote to memory of 1872 1632 rundll32.exe 28 PID 1632 wrote to memory of 1872 1632 rundll32.exe 28 PID 1632 wrote to memory of 1872 1632 rundll32.exe 28 PID 1632 wrote to memory of 1872 1632 rundll32.exe 28 PID 1632 wrote to memory of 1872 1632 rundll32.exe 28 PID 1632 wrote to memory of 1872 1632 rundll32.exe 28 PID 1872 wrote to memory of 2848 1872 rundll32.exe 29 PID 1872 wrote to memory of 2848 1872 rundll32.exe 29 PID 1872 wrote to memory of 2848 1872 rundll32.exe 29 PID 1872 wrote to memory of 2848 1872 rundll32.exe 29
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\fde4cd87fefc2f7c7c9bb3de815d34aa_JaffaCakes118.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1632 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\fde4cd87fefc2f7c7c9bb3de815d34aa_JaffaCakes118.dll,#12⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1872 -
C:\WINDOWS\mssecsvc.exeC:\WINDOWS\mssecsvc.exe3⤵
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:2848 -
C:\WINDOWS\tasksche.exeC:\WINDOWS\tasksche.exe /i4⤵
- Executes dropped EXE
PID:2520
-
-
-
-
C:\WINDOWS\mssecsvc.exeC:\WINDOWS\mssecsvc.exe -m security1⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies data under HKEY_USERS
PID:1896
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3.6MB
MD5556803ff2c89eb4954ddba4f62d93baf
SHA1458044060d035b25c51bea4a9abfde21b77da4e2
SHA256fcb9fc855e483f404c2386bcebe5c1a48e705fe5a85a750b716c95aea682ed85
SHA512db1e74b4ce14a98c80919673a96505fdc2e90f36f974251c3e1675438a14994c7ae057fc92af3ee0638d5fade91334d20aaa6ab5742fe4319a3f98a9cdd45494
-
Filesize
3.4MB
MD57258b2886f930f6010ef7aa3e67a671b
SHA1e21a6b4767ca5d55dc638724c88ba68c51522a17
SHA256432b7984e7607980a4054d1f9d29a21cdfa855fc2ac346625f309f2f2a592518
SHA512f0b8bfd1416d3153a42fc74002a025874e0c2623da70361dd53b0466ba8986572bb53210cbfe435bd599d9ac2fd606871dd8d29bd8416716d509765715f8c5d6