Analysis
-
max time kernel
150s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
29-09-2024 05:35
Static task
static1
Behavioral task
behavioral1
Sample
fde4cd87fefc2f7c7c9bb3de815d34aa_JaffaCakes118.dll
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
fde4cd87fefc2f7c7c9bb3de815d34aa_JaffaCakes118.dll
Resource
win10v2004-20240802-en
General
-
Target
fde4cd87fefc2f7c7c9bb3de815d34aa_JaffaCakes118.dll
-
Size
5.0MB
-
MD5
fde4cd87fefc2f7c7c9bb3de815d34aa
-
SHA1
794c19b000e8fef33bcfa1558aa6807d6e544b56
-
SHA256
05eb6f2b91bc1c30f75d869bf7ebd14331d68216d14d278d663a1587d8ee9c49
-
SHA512
74901cc8ac44730caa4364d93266205e960641b4298e6d258ee61082e31ebc5f32e7b91377f6e928aa030cf9b03ff0ab3c80dbe449bef1df72531b1b24c7fe46
-
SSDEEP
49152:SnAQqMSPbcBVQej/1INRAqxJM0H9PAMEcaEau3R8yAH1plAH:+DqPoBhz1aRAqxWa9P593R8yAVp2H
Malware Config
Signatures
-
Wannacry
WannaCry is a ransomware cryptoworm.
-
Contacts a large (3303) amount of remote hosts 1 TTPs
This may indicate a network scan to discover remotely running services.
-
Executes dropped EXE 3 IoCs
pid Process 2340 mssecsvc.exe 4512 mssecsvc.exe 1580 tasksche.exe -
Creates a large amount of network flows 1 TTPs
This may indicate a network scan to discover remotely running services.
-
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\WINDOWS\tasksche.exe mssecsvc.exe File created C:\WINDOWS\mssecsvc.exe rundll32.exe -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mssecsvc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mssecsvc.exe -
Modifies data under HKEY_USERS 5 IoCs
description ioc Process Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\UNCAsIntranet = "1" mssecsvc.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\AutoDetect = "0" mssecsvc.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ mssecsvc.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ProxyBypass = "1" mssecsvc.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\IntranetName = "1" mssecsvc.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 4432 wrote to memory of 2212 4432 rundll32.exe 82 PID 4432 wrote to memory of 2212 4432 rundll32.exe 82 PID 4432 wrote to memory of 2212 4432 rundll32.exe 82 PID 2212 wrote to memory of 2340 2212 rundll32.exe 83 PID 2212 wrote to memory of 2340 2212 rundll32.exe 83 PID 2212 wrote to memory of 2340 2212 rundll32.exe 83
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\fde4cd87fefc2f7c7c9bb3de815d34aa_JaffaCakes118.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:4432 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\fde4cd87fefc2f7c7c9bb3de815d34aa_JaffaCakes118.dll,#12⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2212 -
C:\WINDOWS\mssecsvc.exeC:\WINDOWS\mssecsvc.exe3⤵
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:2340 -
C:\WINDOWS\tasksche.exeC:\WINDOWS\tasksche.exe /i4⤵
- Executes dropped EXE
PID:1580
-
-
-
-
C:\WINDOWS\mssecsvc.exeC:\WINDOWS\mssecsvc.exe -m security1⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Modifies data under HKEY_USERS
PID:4512
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3.6MB
MD5556803ff2c89eb4954ddba4f62d93baf
SHA1458044060d035b25c51bea4a9abfde21b77da4e2
SHA256fcb9fc855e483f404c2386bcebe5c1a48e705fe5a85a750b716c95aea682ed85
SHA512db1e74b4ce14a98c80919673a96505fdc2e90f36f974251c3e1675438a14994c7ae057fc92af3ee0638d5fade91334d20aaa6ab5742fe4319a3f98a9cdd45494
-
Filesize
3.4MB
MD57258b2886f930f6010ef7aa3e67a671b
SHA1e21a6b4767ca5d55dc638724c88ba68c51522a17
SHA256432b7984e7607980a4054d1f9d29a21cdfa855fc2ac346625f309f2f2a592518
SHA512f0b8bfd1416d3153a42fc74002a025874e0c2623da70361dd53b0466ba8986572bb53210cbfe435bd599d9ac2fd606871dd8d29bd8416716d509765715f8c5d6