Analysis
-
max time kernel
150s -
max time network
150s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
29-09-2024 14:03
Static task
static1
Behavioral task
behavioral1
Sample
feaea5e8329e4ebfb00d1a6283c88a95_JaffaCakes118.dll
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
feaea5e8329e4ebfb00d1a6283c88a95_JaffaCakes118.dll
Resource
win10v2004-20240802-en
General
-
Target
feaea5e8329e4ebfb00d1a6283c88a95_JaffaCakes118.dll
-
Size
5.0MB
-
MD5
feaea5e8329e4ebfb00d1a6283c88a95
-
SHA1
e310aa2bb7bf6bd617156eb14d03821025f01cf9
-
SHA256
4fa0360132c3f72a352951c33b7e05ee8ce3d60091659484843a3b198b6ac98a
-
SHA512
6dab17d7c6f9df2bea93db01f883e3a236ccc12c649713d04ee4c721ba8f6993bc09f64c7bfa17e6a932546677edfea3b3a203b2fdc0da21d9e450f06745d1d2
-
SSDEEP
98304:+DqPoBhz1aRxcSUDk36SAEdhvxWa94593X8yAVp2H:+DqPe1Cxcxk3ZAEUaazX8yc4H
Malware Config
Signatures
-
Wannacry
WannaCry is a ransomware cryptoworm.
-
Contacts a large (3219) amount of remote hosts 1 TTPs
This may indicate a network scan to discover remotely running services.
-
Executes dropped EXE 3 IoCs
pid Process 1700 mssecsvc.exe 2332 mssecsvc.exe 2832 tasksche.exe -
Creates a large amount of network flows 1 TTPs
This may indicate a network scan to discover remotely running services.
-
Drops file in System32 directory 1 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\Temporary Internet Files\counters.dat mssecsvc.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\WINDOWS\tasksche.exe mssecsvc.exe File created C:\WINDOWS\mssecsvc.exe rundll32.exe -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mssecsvc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mssecsvc.exe -
Modifies data under HKEY_USERS 24 IoCs
description ioc Process Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\DefaultConnectionSettings = 4600000002000000090000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 mssecsvc.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\26-12-8c-5a-aa-fa\WpadDecision = "0" mssecsvc.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\History\CachePrefix = "Visited:" mssecsvc.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\DefaultConnectionSettings = 4600000003000000090000000000000000000000000000000400000000000000000000000000000000000000000000000000000001000000020000000a7f00d1000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 mssecsvc.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{2121EB99-AE63-435B-B281-24205EBCCF00}\WpadDecisionReason = "1" mssecsvc.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{2121EB99-AE63-435B-B281-24205EBCCF00}\WpadDecision = "0" mssecsvc.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings mssecsvc.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ProxyEnable = "0" mssecsvc.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ mssecsvc.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Content\CachePrefix mssecsvc.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\26-12-8c-5a-aa-fa mssecsvc.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\26-12-8c-5a-aa-fa\WpadDecisionReason = "1" mssecsvc.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{2121EB99-AE63-435B-B281-24205EBCCF00}\WpadDecisionTime = d06b9e727812db01 mssecsvc.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{2121EB99-AE63-435B-B281-24205EBCCF00}\26-12-8c-5a-aa-fa mssecsvc.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings mssecsvc.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\SavedLegacySettings = 4600000002000000090000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 mssecsvc.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\AutoDetect = "1" mssecsvc.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Cookies\CachePrefix = "Cookie:" mssecsvc.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{2121EB99-AE63-435B-B281-24205EBCCF00}\WpadNetworkName = "Network 3" mssecsvc.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\26-12-8c-5a-aa-fa\WpadDecisionTime = d06b9e727812db01 mssecsvc.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections mssecsvc.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\UNCAsIntranet = "0" mssecsvc.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad mssecsvc.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{2121EB99-AE63-435B-B281-24205EBCCF00} mssecsvc.exe -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 1036 wrote to memory of 1704 1036 rundll32.exe 30 PID 1036 wrote to memory of 1704 1036 rundll32.exe 30 PID 1036 wrote to memory of 1704 1036 rundll32.exe 30 PID 1036 wrote to memory of 1704 1036 rundll32.exe 30 PID 1036 wrote to memory of 1704 1036 rundll32.exe 30 PID 1036 wrote to memory of 1704 1036 rundll32.exe 30 PID 1036 wrote to memory of 1704 1036 rundll32.exe 30 PID 1704 wrote to memory of 1700 1704 rundll32.exe 31 PID 1704 wrote to memory of 1700 1704 rundll32.exe 31 PID 1704 wrote to memory of 1700 1704 rundll32.exe 31 PID 1704 wrote to memory of 1700 1704 rundll32.exe 31
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\feaea5e8329e4ebfb00d1a6283c88a95_JaffaCakes118.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1036 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\feaea5e8329e4ebfb00d1a6283c88a95_JaffaCakes118.dll,#12⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1704 -
C:\WINDOWS\mssecsvc.exeC:\WINDOWS\mssecsvc.exe3⤵
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:1700 -
C:\WINDOWS\tasksche.exeC:\WINDOWS\tasksche.exe /i4⤵
- Executes dropped EXE
PID:2832
-
-
-
-
C:\WINDOWS\mssecsvc.exeC:\WINDOWS\mssecsvc.exe -m security1⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies data under HKEY_USERS
PID:2332
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3.6MB
MD5cf457438c3a87d9cf69694740e1f5837
SHA1e92b4a02ae9ea15c8e630a125638a5bd4ec2527d
SHA25655913f789932cb9d1d2188d916a1f8982688433ce54da71965ef6b37b802a579
SHA5121a11f434f66cf78862d7910c6d30ef477d24c6ad3e695236f3204f55d657db8b13f3ee75def6c502b19546b01c7e49a74d45fb1ffb24064c6519eb834c9be26b
-
Filesize
3.4MB
MD570e23e372b6f077d4e1e89f5c08418a6
SHA183d826f3abb42479378382e4805b8a5e42454814
SHA256bc0e6e22a794b1b500e3d5d37b7ee0c68d1844d6c9f54126336ed6af62f70260
SHA51222c7291e2742eb3d99552b62d2a08021ab9d2b08b42d52d480753ae31f25a4de91e4511e140d7e6e126ce9f4bf9fc4782933cc94aab8135c4a783937cf9a9787