Analysis
-
max time kernel
150s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
29-09-2024 15:23
Static task
static1
Behavioral task
behavioral1
Sample
fecedeedc700847c52753f372c6b6357_JaffaCakes118.dll
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
fecedeedc700847c52753f372c6b6357_JaffaCakes118.dll
Resource
win10v2004-20240802-en
General
-
Target
fecedeedc700847c52753f372c6b6357_JaffaCakes118.dll
-
Size
5.0MB
-
MD5
fecedeedc700847c52753f372c6b6357
-
SHA1
23d16ed7723dcdc9a858bcb5171c9793150b5c03
-
SHA256
84855a4c23222f861135a3b0be879a573cb91ec7827a7fa6d119f38c43b3730b
-
SHA512
b2caf9e615aecba44c684d6207048e251e8c78da8243c06942a183418da57351d2b7c643ba2fedabbf941dadbf5cdf8696f72cf5cd93f77719b44efa771389e1
-
SSDEEP
49152:SnAQqMSPbcBVQej/1INRx+TSqTdX1HkQo6SAA:+DqPoBhz1aRxcSUDk36SA
Malware Config
Signatures
-
Wannacry
WannaCry is a ransomware cryptoworm.
-
Contacts a large (3347) amount of remote hosts 1 TTPs
This may indicate a network scan to discover remotely running services.
-
Executes dropped EXE 3 IoCs
pid Process 2360 mssecsvc.exe 3188 mssecsvc.exe 2660 tasksche.exe -
Creates a large amount of network flows 1 TTPs
This may indicate a network scan to discover remotely running services.
-
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\WINDOWS\tasksche.exe mssecsvc.exe File created C:\WINDOWS\mssecsvc.exe rundll32.exe -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mssecsvc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mssecsvc.exe -
Modifies data under HKEY_USERS 5 IoCs
description ioc Process Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ mssecsvc.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ProxyBypass = "1" mssecsvc.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\IntranetName = "1" mssecsvc.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\UNCAsIntranet = "1" mssecsvc.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\AutoDetect = "0" mssecsvc.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 1792 wrote to memory of 4424 1792 rundll32.exe 82 PID 1792 wrote to memory of 4424 1792 rundll32.exe 82 PID 1792 wrote to memory of 4424 1792 rundll32.exe 82 PID 4424 wrote to memory of 2360 4424 rundll32.exe 83 PID 4424 wrote to memory of 2360 4424 rundll32.exe 83 PID 4424 wrote to memory of 2360 4424 rundll32.exe 83
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\fecedeedc700847c52753f372c6b6357_JaffaCakes118.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1792 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\fecedeedc700847c52753f372c6b6357_JaffaCakes118.dll,#12⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4424 -
C:\WINDOWS\mssecsvc.exeC:\WINDOWS\mssecsvc.exe3⤵
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:2360 -
C:\WINDOWS\tasksche.exeC:\WINDOWS\tasksche.exe /i4⤵
- Executes dropped EXE
PID:2660
-
-
-
-
C:\WINDOWS\mssecsvc.exeC:\WINDOWS\mssecsvc.exe -m security1⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Modifies data under HKEY_USERS
PID:3188
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3.6MB
MD5dc2b74dbafe163c2ed412eae6ec728e4
SHA147679695be93b5ab13ba2b55e20ae4b386941f60
SHA256ec388367fe497f2bce224fd82835817342afe567852acd7e75d8e339b65b4ed6
SHA5127cc2bfaa0663387dd06f74afea54c898d11b0cfa26ba2ca70c9864f23ce0df0683ddb8cada6d5802edb16fae7d586a26d544bacd2aab8622bce7936f235d022d
-
Filesize
3.4MB
MD5cc1d8f689465d8dc8b80caee4b87719f
SHA14c1f41519e74b06bd04e76d1e938656049a25a8c
SHA256c3f41bb4eb5e136359c396296f2c44893107780fc269100ea9e9fbb5848d3d95
SHA512e70ccd8776a65adeea90c682a44a185ad4b65f53d6cd9eb5646f1452754ffbf92f44408f725848e03e7eeb8295f7a6c884792422f0a66c0170dd8f8e1d6ec64d