Analysis
-
max time kernel
150s -
max time network
150s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
29-09-2024 19:14
Static task
static1
Behavioral task
behavioral1
Sample
ff334977f091f279eb668bb007dc9edd_JaffaCakes118.dll
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
ff334977f091f279eb668bb007dc9edd_JaffaCakes118.dll
Resource
win10v2004-20240802-en
General
-
Target
ff334977f091f279eb668bb007dc9edd_JaffaCakes118.dll
-
Size
5.0MB
-
MD5
ff334977f091f279eb668bb007dc9edd
-
SHA1
07e12334f1c21f772aecca0454168a4f2c625f57
-
SHA256
8c1be674164a3e956a5732112040e5ec564e17f9616902cfa712d1a20c0e6c62
-
SHA512
e54e34beee3da4f736b08b7ceed99fed317d2ef34bcf2e6f5e6d5607b7f460cb5b9d16c7eddcccd16b3eaa2501a44708883d66a8b8c1ddd1b5cef1e16bd10a33
-
SSDEEP
49152:SnAQqMSPbcBVQej/1INRx+TSqTdOxJM0H9PAMEcaEau3R8yAHw:+DqPoBhz1aRxcSUwxWa9P593R8yA
Malware Config
Signatures
-
Wannacry
WannaCry is a ransomware cryptoworm.
-
Contacts a large (3287) amount of remote hosts 1 TTPs
This may indicate a network scan to discover remotely running services.
-
Executes dropped EXE 3 IoCs
pid Process 3036 mssecsvc.exe 2492 mssecsvc.exe 2892 tasksche.exe -
Creates a large amount of network flows 1 TTPs
This may indicate a network scan to discover remotely running services.
-
Drops file in System32 directory 1 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\Temporary Internet Files\counters.dat mssecsvc.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\WINDOWS\tasksche.exe mssecsvc.exe File created C:\WINDOWS\mssecsvc.exe rundll32.exe -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mssecsvc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mssecsvc.exe -
Modifies data under HKEY_USERS 24 IoCs
description ioc Process Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\76-c4-75-2d-b8-0a\WpadDecisionTime = c0ebdac7a312db01 mssecsvc.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ mssecsvc.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{8F194DBF-51B2-4875-84BA-2EBA75F7862B} mssecsvc.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{8F194DBF-51B2-4875-84BA-2EBA75F7862B}\WpadDecision = "0" mssecsvc.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{8F194DBF-51B2-4875-84BA-2EBA75F7862B}\WpadNetworkName = "Network 3" mssecsvc.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\76-c4-75-2d-b8-0a\WpadDecisionReason = "1" mssecsvc.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections mssecsvc.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\DefaultConnectionSettings = 4600000002000000090000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 mssecsvc.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\History\CachePrefix = "Visited:" mssecsvc.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad mssecsvc.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\DefaultConnectionSettings = 4600000003000000090000000000000000000000000000000400000000000000000000000000000000000000000000000000000001000000020000000a7f00a9000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 mssecsvc.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{8F194DBF-51B2-4875-84BA-2EBA75F7862B}\WpadDecisionReason = "1" mssecsvc.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings mssecsvc.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\SavedLegacySettings = 4600000002000000090000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 mssecsvc.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\AutoDetect = "1" mssecsvc.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Content\CachePrefix mssecsvc.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Cookies\CachePrefix = "Cookie:" mssecsvc.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{8F194DBF-51B2-4875-84BA-2EBA75F7862B}\WpadDecisionTime = c0ebdac7a312db01 mssecsvc.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{8F194DBF-51B2-4875-84BA-2EBA75F7862B}\76-c4-75-2d-b8-0a mssecsvc.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\76-c4-75-2d-b8-0a\WpadDecision = "0" mssecsvc.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings mssecsvc.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ProxyEnable = "0" mssecsvc.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\UNCAsIntranet = "0" mssecsvc.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\76-c4-75-2d-b8-0a mssecsvc.exe -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 2904 wrote to memory of 2996 2904 rundll32.exe 30 PID 2904 wrote to memory of 2996 2904 rundll32.exe 30 PID 2904 wrote to memory of 2996 2904 rundll32.exe 30 PID 2904 wrote to memory of 2996 2904 rundll32.exe 30 PID 2904 wrote to memory of 2996 2904 rundll32.exe 30 PID 2904 wrote to memory of 2996 2904 rundll32.exe 30 PID 2904 wrote to memory of 2996 2904 rundll32.exe 30 PID 2996 wrote to memory of 3036 2996 rundll32.exe 31 PID 2996 wrote to memory of 3036 2996 rundll32.exe 31 PID 2996 wrote to memory of 3036 2996 rundll32.exe 31 PID 2996 wrote to memory of 3036 2996 rundll32.exe 31
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\ff334977f091f279eb668bb007dc9edd_JaffaCakes118.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:2904 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\ff334977f091f279eb668bb007dc9edd_JaffaCakes118.dll,#12⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2996 -
C:\WINDOWS\mssecsvc.exeC:\WINDOWS\mssecsvc.exe3⤵
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:3036 -
C:\WINDOWS\tasksche.exeC:\WINDOWS\tasksche.exe /i4⤵
- Executes dropped EXE
PID:2892
-
-
-
-
C:\WINDOWS\mssecsvc.exeC:\WINDOWS\mssecsvc.exe -m security1⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies data under HKEY_USERS
PID:2492
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3.6MB
MD50ea6bd08158b898afd8a9327a442281d
SHA13b56b4b32f9bb5e855b3e8c2acea5b048a9cf6c4
SHA256d238cd3be8b85707276937a53db00dfa2662ade95e7311aaf41a8a6c0ffa1215
SHA51293bbb6725f778bfc712267cde195dbf04492e2a4f78c5b8fa529ae09ecf2c2eab52b32de386920e9dfa40b9482388332510bc75a09c1e8c215b9e6ecde28c9d5
-
Filesize
3.4MB
MD5a57f7967e6bc1941828aae58b2f7aa56
SHA12bfb7578ee1b7e52dd8b2ee646aac42ed1bb028a
SHA256292a77c0b7b31161f98447141447a4063aaaa02aaac48f98f31570e43fe1c06d
SHA51221f81d3a70bbf3fbbe055a34875c5a7e64cf2ff4ba836449e9165a52933083d33be204d0169f86ca6baa306b87204650857b989434112d197692ff085c1633ae