Analysis
-
max time kernel
150s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
29-09-2024 19:14
Static task
static1
Behavioral task
behavioral1
Sample
ff334977f091f279eb668bb007dc9edd_JaffaCakes118.dll
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
ff334977f091f279eb668bb007dc9edd_JaffaCakes118.dll
Resource
win10v2004-20240802-en
General
-
Target
ff334977f091f279eb668bb007dc9edd_JaffaCakes118.dll
-
Size
5.0MB
-
MD5
ff334977f091f279eb668bb007dc9edd
-
SHA1
07e12334f1c21f772aecca0454168a4f2c625f57
-
SHA256
8c1be674164a3e956a5732112040e5ec564e17f9616902cfa712d1a20c0e6c62
-
SHA512
e54e34beee3da4f736b08b7ceed99fed317d2ef34bcf2e6f5e6d5607b7f460cb5b9d16c7eddcccd16b3eaa2501a44708883d66a8b8c1ddd1b5cef1e16bd10a33
-
SSDEEP
49152:SnAQqMSPbcBVQej/1INRx+TSqTdOxJM0H9PAMEcaEau3R8yAHw:+DqPoBhz1aRxcSUwxWa9P593R8yA
Malware Config
Signatures
-
Wannacry
WannaCry is a ransomware cryptoworm.
-
Contacts a large (3208) amount of remote hosts 1 TTPs
This may indicate a network scan to discover remotely running services.
-
Executes dropped EXE 3 IoCs
pid Process 5016 mssecsvc.exe 5092 mssecsvc.exe 1428 tasksche.exe -
Creates a large amount of network flows 1 TTPs
This may indicate a network scan to discover remotely running services.
-
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\WINDOWS\mssecsvc.exe rundll32.exe File created C:\WINDOWS\tasksche.exe mssecsvc.exe -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mssecsvc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mssecsvc.exe -
Modifies data under HKEY_USERS 5 IoCs
description ioc Process Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ProxyBypass = "1" mssecsvc.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\IntranetName = "1" mssecsvc.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\UNCAsIntranet = "1" mssecsvc.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\AutoDetect = "0" mssecsvc.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ mssecsvc.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 4112 wrote to memory of 4928 4112 rundll32.exe 82 PID 4112 wrote to memory of 4928 4112 rundll32.exe 82 PID 4112 wrote to memory of 4928 4112 rundll32.exe 82 PID 4928 wrote to memory of 5016 4928 rundll32.exe 83 PID 4928 wrote to memory of 5016 4928 rundll32.exe 83 PID 4928 wrote to memory of 5016 4928 rundll32.exe 83
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\ff334977f091f279eb668bb007dc9edd_JaffaCakes118.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:4112 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\ff334977f091f279eb668bb007dc9edd_JaffaCakes118.dll,#12⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4928 -
C:\WINDOWS\mssecsvc.exeC:\WINDOWS\mssecsvc.exe3⤵
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:5016 -
C:\WINDOWS\tasksche.exeC:\WINDOWS\tasksche.exe /i4⤵
- Executes dropped EXE
PID:1428
-
-
-
-
C:\WINDOWS\mssecsvc.exeC:\WINDOWS\mssecsvc.exe -m security1⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Modifies data under HKEY_USERS
PID:5092
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3.6MB
MD50ea6bd08158b898afd8a9327a442281d
SHA13b56b4b32f9bb5e855b3e8c2acea5b048a9cf6c4
SHA256d238cd3be8b85707276937a53db00dfa2662ade95e7311aaf41a8a6c0ffa1215
SHA51293bbb6725f778bfc712267cde195dbf04492e2a4f78c5b8fa529ae09ecf2c2eab52b32de386920e9dfa40b9482388332510bc75a09c1e8c215b9e6ecde28c9d5
-
Filesize
3.4MB
MD5a57f7967e6bc1941828aae58b2f7aa56
SHA12bfb7578ee1b7e52dd8b2ee646aac42ed1bb028a
SHA256292a77c0b7b31161f98447141447a4063aaaa02aaac48f98f31570e43fe1c06d
SHA51221f81d3a70bbf3fbbe055a34875c5a7e64cf2ff4ba836449e9165a52933083d33be204d0169f86ca6baa306b87204650857b989434112d197692ff085c1633ae