Analysis
-
max time kernel
150s -
max time network
150s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
30-09-2024 00:09
Static task
static1
Behavioral task
behavioral1
Sample
ff8cca22c4705dd29bc58fa036fb992c_JaffaCakes118.dll
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
ff8cca22c4705dd29bc58fa036fb992c_JaffaCakes118.dll
Resource
win10v2004-20240802-en
General
-
Target
ff8cca22c4705dd29bc58fa036fb992c_JaffaCakes118.dll
-
Size
5.0MB
-
MD5
ff8cca22c4705dd29bc58fa036fb992c
-
SHA1
bfbb78abb21d20d48d6612287f5d7aeccdf3bce2
-
SHA256
207311091a37e677abb33085d8c1f2058a87b9b62c2a8f0559a170c8e3cabd67
-
SHA512
a101647f904f196468c23b216fc80c9b859b09c6e2927f6883eb470e3330689179b599b7c9a2e3201d70f988f52b554e03fe4977befdda7cced4ec08f826d015
-
SSDEEP
98304:TDqPoBhz1aRxcSUDk36SAmxWa9P5qAVp2B:TDqPe1Cxcxk3ZA5adYc4B
Malware Config
Signatures
-
Wannacry
WannaCry is a ransomware cryptoworm.
-
Contacts a large (3122) amount of remote hosts 1 TTPs
This may indicate a network scan to discover remotely running services.
-
Executes dropped EXE 3 IoCs
pid Process 1816 mssecsvc.exe 2124 mssecsvc.exe 2728 tasksche.exe -
Creates a large amount of network flows 1 TTPs
This may indicate a network scan to discover remotely running services.
-
Drops file in System32 directory 1 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\Temporary Internet Files\counters.dat mssecsvc.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\WINDOWS\mssecsvc.exe rundll32.exe File created C:\WINDOWS\tasksche.exe mssecsvc.exe -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mssecsvc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mssecsvc.exe -
Modifies data under HKEY_USERS 24 IoCs
description ioc Process Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\AutoDetect = "1" mssecsvc.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\History\CachePrefix = "Visited:" mssecsvc.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{5B58A9E5-6F6D-4082-BA6E-E64238A3FA17} mssecsvc.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{5B58A9E5-6F6D-4082-BA6E-E64238A3FA17}\WpadDecisionTime = 504aca10cd12db01 mssecsvc.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\ca-f9-ee-d7-09-46\WpadDecisionReason = "1" mssecsvc.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings mssecsvc.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ mssecsvc.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\UNCAsIntranet = "0" mssecsvc.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\ca-f9-ee-d7-09-46\WpadDecision = "0" mssecsvc.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{5B58A9E5-6F6D-4082-BA6E-E64238A3FA17}\WpadNetworkName = "Network 2" mssecsvc.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\ca-f9-ee-d7-09-46 mssecsvc.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{5B58A9E5-6F6D-4082-BA6E-E64238A3FA17}\ca-f9-ee-d7-09-46 mssecsvc.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Content\CachePrefix mssecsvc.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad mssecsvc.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{5B58A9E5-6F6D-4082-BA6E-E64238A3FA17}\WpadDecisionReason = "1" mssecsvc.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Cookies\CachePrefix = "Cookie:" mssecsvc.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\ca-f9-ee-d7-09-46\WpadDecisionTime = 504aca10cd12db01 mssecsvc.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections mssecsvc.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\DefaultConnectionSettings = 4600000002000000090000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 mssecsvc.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings mssecsvc.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{5B58A9E5-6F6D-4082-BA6E-E64238A3FA17}\WpadDecision = "0" mssecsvc.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ProxyEnable = "0" mssecsvc.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\SavedLegacySettings = 4600000002000000090000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 mssecsvc.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\DefaultConnectionSettings = 4600000003000000090000000000000000000000000000000400000000000000000000000000000000000000000000000000000001000000020000000a7f00ac000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 mssecsvc.exe -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 2520 wrote to memory of 1320 2520 rundll32.exe 30 PID 2520 wrote to memory of 1320 2520 rundll32.exe 30 PID 2520 wrote to memory of 1320 2520 rundll32.exe 30 PID 2520 wrote to memory of 1320 2520 rundll32.exe 30 PID 2520 wrote to memory of 1320 2520 rundll32.exe 30 PID 2520 wrote to memory of 1320 2520 rundll32.exe 30 PID 2520 wrote to memory of 1320 2520 rundll32.exe 30 PID 1320 wrote to memory of 1816 1320 rundll32.exe 31 PID 1320 wrote to memory of 1816 1320 rundll32.exe 31 PID 1320 wrote to memory of 1816 1320 rundll32.exe 31 PID 1320 wrote to memory of 1816 1320 rundll32.exe 31
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\ff8cca22c4705dd29bc58fa036fb992c_JaffaCakes118.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:2520 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\ff8cca22c4705dd29bc58fa036fb992c_JaffaCakes118.dll,#12⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1320 -
C:\WINDOWS\mssecsvc.exeC:\WINDOWS\mssecsvc.exe3⤵
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:1816 -
C:\WINDOWS\tasksche.exeC:\WINDOWS\tasksche.exe /i4⤵
- Executes dropped EXE
PID:2728
-
-
-
-
C:\WINDOWS\mssecsvc.exeC:\WINDOWS\mssecsvc.exe -m security1⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies data under HKEY_USERS
PID:2124
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3.6MB
MD571a5ae65fb56e95cc0eddb92ffa8685a
SHA15edc527213f33b8c7a064f7f677a17ce05f914eb
SHA2568ea8d1f743eb958af70a9e3c6d1127995c60af96abb8a0654647631f0fbfe7b6
SHA5128a36f7b50c0022f6a3d21a76aef53b59ed8d658dd1b6493e8f89ca04d2e1de9d7c11ad0e33d2d2a508db0cec1727875f748f1cd55081e4739a6a10f12a395201
-
Filesize
3.4MB
MD5da23d9da01ad8ee0321c2139e4b20d0e
SHA1cbed0c81bdbf0afe5ec6a657a11e1a08b82918f9
SHA256ca4e44dda3249e9fea7153a46ca34dc6dfa0f9d6b28625487cd3df94b69df016
SHA512ca41caae4fba961aa30f2d26f9e6dd775e9c79c21e0b911e27891afbb26203a5e77109ceb3b5206f4633c146f70403c1fbae3b19b7f68ecb6f35b90059c9a7a3