Analysis
-
max time kernel
147s -
max time network
150s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
20-09-2024 04:41
Static task
static1
Behavioral task
behavioral1
Sample
ecdbfa5fa4de3282c7e8d00f73617144_JaffaCakes118.exe
Resource
win7-20240903-en
General
-
Target
ecdbfa5fa4de3282c7e8d00f73617144_JaffaCakes118.exe
-
Size
156KB
-
MD5
ecdbfa5fa4de3282c7e8d00f73617144
-
SHA1
b7f428d79ffc76577a66d351631ead8fe63f73cd
-
SHA256
27d427aadee0e362b72f541f3e236b136bef133169c6d1d345f214e186ca147d
-
SHA512
c5bd8b9ecdca1c46c988678edac31f3b6ab80bd626021c0c7bfb601f1a63f294cd5da2bcf2900ba54bfc5eadce37ed02627861b3c8aace1a21aa4a51c6857027
-
SSDEEP
1536:lEW90SWuIuyvY7iIWij/vGrQzgcD0Vedw/BNugQBepnN8tquDsqFpUUlF1MGRoW6:OWGSBq6iIHiQz7AJ/OBeZiYGfFHiW6
Malware Config
Signatures
-
Drops file in System32 directory 1 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\Temporary Internet Files\counters.dat colorersame.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language colorersame.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ecdbfa5fa4de3282c7e8d00f73617144_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ecdbfa5fa4de3282c7e8d00f73617144_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language colorersame.exe -
Modifies data under HKEY_USERS 19 IoCs
description ioc Process Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{61E576E3-6DC5-44BD-8183-67D95F1A7892}\7e-f6-f7-16-96-d9 colorersame.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\7e-f6-f7-16-96-d9\WpadDecisionTime = e0412a69170bdb01 colorersame.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings colorersame.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{61E576E3-6DC5-44BD-8183-67D95F1A7892}\WpadDecisionReason = "1" colorersame.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{61E576E3-6DC5-44BD-8183-67D95F1A7892}\WpadNetworkName = "Network 3" colorersame.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections colorersame.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ProxyEnable = "0" colorersame.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{61E576E3-6DC5-44BD-8183-67D95F1A7892}\WpadDecisionTime = e0412a69170bdb01 colorersame.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\7e-f6-f7-16-96-d9\WpadDetectedUrl colorersame.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings colorersame.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\7e-f6-f7-16-96-d9 colorersame.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\7e-f6-f7-16-96-d9\WpadDecision = "0" colorersame.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\DefaultConnectionSettings = 4600000003000000090000000000000000000000000000000400000000000000000000000000000000000000000000000000000001000000020000000a7f0174000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 colorersame.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{61E576E3-6DC5-44BD-8183-67D95F1A7892} colorersame.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{61E576E3-6DC5-44BD-8183-67D95F1A7892}\WpadDecision = "0" colorersame.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\7e-f6-f7-16-96-d9\WpadDecisionReason = "1" colorersame.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\DefaultConnectionSettings = 4600000002000000090000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 colorersame.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\SavedLegacySettings = 4600000002000000090000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 colorersame.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad colorersame.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 2072 ecdbfa5fa4de3282c7e8d00f73617144_JaffaCakes118.exe 1940 ecdbfa5fa4de3282c7e8d00f73617144_JaffaCakes118.exe 2116 colorersame.exe 2112 colorersame.exe 2112 colorersame.exe 2112 colorersame.exe 2112 colorersame.exe 2112 colorersame.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 1940 ecdbfa5fa4de3282c7e8d00f73617144_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2072 wrote to memory of 1940 2072 ecdbfa5fa4de3282c7e8d00f73617144_JaffaCakes118.exe 31 PID 2072 wrote to memory of 1940 2072 ecdbfa5fa4de3282c7e8d00f73617144_JaffaCakes118.exe 31 PID 2072 wrote to memory of 1940 2072 ecdbfa5fa4de3282c7e8d00f73617144_JaffaCakes118.exe 31 PID 2072 wrote to memory of 1940 2072 ecdbfa5fa4de3282c7e8d00f73617144_JaffaCakes118.exe 31 PID 2116 wrote to memory of 2112 2116 colorersame.exe 33 PID 2116 wrote to memory of 2112 2116 colorersame.exe 33 PID 2116 wrote to memory of 2112 2116 colorersame.exe 33 PID 2116 wrote to memory of 2112 2116 colorersame.exe 33
Processes
-
C:\Users\Admin\AppData\Local\Temp\ecdbfa5fa4de3282c7e8d00f73617144_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\ecdbfa5fa4de3282c7e8d00f73617144_JaffaCakes118.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2072 -
C:\Users\Admin\AppData\Local\Temp\ecdbfa5fa4de3282c7e8d00f73617144_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\ecdbfa5fa4de3282c7e8d00f73617144_JaffaCakes118.exe"2⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: RenamesItself
PID:1940
-
-
C:\Windows\SysWOW64\colorersame.exe"C:\Windows\SysWOW64\colorersame.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2116 -
C:\Windows\SysWOW64\colorersame.exe"C:\Windows\SysWOW64\colorersame.exe"2⤵
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
PID:2112
-