Analysis

  • max time kernel
    152s
  • max time network
    152s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240226-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system
  • submitted
    28-03-2024 12:18

General

  • Target

    0567ceaa15b58ac8282039830669c131_JaffaCakes118.exe

  • Size

    783KB

  • MD5

    0567ceaa15b58ac8282039830669c131

  • SHA1

    80178812314de1ca3d4fc6f94343a70de45407a1

  • SHA256

    3e565dd4814f427642ade68f4fea3b82790d45174355099994c419b87d2ee464

  • SHA512

    b67fd02ec50f53c92328d5c99cc289b07dd75b03b4608ccb3eab036013409cdde3ee68832f8a07fffa534a3b1505e2f4c40ad145dec14e06da5f816762676b3c

  • SSDEEP

    12288:YOlx4kk9HKda4YfM/1T3PPSnPI2VAWNDTJHq9DIMTW8c1O:YA4Ya1fQzPPSnPFqWtTJK9DIMTW8T

Score
10/10

Malware Config

Extracted

Family

urelas

C2

1.234.83.146

133.242.129.155

218.54.31.226

218.54.31.165

Signatures

  • Urelas

    Urelas is a trojan targeting card games.

  • Checks computer location settings 2 TTPs 2 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 9 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\0567ceaa15b58ac8282039830669c131_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\0567ceaa15b58ac8282039830669c131_JaffaCakes118.exe"
    1⤵
    • Checks computer location settings
    • Suspicious use of WriteProcessMemory
    PID:5108
    • C:\Users\Admin\AppData\Local\Temp\ezruq.exe
      "C:\Users\Admin\AppData\Local\Temp\ezruq.exe"
      2⤵
      • Checks computer location settings
      • Executes dropped EXE
      • Suspicious use of WriteProcessMemory
      PID:4956
      • C:\Users\Admin\AppData\Local\Temp\mugob.exe
        "C:\Users\Admin\AppData\Local\Temp\mugob.exe"
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:4748
    • C:\Windows\SysWOW64\cmd.exe
      C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\_uinsey.bat" "
      2⤵
        PID:2472

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\_uinsey.bat

      Filesize

      304B

      MD5

      304e258c63cbb2ded8cf7cac8eacfb14

      SHA1

      c769059fc23b7de60aa9b97b823673cebf016141

      SHA256

      4d1c5f82f7b3c543f3fae39d4078352a67fbfea01c0417ed1a954bd069d7db05

      SHA512

      ec6b1b7b909f8d3833de5c807d24b8974bcb3c10fa1ba032d4390cf60effbb791994f05dcf363694b0093ecfd6fac52561b426f4292f125ff6e9982ab549eb99

    • C:\Users\Admin\AppData\Local\Temp\ezruq.exe

      Filesize

      783KB

      MD5

      25ea2d41958a7a7cedcdcc3f37e39609

      SHA1

      948f4bd3bd828b57ad21374fabe4b4d8454034e7

      SHA256

      a975e63714df5d19db97a6139a6bf5d142e29eef08398e40b554b3ed3754c737

      SHA512

      40d9e25ef7696810d0a364893e0ee1151a9d4ea75fe2bc3627f1afe2104d057edb12598b570629193ee09896463a947e931960d0eaf5465218acbaff74b91472

    • C:\Users\Admin\AppData\Local\Temp\golfinfo.ini

      Filesize

      512B

      MD5

      12ac2e0689b58c713eeb4f23ccfc5695

      SHA1

      ea3c01e7c48e735bb2ab2198ccd8195683ac91ad

      SHA256

      294819f8d56b92d08da4c244bb67b5c2354f8a7666d158862c6a0ac7a9f7a40d

      SHA512

      51d042ff43e2794d32aad566cac0d66c46132d0aebfbc4962e0079014d2d4537a562e3743bb252ea8cfd8791ff404224db598ba4459d78edc842faeb81db14eb

    • C:\Users\Admin\AppData\Local\Temp\mugob.exe

      Filesize

      156KB

      MD5

      c1f8897c7c50ee33c7aeef7a3f242155

      SHA1

      4867a1c7c833afca3f1b1565c3078de012fd3168

      SHA256

      5f863b7143a8ea9bcdd01460ff70ff94092b945c44335b5aadcdf4189749cad7

      SHA512

      176b0712d122c21d6406fd1776f11b2b31a17ac513065e83f683e00ffe9209c57c7e4f51f981bfacffc3531f75f745bf598a7f2d8efc4ca62f7a809e9655c45a

    • memory/4748-31-0x0000000000400000-0x000000000048F000-memory.dmp

      Filesize

      572KB

    • memory/4748-26-0x00000000005B0000-0x00000000005B2000-memory.dmp

      Filesize

      8KB

    • memory/4748-28-0x0000000000400000-0x000000000048F000-memory.dmp

      Filesize

      572KB

    • memory/4748-30-0x0000000000400000-0x000000000048F000-memory.dmp

      Filesize

      572KB

    • memory/4748-32-0x00000000005B0000-0x00000000005B2000-memory.dmp

      Filesize

      8KB

    • memory/4748-33-0x0000000000400000-0x000000000048F000-memory.dmp

      Filesize

      572KB

    • memory/4748-34-0x0000000000400000-0x000000000048F000-memory.dmp

      Filesize

      572KB

    • memory/4748-35-0x0000000000400000-0x000000000048F000-memory.dmp

      Filesize

      572KB

    • memory/4956-17-0x0000000000B30000-0x0000000000BF9000-memory.dmp

      Filesize

      804KB

    • memory/4956-12-0x0000000000B30000-0x0000000000BF9000-memory.dmp

      Filesize

      804KB

    • memory/4956-27-0x0000000000B30000-0x0000000000BF9000-memory.dmp

      Filesize

      804KB

    • memory/5108-14-0x0000000000750000-0x0000000000819000-memory.dmp

      Filesize

      804KB

    • memory/5108-0-0x0000000000750000-0x0000000000819000-memory.dmp

      Filesize

      804KB