Analysis

  • max time kernel
    92s
  • max time network
    94s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240226-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system
  • submitted
    29/03/2024, 10:45

General

  • Target

    1ffbc834f4fa6e7b67431715665caaa6_JaffaCakes118.exe

  • Size

    60KB

  • MD5

    1ffbc834f4fa6e7b67431715665caaa6

  • SHA1

    ee2ec528b9bc60e7e45eee87fc1b71bdae899fe9

  • SHA256

    bc30f5d97dab7340562c99beb25245cf90595d52c3bb6c7ca32c10b39b3468d3

  • SHA512

    670c1af43fd8ae7026282e1c5c60a569401d7432a008cf9f90747eb8e011e3ecbb4aad9f7f301836176a8367fa9955a999e423e82573930afc8bbade61651de9

  • SSDEEP

    768:n5mhew0GpSyMe6hwUkdwJzh+qciaQRENEzxZbARtR06g2wqp4YPeznellmqGwxPE:nK0GjMeQG3iaQREuVZ6ro29p4YxbKdnn

Score
10/10

Malware Config

Extracted

Family

urelas

C2

218.54.47.76

218.54.47.77

218.54.47.74

Signatures

  • Urelas

    Urelas is a trojan targeting card games.

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\1ffbc834f4fa6e7b67431715665caaa6_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\1ffbc834f4fa6e7b67431715665caaa6_JaffaCakes118.exe"
    1⤵
    • Checks computer location settings
    • Suspicious use of WriteProcessMemory
    PID:2700
    • C:\Users\Admin\AppData\Local\Temp\biudfw.exe
      "C:\Users\Admin\AppData\Local\Temp\biudfw.exe"
      2⤵
      • Executes dropped EXE
      PID:3372
    • C:\Windows\SysWOW64\cmd.exe
      C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\sanfdr.bat" "
      2⤵
        PID:3828

    Network

          MITRE ATT&CK Enterprise v15

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • C:\Users\Admin\AppData\Local\Temp\biudfw.exe

            Filesize

            60KB

            MD5

            c975007f2115ce8cc01803603f4b9fc7

            SHA1

            b86f7e73c6814c9fe87dedac143c8151a974bdc1

            SHA256

            37fde4d6e011a768b4a4f14ca5a6df881e5ff3a29abdcc27b72fe0584af7e33c

            SHA512

            28a30d2d2ed63a741f5ea003d9eb4292e738dd09d35aa5c6103ef35e2dd1feadeaee72211d1f3abdf55afb723b6510440c524ba57e883b2269875ee612b15084

          • C:\Users\Admin\AppData\Local\Temp\golfinfo.ini

            Filesize

            512B

            MD5

            55e10a9af74d3f3fa5ae3cb7ff5ad9d4

            SHA1

            449221fd8d7196a54de2bd583625d8d1b64db56a

            SHA256

            a945a44cfe50423c01f26a16445ed177a347052e791364a9cb7de6bcaa18f3c1

            SHA512

            4af5ba74467b4c61302ea9571f19346c05f911843f2c6153fcd9a7340f9bc6e1f8867cdb72ec7ba0dc4930199aa5c302711ad5da9fd35241839418f6e70a515a

          • C:\Users\Admin\AppData\Local\Temp\sanfdr.bat

            Filesize

            302B

            MD5

            125e50ac0f9c0efa88381f2867a95d69

            SHA1

            5857bd74837ac898883e77222f8cdc0f98bd4033

            SHA256

            53b91439de26ba00fea29150ebc0eb2d5d2d0799b529a8a6fa0e847cc05a10dc

            SHA512

            b49360aae8e007addf3a6b0534ff319b7e4730018c89e139a9ba8c73b0220556d9c76bab0387fa5cebb637d19bf0a9173a47b217a6a53cb11b2b14bac4b12e43

          • memory/2700-0-0x00000000000D0000-0x0000000000105000-memory.dmp

            Filesize

            212KB

          • memory/2700-14-0x00000000000D0000-0x0000000000105000-memory.dmp

            Filesize

            212KB

          • memory/3372-12-0x0000000000CD0000-0x0000000000D05000-memory.dmp

            Filesize

            212KB

          • memory/3372-17-0x0000000000CD0000-0x0000000000D05000-memory.dmp

            Filesize

            212KB

          • memory/3372-19-0x0000000000CD0000-0x0000000000D05000-memory.dmp

            Filesize

            212KB

          • memory/3372-25-0x0000000000CD0000-0x0000000000D05000-memory.dmp

            Filesize

            212KB