Analysis

  • max time kernel
    149s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240412-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240412-enlocale:en-usos:windows10-2004-x64system
  • submitted
    21-04-2024 14:51

General

  • Target

    ff87d3344db8278ea877e9e5a3288fab_JaffaCakes118.exe

  • Size

    411KB

  • MD5

    ff87d3344db8278ea877e9e5a3288fab

  • SHA1

    107f1e16d3a320332df626182d090740d3a5d2fc

  • SHA256

    3440b1488ab8f40d03f054481b4e7dde3dc9f5a6794b233b83339b4527d23256

  • SHA512

    ed064abd7988248858f23ac078f118835e61a37e62e6934873249d3d75884ebed3b108609d319d62d271aa053f52a79ea02e403216b76d45b7e67cbf283e9b6a

  • SSDEEP

    6144:kzU7blKaP2iCWhWapKRaRXOkN4Swel6f3IsInOYKa:eU7M5ijWh0XOW4sEfeOY

Score
10/10

Malware Config

Extracted

Family

urelas

C2

218.54.31.226

218.54.31.165

Signatures

  • Urelas

    Urelas is a trojan targeting card games.

  • ASPack v2.12-2.42 1 IoCs

    Detects executables packed with ASPack v2.12-2.42

  • Checks computer location settings 2 TTPs 2 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of WriteProcessMemory 9 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\ff87d3344db8278ea877e9e5a3288fab_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\ff87d3344db8278ea877e9e5a3288fab_JaffaCakes118.exe"
    1⤵
    • Checks computer location settings
    • Suspicious use of WriteProcessMemory
    PID:4272
    • C:\Users\Admin\AppData\Local\Temp\wonei.exe
      "C:\Users\Admin\AppData\Local\Temp\wonei.exe"
      2⤵
      • Checks computer location settings
      • Executes dropped EXE
      • Suspicious use of WriteProcessMemory
      PID:1076
      • C:\Users\Admin\AppData\Local\Temp\atvuv.exe
        "C:\Users\Admin\AppData\Local\Temp\atvuv.exe"
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        PID:4288
    • C:\Windows\SysWOW64\cmd.exe
      C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\_uinsey.bat" "
      2⤵
        PID:696

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\_uinsey.bat

      Filesize

      304B

      MD5

      58ad4ac27a48257005b263527a5e0d52

      SHA1

      7670701f29abd03e94f5af95a419aeea3c8a2566

      SHA256

      e05ebb0edc79beb3d8b26b65b8c14037703c78bbd4fd8b5c7c85bfec00a466b4

      SHA512

      32e2604ea6198c668c82f1499cca94f9721dfe784318b1d5ad886e9a7733bebb30b7b81dc76f882f13c31e1367e7f331c8467e40b096b2b3188b41ad5f274439

    • C:\Users\Admin\AppData\Local\Temp\atvuv.exe

      Filesize

      212KB

      MD5

      10ec3b4141b16d3948ba624b82bf430a

      SHA1

      0bbce44c37c73e00627119b45cbd5aaa9d7e14aa

      SHA256

      325e15f000222e97909f1c17a534970678b956ba133eb2f6019f187da7c911d7

      SHA512

      43583427aee934f8a06476e7988dc1f4a8cacc4b0aa2549e0b7ea9ec47ba0244d3f85bbe70f04d6ef56ad66370ab98dbd97a46858ab1a6617aaff7acff9b490d

    • C:\Users\Admin\AppData\Local\Temp\golfinfo.ini

      Filesize

      512B

      MD5

      667925c5945dba7063a4b40ac877048a

      SHA1

      952f9d8fa66fd542a80fc82ed78cf5d1a64968b1

      SHA256

      866cd61eb01112e9e41cb2da9b6448673df940597dd83d66dfcb9ddd7dc9f14a

      SHA512

      fd4eaf0342586b616fb47bd1801054fd3d922afb7a82ac12b4a488a60ad6bc4895357ef1eb3d8a2fc270dc24cbaf9d8b6b245a81be3612ee8e7df6ebb4955b18

    • C:\Users\Admin\AppData\Local\Temp\wonei.exe

      Filesize

      411KB

      MD5

      db317ac9402f9322c74272361d04e939

      SHA1

      3ab4b80abcf078ca3f20dcc2512afc7cbe4cd742

      SHA256

      8c62440151ab6e1008fc02d31a01416dd4e0c23a65907990e8edad723d2153d4

      SHA512

      aa72456ee5b88e71ed285215dae74c751f5a3d9bbf5d627d00ebd89cb4fff63b3d9c4245fe7c1cf71f437888aa415058503a5bb601a88d386336a8070ea5bc47

    • memory/1076-25-0x0000000000400000-0x0000000000465000-memory.dmp

      Filesize

      404KB

    • memory/4272-13-0x0000000000400000-0x0000000000465000-memory.dmp

      Filesize

      404KB

    • memory/4272-0-0x0000000000400000-0x0000000000465000-memory.dmp

      Filesize

      404KB

    • memory/4288-26-0x00000000001D0000-0x0000000000264000-memory.dmp

      Filesize

      592KB

    • memory/4288-27-0x00000000001D0000-0x0000000000264000-memory.dmp

      Filesize

      592KB

    • memory/4288-28-0x00000000001D0000-0x0000000000264000-memory.dmp

      Filesize

      592KB

    • memory/4288-30-0x00000000001D0000-0x0000000000264000-memory.dmp

      Filesize

      592KB

    • memory/4288-31-0x00000000001D0000-0x0000000000264000-memory.dmp

      Filesize

      592KB

    • memory/4288-32-0x00000000001D0000-0x0000000000264000-memory.dmp

      Filesize

      592KB

    • memory/4288-33-0x00000000001D0000-0x0000000000264000-memory.dmp

      Filesize

      592KB

    • memory/4288-34-0x00000000001D0000-0x0000000000264000-memory.dmp

      Filesize

      592KB