Analysis

  • max time kernel
    150s
  • max time network
    128s
  • platform
    windows7_x64
  • resource
    win7-20240611-en
  • resource tags

    arch:x64arch:x86image:win7-20240611-enlocale:en-usos:windows7-x64system
  • submitted
    27-06-2024 12:22

General

  • Target

    15fdb2d27414e72354d2b61fb49f0466_JaffaCakes118.exe

  • Size

    782KB

  • MD5

    15fdb2d27414e72354d2b61fb49f0466

  • SHA1

    af2bf1ef3a845191c2aa4e153de17e7fa6d6d69f

  • SHA256

    e156158712cede8be39850d649229f37be75bc43258dffa8b3c7f7879a280750

  • SHA512

    f9d0dbc844a8650b18e9b2938cd3d0647db519ce0b09d1edba70c121f12229526da4d4ba0b560390bcc22403e31f1f9b502efbf5e8e9499fd7602639caf4ae17

  • SSDEEP

    12288:YOlx4kk9HKda4YfM/1T3PPSnPI2VAWNDTJHq9DIMTW8c1Yl:YA4Ya1fQzPPSnPFqWtTJK9DIMTW89

Score
10/10

Malware Config

Extracted

Family

urelas

C2

1.234.83.146

133.242.129.155

218.54.31.226

218.54.31.165

Signatures

  • Urelas

    Urelas is a trojan targeting card games.

  • Deletes itself 1 IoCs
  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious behavior: EnumeratesProcesses 53 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\15fdb2d27414e72354d2b61fb49f0466_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\15fdb2d27414e72354d2b61fb49f0466_JaffaCakes118.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:2204
    • C:\Users\Admin\AppData\Local\Temp\tuhui.exe
      "C:\Users\Admin\AppData\Local\Temp\tuhui.exe"
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Suspicious use of WriteProcessMemory
      PID:2556
      • C:\Users\Admin\AppData\Local\Temp\korai.exe
        "C:\Users\Admin\AppData\Local\Temp\korai.exe"
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:2884
    • C:\Windows\SysWOW64\cmd.exe
      cmd /c ""C:\Users\Admin\AppData\Local\Temp\_uinsey.bat" "
      2⤵
      • Deletes itself
      PID:2692

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\_uinsey.bat

    Filesize

    304B

    MD5

    897895f2e0175ad54a36f9c8172a58b1

    SHA1

    315d6ffac13777e442c218f2dd49c7b2c26a22e9

    SHA256

    4697fd0747aa0aee6d9943ab0dd46fb8619af82f4f6840f75e0b94818872c479

    SHA512

    ff924f4b98df86a87d2949c21e2b2c5fe5500132b8a54ccdc47db33a742b98ab97a3744368183cbb0e6dbf97bf1005dcd572220347385527be0aab3980c43028

  • C:\Users\Admin\AppData\Local\Temp\golfinfo.ini

    Filesize

    512B

    MD5

    26173a1aed61d5774ff9d83283b46c4b

    SHA1

    09f0a143e29dfc431c0bb3d9218d144bf4a1f663

    SHA256

    2b153721fc9f30c602c45e2e3f90e3d570cf0c5c63876ceeba820c6f5403f53d

    SHA512

    746453d159a4059366e3745f2a1c599dafb79e848c2303e76695016583d64be8d1da3b599fa9e219103c3da567a7787e8a6662f4e01c30100aca456200ad7344

  • \Users\Admin\AppData\Local\Temp\korai.exe

    Filesize

    156KB

    MD5

    b514a7c5d857f961ad80100d7201ad8d

    SHA1

    e50bbe3294ebc94af5e9dd62e9faa2f7e3c372c2

    SHA256

    27dd537830c5189dad9c3fc1c54f4800f76a1f9c26413f810998530bad7177c9

    SHA512

    0592e75fba122af631ffaa4e730dc11937688fe7728634352f929fa8b16ccc393384c96a0d84ab38793ce40dbdb70addf78e511be976e9a8c4c9c8fa47a82523

  • \Users\Admin\AppData\Local\Temp\tuhui.exe

    Filesize

    782KB

    MD5

    1a0214d81a472a30dbf1e92f96c4a323

    SHA1

    6ca78a44db81bf1241df5d6ab1574e62e6e0c361

    SHA256

    e0687afbb2937d2b648a6b3f435956ebbd8f135d66747f4c0a96911b6d8d7fb4

    SHA512

    63303bdeb30cf02b379a92429a483a97adf742874084bccf83ebce3bba5e60ad28cb0d98c8a5a309e7de6e44b459627c894e5ea94c2a128567de752684cb7d94

  • memory/2204-10-0x0000000000DF0000-0x0000000000EB9000-memory.dmp

    Filesize

    804KB

  • memory/2204-18-0x0000000000ED0000-0x0000000000F99000-memory.dmp

    Filesize

    804KB

  • memory/2204-0-0x0000000000ED0000-0x0000000000F99000-memory.dmp

    Filesize

    804KB

  • memory/2556-21-0x0000000000EF0000-0x0000000000FB9000-memory.dmp

    Filesize

    804KB

  • memory/2556-17-0x0000000000EF0000-0x0000000000FB9000-memory.dmp

    Filesize

    804KB

  • memory/2556-29-0x0000000000EF0000-0x0000000000FB9000-memory.dmp

    Filesize

    804KB

  • memory/2556-27-0x0000000003080000-0x000000000310F000-memory.dmp

    Filesize

    572KB

  • memory/2884-30-0x0000000000400000-0x000000000048F000-memory.dmp

    Filesize

    572KB

  • memory/2884-32-0x0000000000400000-0x000000000048F000-memory.dmp

    Filesize

    572KB

  • memory/2884-33-0x0000000000400000-0x000000000048F000-memory.dmp

    Filesize

    572KB

  • memory/2884-34-0x0000000000400000-0x000000000048F000-memory.dmp

    Filesize

    572KB

  • memory/2884-35-0x0000000000400000-0x000000000048F000-memory.dmp

    Filesize

    572KB

  • memory/2884-36-0x0000000000400000-0x000000000048F000-memory.dmp

    Filesize

    572KB