Analysis

  • max time kernel
    121s
  • max time network
    122s
  • platform
    windows7_x64
  • resource
    win7-20240705-en
  • resource tags

    arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system
  • submitted
    01-08-2024 04:11

General

  • Target

    7f1fda5c3e6515b61fa48f5744572b5c_JaffaCakes118.exe

  • Size

    185KB

  • MD5

    7f1fda5c3e6515b61fa48f5744572b5c

  • SHA1

    f5e5283f511c4e6e7ff1ba4bb91acfc17653a58f

  • SHA256

    2c25e31ddcb7ce79670b67ce57d5e6a4b0c7e13d870ee25a8bbdd18807ee5d32

  • SHA512

    e123298022c743f8b675c93fd2d112af7cccee6c0fae75fbeeb2c6b20df446a582a8b09ee52b788638b9ebb69e6319bf4fb95865ca6989ef254b18d9111fb5cf

  • SSDEEP

    1536:TPwN8ukP5sZK20EGIBpwW6NeleEQ77nuUWXJmU2Ajpf8oI4KEAUg2uI:Thuk8QsH47nW5ppkoI4KEAUg2p

Score
10/10

Malware Config

Extracted

Family

urelas

C2

112.175.88.207

112.175.88.208

Signatures

  • Urelas

    Urelas is a trojan targeting card games.

  • Deletes itself 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\7f1fda5c3e6515b61fa48f5744572b5c_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\7f1fda5c3e6515b61fa48f5744572b5c_JaffaCakes118.exe"
    1⤵
    • Loads dropped DLL
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:3048
    • C:\Users\Admin\AppData\Local\Temp\huter.exe
      "C:\Users\Admin\AppData\Local\Temp\huter.exe"
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      PID:2488
    • C:\Windows\SysWOW64\cmd.exe
      cmd /c ""C:\Users\Admin\AppData\Local\Temp\sanfdr.bat" "
      2⤵
      • Deletes itself
      • System Location Discovery: System Language Discovery
      PID:3036

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\golfinfo.ini

    Filesize

    512B

    MD5

    ede6388dfbb03ff576508b085d03e793

    SHA1

    71d2e779ac6ed074b5698651a8c7fa3b047ccb50

    SHA256

    779c0d78580692dadb2978ddfcd44d68f8282bb3453c638c9a4c2feecc1b96f8

    SHA512

    097e3b9b2ad80944e542785db3a9062ecb2c657192d96659dcc5267f362b186c91722f2bc103f19ef895e6d9821cf33d262569fae23605888d75f38d2e30093b

  • C:\Users\Admin\AppData\Local\Temp\sanfdr.bat

    Filesize

    302B

    MD5

    e41ea93eca438a829239de74778164d8

    SHA1

    e8c7977b3f2a2576203367a4261c6c0c304973b7

    SHA256

    b8db3e9caa1afbf59716814ed8fe2bafe499241db7bf4178ff7ea0623fc74fd4

    SHA512

    071ad2968d8b3a1fe3c5a6e454fc16868d3cb1273857f28a063971a39e17350aa82ac46e98e82637dc61c299ccf9265c74b36bc4f0382840ca33468fed391bd3

  • \Users\Admin\AppData\Local\Temp\huter.exe

    Filesize

    185KB

    MD5

    b85f9662eca31e83cc33467eb564f05a

    SHA1

    c05209e101a248c0ef7d021a9ad671281bfff157

    SHA256

    5eda2e49b7dcccef66b66d1af8968c7aa2ab4405498d8ce70e00f5b7dfd10f9a

    SHA512

    671e22bd8d7ae9ed6ebe833b35c7b1372b2cf58e8e456d208bc04fccf223614dae83f29e362151cb23eb53ea67d9f7696ab7bcc3ece7512717b7ceea60c82a69

  • memory/2488-17-0x00000000001F0000-0x0000000000221000-memory.dmp

    Filesize

    196KB

  • memory/2488-21-0x00000000001F0000-0x0000000000221000-memory.dmp

    Filesize

    196KB

  • memory/3048-0-0x0000000000D10000-0x0000000000D41000-memory.dmp

    Filesize

    196KB

  • memory/3048-16-0x0000000000480000-0x00000000004B1000-memory.dmp

    Filesize

    196KB

  • memory/3048-18-0x0000000000D10000-0x0000000000D41000-memory.dmp

    Filesize

    196KB