Analysis
-
max time kernel
149s -
max time network
139s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
28-10-2024 01:38
Behavioral task
behavioral1
Sample
7703f31d33d3a0ba4dc18a303679cf9e_JaffaCakes118.exe
Resource
win7-20240903-en
General
-
Target
7703f31d33d3a0ba4dc18a303679cf9e_JaffaCakes118.exe
-
Size
494KB
-
MD5
7703f31d33d3a0ba4dc18a303679cf9e
-
SHA1
858ce1746571b57b229fd22f05420af9e61ea68b
-
SHA256
ce7c4769071aa4d3ed69a390bc39219708ae8064036681e287847ec578817037
-
SHA512
34313447d7cd00b4fa83eebed7ef9eb1c801b36c6efff75027553b5b50f12330fafd47c7582b48fba667ffea33be0dbef52af70d7ecb34e77a1eb6f20e97d400
-
SSDEEP
6144:NKLOgsgomKLEFESGz0SPpeEPkPDPrzgtRY5RdrHc13FG9ItU6GvPwQ:AOgwmisETzuaeDPvjJ81VGqK6GvP5
Malware Config
Extracted
urelas
1.234.83.146
133.242.129.155
218.54.31.226
218.54.31.165
Signatures
-
Urelas family
-
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
7703f31d33d3a0ba4dc18a303679cf9e_JaffaCakes118.exeissed.exedescription ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Control Panel\International\Geo\Nation 7703f31d33d3a0ba4dc18a303679cf9e_JaffaCakes118.exe Key value queried \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Control Panel\International\Geo\Nation issed.exe -
Executes dropped EXE 2 IoCs
Processes:
issed.exekomes.exepid Process 4956 issed.exe 3020 komes.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
7703f31d33d3a0ba4dc18a303679cf9e_JaffaCakes118.exeissed.execmd.exekomes.exedescription ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 7703f31d33d3a0ba4dc18a303679cf9e_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language issed.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language komes.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
komes.exepid Process 3020 komes.exe 3020 komes.exe 3020 komes.exe 3020 komes.exe 3020 komes.exe 3020 komes.exe 3020 komes.exe 3020 komes.exe 3020 komes.exe 3020 komes.exe 3020 komes.exe 3020 komes.exe 3020 komes.exe 3020 komes.exe 3020 komes.exe 3020 komes.exe 3020 komes.exe 3020 komes.exe 3020 komes.exe 3020 komes.exe 3020 komes.exe 3020 komes.exe 3020 komes.exe 3020 komes.exe 3020 komes.exe 3020 komes.exe 3020 komes.exe 3020 komes.exe 3020 komes.exe 3020 komes.exe 3020 komes.exe 3020 komes.exe 3020 komes.exe 3020 komes.exe 3020 komes.exe 3020 komes.exe 3020 komes.exe 3020 komes.exe 3020 komes.exe 3020 komes.exe 3020 komes.exe 3020 komes.exe 3020 komes.exe 3020 komes.exe 3020 komes.exe 3020 komes.exe 3020 komes.exe 3020 komes.exe 3020 komes.exe 3020 komes.exe 3020 komes.exe 3020 komes.exe 3020 komes.exe 3020 komes.exe 3020 komes.exe 3020 komes.exe 3020 komes.exe 3020 komes.exe 3020 komes.exe 3020 komes.exe 3020 komes.exe 3020 komes.exe 3020 komes.exe 3020 komes.exe -
Suspicious use of WriteProcessMemory 9 IoCs
Processes:
7703f31d33d3a0ba4dc18a303679cf9e_JaffaCakes118.exeissed.exedescription pid Process procid_target PID 3020 wrote to memory of 4956 3020 7703f31d33d3a0ba4dc18a303679cf9e_JaffaCakes118.exe 88 PID 3020 wrote to memory of 4956 3020 7703f31d33d3a0ba4dc18a303679cf9e_JaffaCakes118.exe 88 PID 3020 wrote to memory of 4956 3020 7703f31d33d3a0ba4dc18a303679cf9e_JaffaCakes118.exe 88 PID 3020 wrote to memory of 2556 3020 7703f31d33d3a0ba4dc18a303679cf9e_JaffaCakes118.exe 89 PID 3020 wrote to memory of 2556 3020 7703f31d33d3a0ba4dc18a303679cf9e_JaffaCakes118.exe 89 PID 3020 wrote to memory of 2556 3020 7703f31d33d3a0ba4dc18a303679cf9e_JaffaCakes118.exe 89 PID 4956 wrote to memory of 3020 4956 issed.exe 103 PID 4956 wrote to memory of 3020 4956 issed.exe 103 PID 4956 wrote to memory of 3020 4956 issed.exe 103
Processes
-
C:\Users\Admin\AppData\Local\Temp\7703f31d33d3a0ba4dc18a303679cf9e_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\7703f31d33d3a0ba4dc18a303679cf9e_JaffaCakes118.exe"1⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3020 -
C:\Users\Admin\AppData\Local\Temp\issed.exe"C:\Users\Admin\AppData\Local\Temp\issed.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4956 -
C:\Users\Admin\AppData\Local\Temp\komes.exe"C:\Users\Admin\AppData\Local\Temp\komes.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:3020
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\_uinsey.bat" "2⤵
- System Location Discovery: System Language Discovery
PID:2556
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
304B
MD52aea348114b7a13651b5e18dbf550760
SHA1e09fdb185678b10346ccc7a4e1683b5e6732615d
SHA256c391480f0c1502303a51bad002079dd1ed94f05445c35a047bfae679cf6304f2
SHA512fca006a9eec528b9f36e9ddbd592c4bfb42d4eb0a5165513c41f1922b28b44bb0a9f044431cf1886f9369e21342bb987e27602a9802c10663b5d5d0ee7dc3b3f
-
Filesize
512B
MD5e0cc19d4e1c793aad2bfbcd11dee9c1d
SHA1ff7215917afee3f9808a2940c5635577cdf54087
SHA2562319f91febc8196ce96df481572fca81364195a0fd7884ac502f28eb66192a45
SHA512ba62f1bf5d1ae9fcd238d0e59e12ce5798c96b65c71396af1eb3ab30aca5aacb6278d252ad1e48763f18c575790ad380373e7251e7a6021a8ebbf516cb6acc87
-
Filesize
494KB
MD5a4f580326d24b0f9e19aadffd55798fb
SHA1fd0da6555b877c499ae3bd048ecb3b29f5a942b3
SHA2562f436fe6791160d431bb5bb5f77abc554e1e9bb7335eea503e653538f5dc283c
SHA5127a752a79ca4a010db0ce221cbf5e207d308e66fd549ee5cbb80be3d87ee5f0323868032ae326c96c15a24dd73d7d4817d822bc3bfc74a7a6ccb8cb09dd27417c
-
Filesize
179KB
MD51f5f8e2bd86b170961485fba4427c0ce
SHA18fff3a9f3f2c99ac39e873d0d25b1b099284aabc
SHA2566d58c940dfdf03ca53baf7809979be1e03f0f9dd6baf9040276fe263bf065bdd
SHA51272418eaa55650d6b089bc5cccfa06a6c8d4a2c4c1777d6db9164ad289e0f04450339bc2ad12f29386253fd426b3247ed76c2945ff79a6c205881034507c51a3a