Analysis

  • max time kernel
    149s
  • max time network
    139s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    28-10-2024 01:38

General

  • Target

    7703f31d33d3a0ba4dc18a303679cf9e_JaffaCakes118.exe

  • Size

    494KB

  • MD5

    7703f31d33d3a0ba4dc18a303679cf9e

  • SHA1

    858ce1746571b57b229fd22f05420af9e61ea68b

  • SHA256

    ce7c4769071aa4d3ed69a390bc39219708ae8064036681e287847ec578817037

  • SHA512

    34313447d7cd00b4fa83eebed7ef9eb1c801b36c6efff75027553b5b50f12330fafd47c7582b48fba667ffea33be0dbef52af70d7ecb34e77a1eb6f20e97d400

  • SSDEEP

    6144:NKLOgsgomKLEFESGz0SPpeEPkPDPrzgtRY5RdrHc13FG9ItU6GvPwQ:AOgwmisETzuaeDPvjJ81VGqK6GvP5

Score
10/10

Malware Config

Extracted

Family

urelas

C2

1.234.83.146

133.242.129.155

218.54.31.226

218.54.31.165

Signatures

  • Urelas

    Urelas is a trojan targeting card games.

  • Urelas family
  • Checks computer location settings 2 TTPs 2 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 4 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of WriteProcessMemory 9 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\7703f31d33d3a0ba4dc18a303679cf9e_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\7703f31d33d3a0ba4dc18a303679cf9e_JaffaCakes118.exe"
    1⤵
    • Checks computer location settings
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:3020
    • C:\Users\Admin\AppData\Local\Temp\issed.exe
      "C:\Users\Admin\AppData\Local\Temp\issed.exe"
      2⤵
      • Checks computer location settings
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:4956
      • C:\Users\Admin\AppData\Local\Temp\komes.exe
        "C:\Users\Admin\AppData\Local\Temp\komes.exe"
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        PID:3020
    • C:\Windows\SysWOW64\cmd.exe
      C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\_uinsey.bat" "
      2⤵
      • System Location Discovery: System Language Discovery
      PID:2556

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\_uinsey.bat

    Filesize

    304B

    MD5

    2aea348114b7a13651b5e18dbf550760

    SHA1

    e09fdb185678b10346ccc7a4e1683b5e6732615d

    SHA256

    c391480f0c1502303a51bad002079dd1ed94f05445c35a047bfae679cf6304f2

    SHA512

    fca006a9eec528b9f36e9ddbd592c4bfb42d4eb0a5165513c41f1922b28b44bb0a9f044431cf1886f9369e21342bb987e27602a9802c10663b5d5d0ee7dc3b3f

  • C:\Users\Admin\AppData\Local\Temp\golfinfo.ini

    Filesize

    512B

    MD5

    e0cc19d4e1c793aad2bfbcd11dee9c1d

    SHA1

    ff7215917afee3f9808a2940c5635577cdf54087

    SHA256

    2319f91febc8196ce96df481572fca81364195a0fd7884ac502f28eb66192a45

    SHA512

    ba62f1bf5d1ae9fcd238d0e59e12ce5798c96b65c71396af1eb3ab30aca5aacb6278d252ad1e48763f18c575790ad380373e7251e7a6021a8ebbf516cb6acc87

  • C:\Users\Admin\AppData\Local\Temp\issed.exe

    Filesize

    494KB

    MD5

    a4f580326d24b0f9e19aadffd55798fb

    SHA1

    fd0da6555b877c499ae3bd048ecb3b29f5a942b3

    SHA256

    2f436fe6791160d431bb5bb5f77abc554e1e9bb7335eea503e653538f5dc283c

    SHA512

    7a752a79ca4a010db0ce221cbf5e207d308e66fd549ee5cbb80be3d87ee5f0323868032ae326c96c15a24dd73d7d4817d822bc3bfc74a7a6ccb8cb09dd27417c

  • C:\Users\Admin\AppData\Local\Temp\komes.exe

    Filesize

    179KB

    MD5

    1f5f8e2bd86b170961485fba4427c0ce

    SHA1

    8fff3a9f3f2c99ac39e873d0d25b1b099284aabc

    SHA256

    6d58c940dfdf03ca53baf7809979be1e03f0f9dd6baf9040276fe263bf065bdd

    SHA512

    72418eaa55650d6b089bc5cccfa06a6c8d4a2c4c1777d6db9164ad289e0f04450339bc2ad12f29386253fd426b3247ed76c2945ff79a6c205881034507c51a3a

  • memory/3020-17-0x0000000000F60000-0x0000000000F99000-memory.dmp

    Filesize

    228KB

  • memory/3020-43-0x0000000000400000-0x00000000004BF000-memory.dmp

    Filesize

    764KB

  • memory/3020-48-0x0000000000400000-0x00000000004BF000-memory.dmp

    Filesize

    764KB

  • memory/3020-47-0x0000000000400000-0x00000000004BF000-memory.dmp

    Filesize

    764KB

  • memory/3020-0-0x0000000000F60000-0x0000000000F99000-memory.dmp

    Filesize

    228KB

  • memory/3020-46-0x0000000000400000-0x00000000004BF000-memory.dmp

    Filesize

    764KB

  • memory/3020-1-0x00007FFA7C930000-0x00007FFA7CB25000-memory.dmp

    Filesize

    2.0MB

  • memory/3020-45-0x0000000000400000-0x00000000004BF000-memory.dmp

    Filesize

    764KB

  • memory/3020-44-0x0000000000400000-0x00000000004BF000-memory.dmp

    Filesize

    764KB

  • memory/3020-38-0x0000000000400000-0x00000000004BF000-memory.dmp

    Filesize

    764KB

  • memory/4956-20-0x00007FFA7C930000-0x00007FFA7CB25000-memory.dmp

    Filesize

    2.0MB

  • memory/4956-40-0x0000000000710000-0x0000000000749000-memory.dmp

    Filesize

    228KB

  • memory/4956-41-0x00007FFA7C930000-0x00007FFA7CB25000-memory.dmp

    Filesize

    2.0MB

  • memory/4956-21-0x0000000000710000-0x0000000000749000-memory.dmp

    Filesize

    228KB

  • memory/4956-14-0x00007FFA7C930000-0x00007FFA7CB25000-memory.dmp

    Filesize

    2.0MB

  • memory/4956-13-0x0000000000710000-0x0000000000749000-memory.dmp

    Filesize

    228KB