Analysis
-
max time kernel
149s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20241023-en -
resource tags
arch:x64arch:x86image:win7-20241023-enlocale:en-usos:windows7-x64system -
submitted
28-10-2024 20:17
Behavioral task
behavioral1
Sample
7aadedf28a0c97b73a5660070007e6ee_JaffaCakes118.exe
Resource
win7-20241023-en
General
-
Target
7aadedf28a0c97b73a5660070007e6ee_JaffaCakes118.exe
-
Size
446KB
-
MD5
7aadedf28a0c97b73a5660070007e6ee
-
SHA1
13fe0ec7a22dd98971f1956cb0c561e57a9e53e1
-
SHA256
6012b35fc58f6154d0ecc00c1e56db0aba850cb6ddef2679c1763fc20fc6b289
-
SHA512
6e521042f13307817200b638ee0d108e63fc8fa7326f5cb22acdf4bcb0bb5ed368898759713a0f94f6fbeaf25f3d2df3d37abaada0176b2b539d54e4da880275
-
SSDEEP
6144:PEK25f5ySIcWLsxIIW4DYM6SB6v+qLnAzYmhwrxcvkzmSOpo0:PMpASIcWYx2U6hAJQn4
Malware Config
Extracted
urelas
218.54.31.165
218.54.31.226
Signatures
-
Urelas family
-
Deletes itself 1 IoCs
Processes:
cmd.exepid Process 2304 cmd.exe -
Executes dropped EXE 3 IoCs
Processes:
coisx.exeapxuso.exemujea.exepid Process 2676 coisx.exe 2104 apxuso.exe 112 mujea.exe -
Loads dropped DLL 3 IoCs
Processes:
7aadedf28a0c97b73a5660070007e6ee_JaffaCakes118.execoisx.exeapxuso.exepid Process 1556 7aadedf28a0c97b73a5660070007e6ee_JaffaCakes118.exe 2676 coisx.exe 2104 apxuso.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 6 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
cmd.exeapxuso.exemujea.execmd.exe7aadedf28a0c97b73a5660070007e6ee_JaffaCakes118.execoisx.exedescription ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language apxuso.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mujea.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 7aadedf28a0c97b73a5660070007e6ee_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language coisx.exe -
Suspicious behavior: EnumeratesProcesses 55 IoCs
Processes:
mujea.exepid Process 112 mujea.exe 112 mujea.exe 112 mujea.exe 112 mujea.exe 112 mujea.exe 112 mujea.exe 112 mujea.exe 112 mujea.exe 112 mujea.exe 112 mujea.exe 112 mujea.exe 112 mujea.exe 112 mujea.exe 112 mujea.exe 112 mujea.exe 112 mujea.exe 112 mujea.exe 112 mujea.exe 112 mujea.exe 112 mujea.exe 112 mujea.exe 112 mujea.exe 112 mujea.exe 112 mujea.exe 112 mujea.exe 112 mujea.exe 112 mujea.exe 112 mujea.exe 112 mujea.exe 112 mujea.exe 112 mujea.exe 112 mujea.exe 112 mujea.exe 112 mujea.exe 112 mujea.exe 112 mujea.exe 112 mujea.exe 112 mujea.exe 112 mujea.exe 112 mujea.exe 112 mujea.exe 112 mujea.exe 112 mujea.exe 112 mujea.exe 112 mujea.exe 112 mujea.exe 112 mujea.exe 112 mujea.exe 112 mujea.exe 112 mujea.exe 112 mujea.exe 112 mujea.exe 112 mujea.exe 112 mujea.exe 112 mujea.exe -
Suspicious use of WriteProcessMemory 20 IoCs
Processes:
7aadedf28a0c97b73a5660070007e6ee_JaffaCakes118.execoisx.exeapxuso.exedescription pid Process procid_target PID 1556 wrote to memory of 2676 1556 7aadedf28a0c97b73a5660070007e6ee_JaffaCakes118.exe 30 PID 1556 wrote to memory of 2676 1556 7aadedf28a0c97b73a5660070007e6ee_JaffaCakes118.exe 30 PID 1556 wrote to memory of 2676 1556 7aadedf28a0c97b73a5660070007e6ee_JaffaCakes118.exe 30 PID 1556 wrote to memory of 2676 1556 7aadedf28a0c97b73a5660070007e6ee_JaffaCakes118.exe 30 PID 1556 wrote to memory of 2304 1556 7aadedf28a0c97b73a5660070007e6ee_JaffaCakes118.exe 31 PID 1556 wrote to memory of 2304 1556 7aadedf28a0c97b73a5660070007e6ee_JaffaCakes118.exe 31 PID 1556 wrote to memory of 2304 1556 7aadedf28a0c97b73a5660070007e6ee_JaffaCakes118.exe 31 PID 1556 wrote to memory of 2304 1556 7aadedf28a0c97b73a5660070007e6ee_JaffaCakes118.exe 31 PID 2676 wrote to memory of 2104 2676 coisx.exe 33 PID 2676 wrote to memory of 2104 2676 coisx.exe 33 PID 2676 wrote to memory of 2104 2676 coisx.exe 33 PID 2676 wrote to memory of 2104 2676 coisx.exe 33 PID 2104 wrote to memory of 112 2104 apxuso.exe 35 PID 2104 wrote to memory of 112 2104 apxuso.exe 35 PID 2104 wrote to memory of 112 2104 apxuso.exe 35 PID 2104 wrote to memory of 112 2104 apxuso.exe 35 PID 2104 wrote to memory of 1000 2104 apxuso.exe 36 PID 2104 wrote to memory of 1000 2104 apxuso.exe 36 PID 2104 wrote to memory of 1000 2104 apxuso.exe 36 PID 2104 wrote to memory of 1000 2104 apxuso.exe 36
Processes
-
C:\Users\Admin\AppData\Local\Temp\7aadedf28a0c97b73a5660070007e6ee_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\7aadedf28a0c97b73a5660070007e6ee_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1556 -
C:\Users\Admin\AppData\Local\Temp\coisx.exe"C:\Users\Admin\AppData\Local\Temp\coisx.exe" hi2⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2676 -
C:\Users\Admin\AppData\Local\Temp\apxuso.exe"C:\Users\Admin\AppData\Local\Temp\apxuso.exe" OK3⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2104 -
C:\Users\Admin\AppData\Local\Temp\mujea.exe"C:\Users\Admin\AppData\Local\Temp\mujea.exe"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:112
-
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\_vslite.bat" "4⤵
- System Location Discovery: System Language Discovery
PID:1000
-
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\_vslite.bat" "2⤵
- Deletes itself
- System Location Discovery: System Language Discovery
PID:2304
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
304B
MD51f7c14360e422a9f52723088aaa25bd9
SHA12ecb0df234dd791de0b3afc1e46e2980dd28d91e
SHA2568ad634d18e464fc8065761e41e88682568dd846fecf4f8a463ae5d2bcf39c523
SHA5121dba507c840eeb3f75438ce3eab540d876eab393e5f6ba8ce91a986c6f3b32921f103296dbc097d848cf2d3362c97eeb380d63c5c7fbb84469e7741554e43fd5
-
Filesize
224B
MD5c26abbf782a6a9e4d47f3a812cbf3fa2
SHA11c6e0fa97a30a41a5406a4acb72e69044637cac7
SHA2561435638788804fdbd81c4ce17820b9306b2831b90210852fe60b4f9bd94c203b
SHA512e6e54159908b445f3e8c4496d838b20408fe90177cdb59ff6d791834089f530a61c5ad9f425a30d630ea7401a206dd848a41701d6726b0b4dfd1eba7d502dd96
-
Filesize
447KB
MD5251a7b3e93936764eb6f26b5ea6e3f86
SHA1eaf45cc1cfb0a03184e1afd0bc48ffefafc687cb
SHA256c8930de72017b8aa2e15761c3dd8503dae4018add6cda3ce57dfdcf6f21aee48
SHA512a0473df92e3e24100b747edc90e723e702b156f1e7222e80b5513eff80af68fc060483c92e1a0bf2c7b20e9fab37fc899059b5b13e27e3b113f0063f82b13639
-
Filesize
512B
MD5a5d4cf73e28689c3acea64b1a322cc29
SHA1dc57d394bf38289666b355e65c855cbf4f0dc48c
SHA25644c12801bb71c5a0611c619795121273d57059064d9101ca15f8cc4e2633398e
SHA51232ac6dbf9a3fcfe369acca703fc9717a008f18e66fb0478794a08f3408f1f942b5fc28cfdb6cc0f2f0284b0d8e6efe0d20f9735e0b501015f3ef6f481e290ebe
-
Filesize
447KB
MD598fabb50f1d17ba5257c6aee9f6d117f
SHA1bf02cc59e8758ab42ce40a86b0ff297c44501813
SHA256af442245217f04a2d249620be6571f05ebd559f947dc8461f81c904300e7c412
SHA512701b5d08328fb9bae6c54356cc61b1bb67bd3faf928c0d46c6a72c47998122ec17208f8bd8b4015847783e37645f4b57fcfff092d0cacf6c599d75b7b17e089e
-
Filesize
223KB
MD5d3a3dd229104c5c3d47009a9de078d13
SHA1dc916556af26ddea151eb7ed9d8584360ebb4625
SHA256ca021869bbe8bbbfe9c03c2bdf585057934b77db47993f8756d38ea456234258
SHA512c27b6c1452e56a866b4c3be52ab5fedf993b9a7918ccc206b58c6714c5af847a11c304c95b268d9535f00115e6a49a9f4e7b73ac707187c829136fcf638d31d4