Analysis
-
max time kernel
121s -
max time network
126s -
platform
windows7_x64 -
resource
win7-20241023-en -
resource tags
arch:x64arch:x86image:win7-20241023-enlocale:en-usos:windows7-x64system -
submitted
31-10-2024 10:01
Behavioral task
behavioral1
Sample
82acd4c6577a7d519374a2f143ad5673_JaffaCakes118.exe
Resource
win7-20241023-en
General
-
Target
82acd4c6577a7d519374a2f143ad5673_JaffaCakes118.exe
-
Size
264KB
-
MD5
82acd4c6577a7d519374a2f143ad5673
-
SHA1
3265e4fb5d4c8f49b14125bbea0560ace3039412
-
SHA256
d10dd3f5d90dad3983e37068309b5670a216efa82330f066d45ef8a9acd1c78c
-
SHA512
c9dee22d97c815e2e6aac58f1b6a42f873e9088e03041db41b0e1b9d18a9fe5495878829bf94e6109df338c9721f29f5eccf47c994775635d7ae487cbe600869
-
SSDEEP
3072:AUApueDWSppTaeskDEjUrqfkZ557YzAL9gFoI3X3fZE5UANaG:ASeyGpTaesaQUufkL57YsL9NIx9ANaG
Malware Config
Extracted
urelas
112.175.88.207
112.175.88.208
Signatures
-
Urelas family
-
Deletes itself 1 IoCs
Processes:
cmd.exepid Process 2928 cmd.exe -
Executes dropped EXE 1 IoCs
Processes:
huter.exepid Process 2392 huter.exe -
Loads dropped DLL 1 IoCs
Processes:
82acd4c6577a7d519374a2f143ad5673_JaffaCakes118.exepid Process 2764 82acd4c6577a7d519374a2f143ad5673_JaffaCakes118.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
82acd4c6577a7d519374a2f143ad5673_JaffaCakes118.exehuter.execmd.exedescription ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 82acd4c6577a7d519374a2f143ad5673_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language huter.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Suspicious use of WriteProcessMemory 8 IoCs
Processes:
82acd4c6577a7d519374a2f143ad5673_JaffaCakes118.exedescription pid Process procid_target PID 2764 wrote to memory of 2392 2764 82acd4c6577a7d519374a2f143ad5673_JaffaCakes118.exe 30 PID 2764 wrote to memory of 2392 2764 82acd4c6577a7d519374a2f143ad5673_JaffaCakes118.exe 30 PID 2764 wrote to memory of 2392 2764 82acd4c6577a7d519374a2f143ad5673_JaffaCakes118.exe 30 PID 2764 wrote to memory of 2392 2764 82acd4c6577a7d519374a2f143ad5673_JaffaCakes118.exe 30 PID 2764 wrote to memory of 2928 2764 82acd4c6577a7d519374a2f143ad5673_JaffaCakes118.exe 31 PID 2764 wrote to memory of 2928 2764 82acd4c6577a7d519374a2f143ad5673_JaffaCakes118.exe 31 PID 2764 wrote to memory of 2928 2764 82acd4c6577a7d519374a2f143ad5673_JaffaCakes118.exe 31 PID 2764 wrote to memory of 2928 2764 82acd4c6577a7d519374a2f143ad5673_JaffaCakes118.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\82acd4c6577a7d519374a2f143ad5673_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\82acd4c6577a7d519374a2f143ad5673_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2764 -
C:\Users\Admin\AppData\Local\Temp\huter.exe"C:\Users\Admin\AppData\Local\Temp\huter.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2392
-
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\sanfdr.bat" "2⤵
- Deletes itself
- System Location Discovery: System Language Discovery
PID:2928
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
512B
MD54514d58bb3af5fd2132870ab9e2897d9
SHA19bf67ec19026e2485416a37315a32a19972a69ff
SHA2568bc8fa165190f94d0f84f4c5772a7aee9aafd778e395effcdf501055b0658fa8
SHA51207941b5f5275a931b8b7be9c94062714a6f8546ff3df4479638b6638960f61d35ad25fefa3bd7fc9b0934e9814c40169dce5803aac5e25ae932b698c85688738
-
Filesize
302B
MD5c86716a2639d3b2df63a5033cf319cb8
SHA107bcb5c3bf6e709b48552a68d4e5a1268f3b25d6
SHA2563428c34cae387df191a6f4c8835477fb311ea4c467c5ed90381999190e8c0c64
SHA512687e36e99bbddba6d7212bf3f7182554cd28039f9b8a05701aeb5b2e11f020f84fcd4f61c2ac9a026a0c9c1fc723dbdcefe084865af67fb7df34de26ccd49a0d
-
Filesize
264KB
MD57a4b6f04dec5caa26d942732bfdbdfbe
SHA13d04ad7e08ec48de0a2d672aff796b8d033a752b
SHA2563afc58a98275f4f782c48713a679695b98fea80f494371b5ac396328ed48896c
SHA512825d69dc528d7a6e33c929a0d8e924b13af5fd27d9d1a05a4f0962ca063a2ba1e31f82b1ae355d67c73e59f967844a54f84cb91281c1ff971450d326a596163f