Analysis
-
max time kernel
137s -
max time network
147s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
31-10-2024 10:01
Behavioral task
behavioral1
Sample
82acd4c6577a7d519374a2f143ad5673_JaffaCakes118.exe
Resource
win7-20241023-en
General
-
Target
82acd4c6577a7d519374a2f143ad5673_JaffaCakes118.exe
-
Size
264KB
-
MD5
82acd4c6577a7d519374a2f143ad5673
-
SHA1
3265e4fb5d4c8f49b14125bbea0560ace3039412
-
SHA256
d10dd3f5d90dad3983e37068309b5670a216efa82330f066d45ef8a9acd1c78c
-
SHA512
c9dee22d97c815e2e6aac58f1b6a42f873e9088e03041db41b0e1b9d18a9fe5495878829bf94e6109df338c9721f29f5eccf47c994775635d7ae487cbe600869
-
SSDEEP
3072:AUApueDWSppTaeskDEjUrqfkZ557YzAL9gFoI3X3fZE5UANaG:ASeyGpTaesaQUufkL57YsL9NIx9ANaG
Malware Config
Extracted
urelas
112.175.88.207
112.175.88.208
Signatures
-
Urelas family
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
82acd4c6577a7d519374a2f143ad5673_JaffaCakes118.exedescription ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\Control Panel\International\Geo\Nation 82acd4c6577a7d519374a2f143ad5673_JaffaCakes118.exe -
Executes dropped EXE 1 IoCs
Processes:
huter.exepid Process 3816 huter.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
82acd4c6577a7d519374a2f143ad5673_JaffaCakes118.exehuter.execmd.exedescription ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 82acd4c6577a7d519374a2f143ad5673_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language huter.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Suspicious use of WriteProcessMemory 6 IoCs
Processes:
82acd4c6577a7d519374a2f143ad5673_JaffaCakes118.exedescription pid Process procid_target PID 4008 wrote to memory of 3816 4008 82acd4c6577a7d519374a2f143ad5673_JaffaCakes118.exe 88 PID 4008 wrote to memory of 3816 4008 82acd4c6577a7d519374a2f143ad5673_JaffaCakes118.exe 88 PID 4008 wrote to memory of 3816 4008 82acd4c6577a7d519374a2f143ad5673_JaffaCakes118.exe 88 PID 4008 wrote to memory of 1164 4008 82acd4c6577a7d519374a2f143ad5673_JaffaCakes118.exe 89 PID 4008 wrote to memory of 1164 4008 82acd4c6577a7d519374a2f143ad5673_JaffaCakes118.exe 89 PID 4008 wrote to memory of 1164 4008 82acd4c6577a7d519374a2f143ad5673_JaffaCakes118.exe 89
Processes
-
C:\Users\Admin\AppData\Local\Temp\82acd4c6577a7d519374a2f143ad5673_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\82acd4c6577a7d519374a2f143ad5673_JaffaCakes118.exe"1⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4008 -
C:\Users\Admin\AppData\Local\Temp\huter.exe"C:\Users\Admin\AppData\Local\Temp\huter.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:3816
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\sanfdr.bat" "2⤵
- System Location Discovery: System Language Discovery
PID:1164
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
512B
MD54514d58bb3af5fd2132870ab9e2897d9
SHA19bf67ec19026e2485416a37315a32a19972a69ff
SHA2568bc8fa165190f94d0f84f4c5772a7aee9aafd778e395effcdf501055b0658fa8
SHA51207941b5f5275a931b8b7be9c94062714a6f8546ff3df4479638b6638960f61d35ad25fefa3bd7fc9b0934e9814c40169dce5803aac5e25ae932b698c85688738
-
Filesize
264KB
MD57e6099a092d06cb0b276378fe45e6471
SHA1f46a990b2d5b3fe232d63a653c7147b001aae72e
SHA25662906474f6b236213c963f03022ad214b4dc3817002063f323406c85debe2e98
SHA512ebed886eb34dee2751cdc1cec2e0abedc949e43979301a6871f49372b70746c267921ea66bd67dae83d6d7f4bd9fe50fa943308c1a963d438556cea53f1044d8
-
Filesize
302B
MD5c86716a2639d3b2df63a5033cf319cb8
SHA107bcb5c3bf6e709b48552a68d4e5a1268f3b25d6
SHA2563428c34cae387df191a6f4c8835477fb311ea4c467c5ed90381999190e8c0c64
SHA512687e36e99bbddba6d7212bf3f7182554cd28039f9b8a05701aeb5b2e11f020f84fcd4f61c2ac9a026a0c9c1fc723dbdcefe084865af67fb7df34de26ccd49a0d