Analysis

  • max time kernel
    149s
  • max time network
    158s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    04-11-2024 01:08

General

  • Target

    8e66c45d23b4ae3710cd30f060d9fb4c_JaffaCakes118.exe

  • Size

    410KB

  • MD5

    8e66c45d23b4ae3710cd30f060d9fb4c

  • SHA1

    654c47ca6f9b14e7b1383eb1985775c6f3b5469c

  • SHA256

    da65e155981aff720e00d628b505be9b566236cb1aa236f989a121dfddaa8922

  • SHA512

    050494fb3d0c6edf72b5f2f7144fb8349186b55c31e8135a2cb758cd155e8371e9381a945c9987e60d45fa17136fd8c802264bec1d8430019a2c20cf41d9ee6f

  • SSDEEP

    6144:kzU7blKaP2iCWhWapKRaRXOkN4Swel6f3IsInOts4:eU7M5ijWh0XOW4sEfeOD

Malware Config

Extracted

Family

urelas

C2

218.54.31.226

218.54.31.165

Signatures

  • Urelas

    Urelas is a trojan targeting card games.

  • Urelas family
  • ASPack v2.12-2.42 1 IoCs

    Detects executables packed with ASPack v2.12-2.42

  • Checks computer location settings 2 TTPs 2 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 4 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of WriteProcessMemory 9 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\8e66c45d23b4ae3710cd30f060d9fb4c_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\8e66c45d23b4ae3710cd30f060d9fb4c_JaffaCakes118.exe"
    1⤵
    • Checks computer location settings
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:4536
    • C:\Users\Admin\AppData\Local\Temp\omqek.exe
      "C:\Users\Admin\AppData\Local\Temp\omqek.exe"
      2⤵
      • Checks computer location settings
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:4464
      • C:\Users\Admin\AppData\Local\Temp\mymed.exe
        "C:\Users\Admin\AppData\Local\Temp\mymed.exe"
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        PID:3092
    • C:\Windows\SysWOW64\cmd.exe
      C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\_uinsey.bat" "
      2⤵
      • System Location Discovery: System Language Discovery
      PID:3432

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\_uinsey.bat

    Filesize

    304B

    MD5

    e3cf00f40da74cd8c1ef48e798ab819c

    SHA1

    470664395487ba30d3338f903a985d7780314e4e

    SHA256

    2b9ab4b82485ac556620eaa108734b878c2980abb3049e91574a24e5288b7c23

    SHA512

    b165ac49dbf5c75895bfd1f777592715a7afe6bd23d3b4a03f025638bc95e3325285dc5cdcbfc3c54dc44bd5dd55186c33f6813242eab4c421d4d663e910ff53

  • C:\Users\Admin\AppData\Local\Temp\golfinfo.ini

    Filesize

    512B

    MD5

    41ded27860e2324d0cad71c897d86972

    SHA1

    40284fbad02d9285a20159bb068cbda0938bb49c

    SHA256

    1e1285f775e20157eb61781e8becaf48154fe7f3bc07ffbc133ad93e5b208c59

    SHA512

    5ed5073d47b56f59bdd502c3b31a5c5ad387147b1dffc1a6ca4b89b8ff59136da2fed5eb66d05dccc84d6388082e78d7ee8f0c74e66d1369fb335ad9f21cd294

  • C:\Users\Admin\AppData\Local\Temp\mymed.exe

    Filesize

    212KB

    MD5

    764bc1c5fdec251d51e65450a3c01475

    SHA1

    a2a6b0626c1996040994e8f16bb773d5488d08f7

    SHA256

    e8b2380806bd3de3174c3e06f43aede5230fd5ea92ed60e3e7a11e581d29a22f

    SHA512

    4301398ebc641c8548e2d03b8912539bcaa7135f3f55a14479b1555d3d0664173cb8dd7244837200a3304f1cf35a4791f2dc8312c84a0efab53be81015c12695

  • C:\Users\Admin\AppData\Local\Temp\omqek.exe

    Filesize

    410KB

    MD5

    f5c23c6b78b69fe551326c54c038a941

    SHA1

    7df72ea410620f32ac849743f32c22953beaca3a

    SHA256

    85bf732033ae6360d992514b80b27a0f0e271e94c3dbe66728d3d9e5ea2dce96

    SHA512

    bc5b2b3cb26ea0927e7f9efd32046b385ff8037e537917d9d5fd946cac75b886561fa45928491367dec3266d64365c2c7f2de05f9d2dfce6e3a50b60517d06e5

  • memory/3092-24-0x00000000000A0000-0x0000000000134000-memory.dmp

    Filesize

    592KB

  • memory/3092-27-0x00000000000A0000-0x0000000000134000-memory.dmp

    Filesize

    592KB

  • memory/3092-28-0x00000000000A0000-0x0000000000134000-memory.dmp

    Filesize

    592KB

  • memory/3092-29-0x00000000000A0000-0x0000000000134000-memory.dmp

    Filesize

    592KB

  • memory/3092-31-0x00000000000A0000-0x0000000000134000-memory.dmp

    Filesize

    592KB

  • memory/3092-32-0x00000000000A0000-0x0000000000134000-memory.dmp

    Filesize

    592KB

  • memory/3092-33-0x00000000000A0000-0x0000000000134000-memory.dmp

    Filesize

    592KB

  • memory/3092-34-0x00000000000A0000-0x0000000000134000-memory.dmp

    Filesize

    592KB

  • memory/3092-35-0x00000000000A0000-0x0000000000134000-memory.dmp

    Filesize

    592KB

  • memory/4464-16-0x0000000000400000-0x0000000000465000-memory.dmp

    Filesize

    404KB

  • memory/4464-25-0x0000000000400000-0x0000000000465000-memory.dmp

    Filesize

    404KB

  • memory/4536-13-0x0000000000400000-0x0000000000465000-memory.dmp

    Filesize

    404KB

  • memory/4536-0-0x0000000000400000-0x0000000000465000-memory.dmp

    Filesize

    404KB