Analysis
-
max time kernel
149s -
max time network
158s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
04-11-2024 01:08
Behavioral task
behavioral1
Sample
8e66c45d23b4ae3710cd30f060d9fb4c_JaffaCakes118.exe
Resource
win7-20240903-en
General
-
Target
8e66c45d23b4ae3710cd30f060d9fb4c_JaffaCakes118.exe
-
Size
410KB
-
MD5
8e66c45d23b4ae3710cd30f060d9fb4c
-
SHA1
654c47ca6f9b14e7b1383eb1985775c6f3b5469c
-
SHA256
da65e155981aff720e00d628b505be9b566236cb1aa236f989a121dfddaa8922
-
SHA512
050494fb3d0c6edf72b5f2f7144fb8349186b55c31e8135a2cb758cd155e8371e9381a945c9987e60d45fa17136fd8c802264bec1d8430019a2c20cf41d9ee6f
-
SSDEEP
6144:kzU7blKaP2iCWhWapKRaRXOkN4Swel6f3IsInOts4:eU7M5ijWh0XOW4sEfeOD
Malware Config
Extracted
urelas
218.54.31.226
218.54.31.165
Signatures
-
Urelas family
-
Processes:
resource yara_rule behavioral2/files/0x0011000000023a1d-21.dat aspack_v212_v242 -
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
8e66c45d23b4ae3710cd30f060d9fb4c_JaffaCakes118.exeomqek.exedescription ioc Process Key value queried \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Control Panel\International\Geo\Nation 8e66c45d23b4ae3710cd30f060d9fb4c_JaffaCakes118.exe Key value queried \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Control Panel\International\Geo\Nation omqek.exe -
Executes dropped EXE 2 IoCs
Processes:
omqek.exemymed.exepid Process 4464 omqek.exe 3092 mymed.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
8e66c45d23b4ae3710cd30f060d9fb4c_JaffaCakes118.exeomqek.execmd.exemymed.exedescription ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 8e66c45d23b4ae3710cd30f060d9fb4c_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omqek.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mymed.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
mymed.exepid Process 3092 mymed.exe 3092 mymed.exe 3092 mymed.exe 3092 mymed.exe 3092 mymed.exe 3092 mymed.exe 3092 mymed.exe 3092 mymed.exe 3092 mymed.exe 3092 mymed.exe 3092 mymed.exe 3092 mymed.exe 3092 mymed.exe 3092 mymed.exe 3092 mymed.exe 3092 mymed.exe 3092 mymed.exe 3092 mymed.exe 3092 mymed.exe 3092 mymed.exe 3092 mymed.exe 3092 mymed.exe 3092 mymed.exe 3092 mymed.exe 3092 mymed.exe 3092 mymed.exe 3092 mymed.exe 3092 mymed.exe 3092 mymed.exe 3092 mymed.exe 3092 mymed.exe 3092 mymed.exe 3092 mymed.exe 3092 mymed.exe 3092 mymed.exe 3092 mymed.exe 3092 mymed.exe 3092 mymed.exe 3092 mymed.exe 3092 mymed.exe 3092 mymed.exe 3092 mymed.exe 3092 mymed.exe 3092 mymed.exe 3092 mymed.exe 3092 mymed.exe 3092 mymed.exe 3092 mymed.exe 3092 mymed.exe 3092 mymed.exe 3092 mymed.exe 3092 mymed.exe 3092 mymed.exe 3092 mymed.exe 3092 mymed.exe 3092 mymed.exe 3092 mymed.exe 3092 mymed.exe 3092 mymed.exe 3092 mymed.exe 3092 mymed.exe 3092 mymed.exe 3092 mymed.exe 3092 mymed.exe -
Suspicious use of WriteProcessMemory 9 IoCs
Processes:
8e66c45d23b4ae3710cd30f060d9fb4c_JaffaCakes118.exeomqek.exedescription pid Process procid_target PID 4536 wrote to memory of 4464 4536 8e66c45d23b4ae3710cd30f060d9fb4c_JaffaCakes118.exe 87 PID 4536 wrote to memory of 4464 4536 8e66c45d23b4ae3710cd30f060d9fb4c_JaffaCakes118.exe 87 PID 4536 wrote to memory of 4464 4536 8e66c45d23b4ae3710cd30f060d9fb4c_JaffaCakes118.exe 87 PID 4536 wrote to memory of 3432 4536 8e66c45d23b4ae3710cd30f060d9fb4c_JaffaCakes118.exe 88 PID 4536 wrote to memory of 3432 4536 8e66c45d23b4ae3710cd30f060d9fb4c_JaffaCakes118.exe 88 PID 4536 wrote to memory of 3432 4536 8e66c45d23b4ae3710cd30f060d9fb4c_JaffaCakes118.exe 88 PID 4464 wrote to memory of 3092 4464 omqek.exe 101 PID 4464 wrote to memory of 3092 4464 omqek.exe 101 PID 4464 wrote to memory of 3092 4464 omqek.exe 101
Processes
-
C:\Users\Admin\AppData\Local\Temp\8e66c45d23b4ae3710cd30f060d9fb4c_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\8e66c45d23b4ae3710cd30f060d9fb4c_JaffaCakes118.exe"1⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4536 -
C:\Users\Admin\AppData\Local\Temp\omqek.exe"C:\Users\Admin\AppData\Local\Temp\omqek.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4464 -
C:\Users\Admin\AppData\Local\Temp\mymed.exe"C:\Users\Admin\AppData\Local\Temp\mymed.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:3092
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\_uinsey.bat" "2⤵
- System Location Discovery: System Language Discovery
PID:3432
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
304B
MD5e3cf00f40da74cd8c1ef48e798ab819c
SHA1470664395487ba30d3338f903a985d7780314e4e
SHA2562b9ab4b82485ac556620eaa108734b878c2980abb3049e91574a24e5288b7c23
SHA512b165ac49dbf5c75895bfd1f777592715a7afe6bd23d3b4a03f025638bc95e3325285dc5cdcbfc3c54dc44bd5dd55186c33f6813242eab4c421d4d663e910ff53
-
Filesize
512B
MD541ded27860e2324d0cad71c897d86972
SHA140284fbad02d9285a20159bb068cbda0938bb49c
SHA2561e1285f775e20157eb61781e8becaf48154fe7f3bc07ffbc133ad93e5b208c59
SHA5125ed5073d47b56f59bdd502c3b31a5c5ad387147b1dffc1a6ca4b89b8ff59136da2fed5eb66d05dccc84d6388082e78d7ee8f0c74e66d1369fb335ad9f21cd294
-
Filesize
212KB
MD5764bc1c5fdec251d51e65450a3c01475
SHA1a2a6b0626c1996040994e8f16bb773d5488d08f7
SHA256e8b2380806bd3de3174c3e06f43aede5230fd5ea92ed60e3e7a11e581d29a22f
SHA5124301398ebc641c8548e2d03b8912539bcaa7135f3f55a14479b1555d3d0664173cb8dd7244837200a3304f1cf35a4791f2dc8312c84a0efab53be81015c12695
-
Filesize
410KB
MD5f5c23c6b78b69fe551326c54c038a941
SHA17df72ea410620f32ac849743f32c22953beaca3a
SHA25685bf732033ae6360d992514b80b27a0f0e271e94c3dbe66728d3d9e5ea2dce96
SHA512bc5b2b3cb26ea0927e7f9efd32046b385ff8037e537917d9d5fd946cac75b886561fa45928491367dec3266d64365c2c7f2de05f9d2dfce6e3a50b60517d06e5