Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    149s
  • max time network
    122s
  • platform
    windows7_x64
  • resource
    win7-20240708-en
  • resource tags

    arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system
  • submitted
    05/12/2024, 12:58

General

  • Target

    c7cda02f2f136ad064bd0c5014d623f9_JaffaCakes118.exe

  • Size

    777KB

  • MD5

    c7cda02f2f136ad064bd0c5014d623f9

  • SHA1

    95de8248db7678b929491e381a24258105b3111e

  • SHA256

    f1ff7d6e883357e0e5509d5f83dac3e3af91670089510b76cc7caba699659c71

  • SHA512

    137aa13bcc35b108bff3c10ba17b9be13ece93cd0786bba08755262806b992a54cffd22cb6660f9bacab74091580147e2f87d7964816d71f5e51415b4be65f58

  • SSDEEP

    12288:YOlx4kk9HKda4YfM/1T3PPSnPI2VAWNDTJHq9DIMTW8c1O:YA4Ya1fQzPPSnPFqWtTJK9DIMTW8t

Score
10/10

Malware Config

Extracted

Family

urelas

C2

1.234.83.146

133.242.129.155

218.54.31.226

218.54.31.165

Signatures

  • Urelas

    Urelas is a trojan targeting card games.

  • Urelas family
  • Deletes itself 1 IoCs
  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 4 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 54 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\c7cda02f2f136ad064bd0c5014d623f9_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\c7cda02f2f136ad064bd0c5014d623f9_JaffaCakes118.exe"
    1⤵
    • Loads dropped DLL
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:2308
    • C:\Users\Admin\AppData\Local\Temp\uvahn.exe
      "C:\Users\Admin\AppData\Local\Temp\uvahn.exe"
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:2784
      • C:\Users\Admin\AppData\Local\Temp\rypug.exe
        "C:\Users\Admin\AppData\Local\Temp\rypug.exe"
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:1440
    • C:\Windows\SysWOW64\cmd.exe
      cmd /c ""C:\Users\Admin\AppData\Local\Temp\_uinsey.bat" "
      2⤵
      • Deletes itself
      • System Location Discovery: System Language Discovery
      PID:2752

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\_uinsey.bat

    Filesize

    304B

    MD5

    ed0bc55935d6dfb5df599516f92d8785

    SHA1

    8588e3ba425766a9526faf48f20a38ec30df5748

    SHA256

    77180c284849927d251d5d5464c9db55e11fb62936b67e30a98ff298b2192cbe

    SHA512

    68e1b216ad0379144ecde616c72277cc99a45439accb9980ecae6975c40ee43826cf08953c88762142e60e7e62c2f8dd6ffb65cf2e2cb9af47e28fdfc6c738c1

  • C:\Users\Admin\AppData\Local\Temp\golfinfo.ini

    Filesize

    512B

    MD5

    e4f1ae12237c8b81fbab239e2f33fa13

    SHA1

    934e05d8b30a2ce1a8c6f9092301b77897bd501a

    SHA256

    be452a0895f609dda6a5513d9b0b0035ea5f74979420d5e34e3808fe27683195

    SHA512

    b500bb517253b1ca2314e1777798a9058a45f2f77f7811f45250ab104b2dcb68db81d3195d6e746d14f2da1a074b3019c5773082a6b4db955e46edf9b001f3c3

  • \Users\Admin\AppData\Local\Temp\rypug.exe

    Filesize

    156KB

    MD5

    ec531f5f0b9f17bc6d2334b2115e10ea

    SHA1

    22be8f49a22c0085196e51c873d6428269bec563

    SHA256

    fa147ad1e623ac584d01e5abcb41bd0d3ff0f43f16cb3c46a28bae499861a9bc

    SHA512

    e51a9126faed0cfab6b353220f9c42e2870f532d32dad6009c92f8f13f364a26c9f29270556a20592e3ccb7e036d239d285532290c5688008a6155f150607543

  • \Users\Admin\AppData\Local\Temp\uvahn.exe

    Filesize

    777KB

    MD5

    f0c11af4bcb076767b3ed01f4db7766f

    SHA1

    250ddff548f1f516425e4312aae3685a1e22d5c2

    SHA256

    84e8bc9d40740ab1b5046c390f9eb5ed5c254d5e1532b98d9c6d92e2c1b5fa8f

    SHA512

    818f28bbd0c1e22acf27300649328916133e4b439475d812a93405dca0cc1fb1208708b771460d57a6f4d784faece0c474d1af5c65f8079ab21be2bb01017088

  • memory/1440-32-0x0000000000400000-0x000000000048F000-memory.dmp

    Filesize

    572KB

  • memory/1440-30-0x0000000000400000-0x000000000048F000-memory.dmp

    Filesize

    572KB

  • memory/1440-33-0x0000000000400000-0x000000000048F000-memory.dmp

    Filesize

    572KB

  • memory/1440-34-0x0000000000400000-0x000000000048F000-memory.dmp

    Filesize

    572KB

  • memory/1440-35-0x0000000000400000-0x000000000048F000-memory.dmp

    Filesize

    572KB

  • memory/1440-36-0x0000000000400000-0x000000000048F000-memory.dmp

    Filesize

    572KB

  • memory/2308-18-0x0000000000AB0000-0x0000000000B79000-memory.dmp

    Filesize

    804KB

  • memory/2308-6-0x0000000002860000-0x0000000002929000-memory.dmp

    Filesize

    804KB

  • memory/2308-0-0x0000000000AB0000-0x0000000000B79000-memory.dmp

    Filesize

    804KB

  • memory/2784-21-0x00000000002C0000-0x0000000000389000-memory.dmp

    Filesize

    804KB

  • memory/2784-27-0x0000000003080000-0x000000000310F000-memory.dmp

    Filesize

    572KB

  • memory/2784-29-0x00000000002C0000-0x0000000000389000-memory.dmp

    Filesize

    804KB

  • memory/2784-16-0x00000000002C0000-0x0000000000389000-memory.dmp

    Filesize

    804KB