Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
149s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
05/12/2024, 12:58
Behavioral task
behavioral1
Sample
c7cda02f2f136ad064bd0c5014d623f9_JaffaCakes118.exe
Resource
win7-20240708-en
General
-
Target
c7cda02f2f136ad064bd0c5014d623f9_JaffaCakes118.exe
-
Size
777KB
-
MD5
c7cda02f2f136ad064bd0c5014d623f9
-
SHA1
95de8248db7678b929491e381a24258105b3111e
-
SHA256
f1ff7d6e883357e0e5509d5f83dac3e3af91670089510b76cc7caba699659c71
-
SHA512
137aa13bcc35b108bff3c10ba17b9be13ece93cd0786bba08755262806b992a54cffd22cb6660f9bacab74091580147e2f87d7964816d71f5e51415b4be65f58
-
SSDEEP
12288:YOlx4kk9HKda4YfM/1T3PPSnPI2VAWNDTJHq9DIMTW8c1O:YA4Ya1fQzPPSnPFqWtTJK9DIMTW8t
Malware Config
Extracted
urelas
1.234.83.146
133.242.129.155
218.54.31.226
218.54.31.165
Signatures
-
Urelas family
-
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\Control Panel\International\Geo\Nation c7cda02f2f136ad064bd0c5014d623f9_JaffaCakes118.exe Key value queried \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\Control Panel\International\Geo\Nation erqos.exe -
Executes dropped EXE 2 IoCs
pid Process 1260 erqos.exe 5040 feyvp.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language c7cda02f2f136ad064bd0c5014d623f9_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language erqos.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language feyvp.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 5040 feyvp.exe 5040 feyvp.exe 5040 feyvp.exe 5040 feyvp.exe 5040 feyvp.exe 5040 feyvp.exe 5040 feyvp.exe 5040 feyvp.exe 5040 feyvp.exe 5040 feyvp.exe 5040 feyvp.exe 5040 feyvp.exe 5040 feyvp.exe 5040 feyvp.exe 5040 feyvp.exe 5040 feyvp.exe 5040 feyvp.exe 5040 feyvp.exe 5040 feyvp.exe 5040 feyvp.exe 5040 feyvp.exe 5040 feyvp.exe 5040 feyvp.exe 5040 feyvp.exe 5040 feyvp.exe 5040 feyvp.exe 5040 feyvp.exe 5040 feyvp.exe 5040 feyvp.exe 5040 feyvp.exe 5040 feyvp.exe 5040 feyvp.exe 5040 feyvp.exe 5040 feyvp.exe 5040 feyvp.exe 5040 feyvp.exe 5040 feyvp.exe 5040 feyvp.exe 5040 feyvp.exe 5040 feyvp.exe 5040 feyvp.exe 5040 feyvp.exe 5040 feyvp.exe 5040 feyvp.exe 5040 feyvp.exe 5040 feyvp.exe 5040 feyvp.exe 5040 feyvp.exe 5040 feyvp.exe 5040 feyvp.exe 5040 feyvp.exe 5040 feyvp.exe 5040 feyvp.exe 5040 feyvp.exe 5040 feyvp.exe 5040 feyvp.exe 5040 feyvp.exe 5040 feyvp.exe 5040 feyvp.exe 5040 feyvp.exe 5040 feyvp.exe 5040 feyvp.exe 5040 feyvp.exe 5040 feyvp.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: 33 5040 feyvp.exe Token: SeIncBasePriorityPrivilege 5040 feyvp.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 1332 wrote to memory of 1260 1332 c7cda02f2f136ad064bd0c5014d623f9_JaffaCakes118.exe 83 PID 1332 wrote to memory of 1260 1332 c7cda02f2f136ad064bd0c5014d623f9_JaffaCakes118.exe 83 PID 1332 wrote to memory of 1260 1332 c7cda02f2f136ad064bd0c5014d623f9_JaffaCakes118.exe 83 PID 1332 wrote to memory of 2708 1332 c7cda02f2f136ad064bd0c5014d623f9_JaffaCakes118.exe 84 PID 1332 wrote to memory of 2708 1332 c7cda02f2f136ad064bd0c5014d623f9_JaffaCakes118.exe 84 PID 1332 wrote to memory of 2708 1332 c7cda02f2f136ad064bd0c5014d623f9_JaffaCakes118.exe 84 PID 1260 wrote to memory of 5040 1260 erqos.exe 104 PID 1260 wrote to memory of 5040 1260 erqos.exe 104 PID 1260 wrote to memory of 5040 1260 erqos.exe 104
Processes
-
C:\Users\Admin\AppData\Local\Temp\c7cda02f2f136ad064bd0c5014d623f9_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\c7cda02f2f136ad064bd0c5014d623f9_JaffaCakes118.exe"1⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1332 -
C:\Users\Admin\AppData\Local\Temp\erqos.exe"C:\Users\Admin\AppData\Local\Temp\erqos.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1260 -
C:\Users\Admin\AppData\Local\Temp\feyvp.exe"C:\Users\Admin\AppData\Local\Temp\feyvp.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:5040
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\_uinsey.bat" "2⤵
- System Location Discovery: System Language Discovery
PID:2708
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
304B
MD5ed0bc55935d6dfb5df599516f92d8785
SHA18588e3ba425766a9526faf48f20a38ec30df5748
SHA25677180c284849927d251d5d5464c9db55e11fb62936b67e30a98ff298b2192cbe
SHA51268e1b216ad0379144ecde616c72277cc99a45439accb9980ecae6975c40ee43826cf08953c88762142e60e7e62c2f8dd6ffb65cf2e2cb9af47e28fdfc6c738c1
-
Filesize
777KB
MD5cd8edffed79cd8b3f4386594c2abdaa3
SHA154991df430aefce1a6916dec1d14a6092f4120d5
SHA2561efec77bc1880a58ba2d8708d8ffac1845943f95e0bebf86e20504808b3a0bfe
SHA512eb8436194695c49fd0d63c6fda2f1c53b3aecd1d14ca6bd6d4b2d60d076c9b32f714dd8e9c1fe559781e77257b15e231749516bef6828655e6705baf9cc69cef
-
Filesize
156KB
MD582031423c33975d9d1cc1db32a5004e5
SHA183674ee1acec61ff29b7658e185066bbdf0e1159
SHA256ac51b9387c7740f50adffd405c2f8a62bc4a4222d88b12884b8dd4765782027d
SHA51285afc507d331e153912c18d0c33f46ed38648ec3d5bbe94f48ab2e2a8af73f5d74f9a425a6e2244b4ab1d6d6771f780e3490dd2b0f7e9791079f4168049c1f41
-
Filesize
512B
MD50cff299a2bb57c89c29ff58cb1d1e719
SHA10ee2a2450afc52cf6da0613ac5a0555c356480cd
SHA2564a2c549e3b2a4e7d66fd95af90803aed5faa672f2c60c11cf09b6787339fed16
SHA512e810847a966e43848fca1a4f98e0c79ec6e8a63d7e34553f19acf73c7c6709e29ea67c5d4b2e0c0bf6859b37f2528caedb9c3877fdfd1ddb9dc1a5cb0badb040