Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    149s
  • max time network
    153s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    05/12/2024, 12:58

General

  • Target

    c7cda02f2f136ad064bd0c5014d623f9_JaffaCakes118.exe

  • Size

    777KB

  • MD5

    c7cda02f2f136ad064bd0c5014d623f9

  • SHA1

    95de8248db7678b929491e381a24258105b3111e

  • SHA256

    f1ff7d6e883357e0e5509d5f83dac3e3af91670089510b76cc7caba699659c71

  • SHA512

    137aa13bcc35b108bff3c10ba17b9be13ece93cd0786bba08755262806b992a54cffd22cb6660f9bacab74091580147e2f87d7964816d71f5e51415b4be65f58

  • SSDEEP

    12288:YOlx4kk9HKda4YfM/1T3PPSnPI2VAWNDTJHq9DIMTW8c1O:YA4Ya1fQzPPSnPFqWtTJK9DIMTW8t

Score
10/10

Malware Config

Extracted

Family

urelas

C2

1.234.83.146

133.242.129.155

218.54.31.226

218.54.31.165

Signatures

  • Urelas

    Urelas is a trojan targeting card games.

  • Urelas family
  • Checks computer location settings 2 TTPs 2 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 4 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 9 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\c7cda02f2f136ad064bd0c5014d623f9_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\c7cda02f2f136ad064bd0c5014d623f9_JaffaCakes118.exe"
    1⤵
    • Checks computer location settings
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:1332
    • C:\Users\Admin\AppData\Local\Temp\erqos.exe
      "C:\Users\Admin\AppData\Local\Temp\erqos.exe"
      2⤵
      • Checks computer location settings
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:1260
      • C:\Users\Admin\AppData\Local\Temp\feyvp.exe
        "C:\Users\Admin\AppData\Local\Temp\feyvp.exe"
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:5040
    • C:\Windows\SysWOW64\cmd.exe
      C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\_uinsey.bat" "
      2⤵
      • System Location Discovery: System Language Discovery
      PID:2708

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\_uinsey.bat

    Filesize

    304B

    MD5

    ed0bc55935d6dfb5df599516f92d8785

    SHA1

    8588e3ba425766a9526faf48f20a38ec30df5748

    SHA256

    77180c284849927d251d5d5464c9db55e11fb62936b67e30a98ff298b2192cbe

    SHA512

    68e1b216ad0379144ecde616c72277cc99a45439accb9980ecae6975c40ee43826cf08953c88762142e60e7e62c2f8dd6ffb65cf2e2cb9af47e28fdfc6c738c1

  • C:\Users\Admin\AppData\Local\Temp\erqos.exe

    Filesize

    777KB

    MD5

    cd8edffed79cd8b3f4386594c2abdaa3

    SHA1

    54991df430aefce1a6916dec1d14a6092f4120d5

    SHA256

    1efec77bc1880a58ba2d8708d8ffac1845943f95e0bebf86e20504808b3a0bfe

    SHA512

    eb8436194695c49fd0d63c6fda2f1c53b3aecd1d14ca6bd6d4b2d60d076c9b32f714dd8e9c1fe559781e77257b15e231749516bef6828655e6705baf9cc69cef

  • C:\Users\Admin\AppData\Local\Temp\feyvp.exe

    Filesize

    156KB

    MD5

    82031423c33975d9d1cc1db32a5004e5

    SHA1

    83674ee1acec61ff29b7658e185066bbdf0e1159

    SHA256

    ac51b9387c7740f50adffd405c2f8a62bc4a4222d88b12884b8dd4765782027d

    SHA512

    85afc507d331e153912c18d0c33f46ed38648ec3d5bbe94f48ab2e2a8af73f5d74f9a425a6e2244b4ab1d6d6771f780e3490dd2b0f7e9791079f4168049c1f41

  • C:\Users\Admin\AppData\Local\Temp\golfinfo.ini

    Filesize

    512B

    MD5

    0cff299a2bb57c89c29ff58cb1d1e719

    SHA1

    0ee2a2450afc52cf6da0613ac5a0555c356480cd

    SHA256

    4a2c549e3b2a4e7d66fd95af90803aed5faa672f2c60c11cf09b6787339fed16

    SHA512

    e810847a966e43848fca1a4f98e0c79ec6e8a63d7e34553f19acf73c7c6709e29ea67c5d4b2e0c0bf6859b37f2528caedb9c3877fdfd1ddb9dc1a5cb0badb040

  • memory/1260-28-0x0000000000580000-0x0000000000649000-memory.dmp

    Filesize

    804KB

  • memory/1260-12-0x0000000000580000-0x0000000000649000-memory.dmp

    Filesize

    804KB

  • memory/1260-17-0x0000000000580000-0x0000000000649000-memory.dmp

    Filesize

    804KB

  • memory/1332-14-0x00000000007D0000-0x0000000000899000-memory.dmp

    Filesize

    804KB

  • memory/1332-0-0x00000000007D0000-0x0000000000899000-memory.dmp

    Filesize

    804KB

  • memory/5040-26-0x0000000000400000-0x000000000048F000-memory.dmp

    Filesize

    572KB

  • memory/5040-27-0x0000000001F60000-0x0000000001F62000-memory.dmp

    Filesize

    8KB

  • memory/5040-31-0x0000000001F60000-0x0000000001F62000-memory.dmp

    Filesize

    8KB

  • memory/5040-30-0x0000000000400000-0x000000000048F000-memory.dmp

    Filesize

    572KB

  • memory/5040-32-0x0000000000400000-0x000000000048F000-memory.dmp

    Filesize

    572KB

  • memory/5040-33-0x0000000000400000-0x000000000048F000-memory.dmp

    Filesize

    572KB

  • memory/5040-34-0x0000000000400000-0x000000000048F000-memory.dmp

    Filesize

    572KB

  • memory/5040-35-0x0000000000400000-0x000000000048F000-memory.dmp

    Filesize

    572KB