Analysis
-
max time kernel
150s -
max time network
125s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
11-12-2024 15:30
Behavioral task
behavioral1
Sample
e21bd1ce8652de07ebb8fc2ac63cd1c8_JaffaCakes118.exe
Resource
win7-20241010-en
General
-
Target
e21bd1ce8652de07ebb8fc2ac63cd1c8_JaffaCakes118.exe
-
Size
536KB
-
MD5
e21bd1ce8652de07ebb8fc2ac63cd1c8
-
SHA1
b325a20b7eef21aee68c2c89502cece3778d8eb4
-
SHA256
546850b46506512677c83c7688c6e7c832dbf6d3ceefb5d75bcebfb8bc738843
-
SHA512
71337eb0e8b77197af558bb5bae2e46ab269a941c1d79b727fbcc03429e89a3167e451077b6e6c9fb351a14b45496aeaf33393401f0751d572b89d44dfa3bdb6
-
SSDEEP
12288:q0nPhglq2Uyt4R/b2G/0hznQGoexBU/NP+:q0P/k4lb2wKat+
Malware Config
Extracted
urelas
218.54.31.226
218.54.31.165
Signatures
-
Urelas family
-
Deletes itself 1 IoCs
pid Process 2884 cmd.exe -
Executes dropped EXE 2 IoCs
pid Process 2456 puxor.exe 2908 fivib.exe -
Loads dropped DLL 2 IoCs
pid Process 3040 e21bd1ce8652de07ebb8fc2ac63cd1c8_JaffaCakes118.exe 2456 puxor.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language e21bd1ce8652de07ebb8fc2ac63cd1c8_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language puxor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language fivib.exe -
Suspicious behavior: EnumeratesProcesses 54 IoCs
pid Process 2908 fivib.exe 2908 fivib.exe 2908 fivib.exe 2908 fivib.exe 2908 fivib.exe 2908 fivib.exe 2908 fivib.exe 2908 fivib.exe 2908 fivib.exe 2908 fivib.exe 2908 fivib.exe 2908 fivib.exe 2908 fivib.exe 2908 fivib.exe 2908 fivib.exe 2908 fivib.exe 2908 fivib.exe 2908 fivib.exe 2908 fivib.exe 2908 fivib.exe 2908 fivib.exe 2908 fivib.exe 2908 fivib.exe 2908 fivib.exe 2908 fivib.exe 2908 fivib.exe 2908 fivib.exe 2908 fivib.exe 2908 fivib.exe 2908 fivib.exe 2908 fivib.exe 2908 fivib.exe 2908 fivib.exe 2908 fivib.exe 2908 fivib.exe 2908 fivib.exe 2908 fivib.exe 2908 fivib.exe 2908 fivib.exe 2908 fivib.exe 2908 fivib.exe 2908 fivib.exe 2908 fivib.exe 2908 fivib.exe 2908 fivib.exe 2908 fivib.exe 2908 fivib.exe 2908 fivib.exe 2908 fivib.exe 2908 fivib.exe 2908 fivib.exe 2908 fivib.exe 2908 fivib.exe 2908 fivib.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 3040 wrote to memory of 2456 3040 e21bd1ce8652de07ebb8fc2ac63cd1c8_JaffaCakes118.exe 30 PID 3040 wrote to memory of 2456 3040 e21bd1ce8652de07ebb8fc2ac63cd1c8_JaffaCakes118.exe 30 PID 3040 wrote to memory of 2456 3040 e21bd1ce8652de07ebb8fc2ac63cd1c8_JaffaCakes118.exe 30 PID 3040 wrote to memory of 2456 3040 e21bd1ce8652de07ebb8fc2ac63cd1c8_JaffaCakes118.exe 30 PID 3040 wrote to memory of 2884 3040 e21bd1ce8652de07ebb8fc2ac63cd1c8_JaffaCakes118.exe 31 PID 3040 wrote to memory of 2884 3040 e21bd1ce8652de07ebb8fc2ac63cd1c8_JaffaCakes118.exe 31 PID 3040 wrote to memory of 2884 3040 e21bd1ce8652de07ebb8fc2ac63cd1c8_JaffaCakes118.exe 31 PID 3040 wrote to memory of 2884 3040 e21bd1ce8652de07ebb8fc2ac63cd1c8_JaffaCakes118.exe 31 PID 2456 wrote to memory of 2908 2456 puxor.exe 33 PID 2456 wrote to memory of 2908 2456 puxor.exe 33 PID 2456 wrote to memory of 2908 2456 puxor.exe 33 PID 2456 wrote to memory of 2908 2456 puxor.exe 33
Processes
-
C:\Users\Admin\AppData\Local\Temp\e21bd1ce8652de07ebb8fc2ac63cd1c8_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\e21bd1ce8652de07ebb8fc2ac63cd1c8_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3040 -
C:\Users\Admin\AppData\Local\Temp\puxor.exe"C:\Users\Admin\AppData\Local\Temp\puxor.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2456 -
C:\Users\Admin\AppData\Local\Temp\fivib.exe"C:\Users\Admin\AppData\Local\Temp\fivib.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2908
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\_uinsey.bat" "2⤵
- Deletes itself
- System Location Discovery: System Language Discovery
PID:2884
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
304B
MD5f635367a17221a56d9322d98d440bdce
SHA1724f0dd475d044f21112e65f13fabfb8cedb2802
SHA256fe52a74745968d073097aa30ce2810245c81bef481e41d2c0f8ec65c2ea495ce
SHA512a661176341c256aa86d6d255e35b1f5a365ddfb475b1e15b04615216f19e73abc7f7a03eb208c8cce935db1d4bf1ff216d4a84096d0af85105172f64a89b41f8
-
Filesize
512B
MD5b8d21a52577372fe176f2c87e7c107ac
SHA1e5fe24b4905c828f7a19b4a6586d3ed72b47128f
SHA2569eb78073df66d9e00e109256cdc62531ad8076a2a07087eeb706b1580a959781
SHA5129210531397189dc3684e115607a90b5c8a9bb709cab00c4b7690f887cbcdb68b73d24dbdb70ed76044e9cc8f3fc8dfd21ee0255b1195891bdebdfc5ac4bab304
-
Filesize
236KB
MD5fbbacac130b7d47111dac862939d2d6d
SHA17aae081fae65ffac02a28f7b1099c8695355bd21
SHA25653b3482e2c0cda9ec4fe260ef13fb543bf2cf29ffaee7c6a9bfcb6bbfd3cd519
SHA512bd99b21a4065f25a69d2c785f3ff88b5e5729eccb0fd12b718ea2a4108c55c88f50c7fb25ebddc7546238cda9191d86fe3a425a9232daac52177d6df668ee623
-
Filesize
536KB
MD5a8593bb48f287e2fb53e13fdc0ed785f
SHA1aa2c340d613ab5456c973cf99ef5dae4a91e3577
SHA2560ce28719825ffaa267ee405840b013ede51ab146c646749926909233bf0910e9
SHA512151c81999087070f8611a879cf32667181e81762bdcb78f58aed6e9673461eb0a3fb806b81bea164f0460927d6486a715f9f1c8a86de45c593cb4b629de7a17c