Analysis

  • max time kernel
    90s
  • max time network
    93s
  • platform
    windows7_x64
  • resource
    win7-20241010-en
  • resource tags

    arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system
  • submitted
    13-12-2024 04:39

General

  • Target

    e9ee4b6aa74639e8828bc4a855738e2b_JaffaCakes118.exe

  • Size

    264KB

  • MD5

    e9ee4b6aa74639e8828bc4a855738e2b

  • SHA1

    c3de0da45b74cb2e2fe366048f2272ac54950843

  • SHA256

    c7ce8e90ff659501b6ce2c4c76b2a753ae5ac6b48825b3cc259c05af4293fb12

  • SHA512

    61617ac90a7fb16ea8ebd14d2a5f52c01d56610fb5051b7653a18de28ad451f9a9a9c41173736c570fafd3205f77737fac680aece684258d70cf064cd72b43e3

  • SSDEEP

    3072:AUApueDWSppTaeskDEjUrqfkZ557YzAL9gFoI3X3fZE5UANakD:ASeyGpTaesaQUufkL57YsL9NIx9ANae

Score
10/10

Malware Config

Extracted

Family

urelas

C2

112.175.88.207

112.175.88.208

Signatures

  • Urelas

    Urelas is a trojan targeting card games.

  • Urelas family
  • Deletes itself 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\e9ee4b6aa74639e8828bc4a855738e2b_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\e9ee4b6aa74639e8828bc4a855738e2b_JaffaCakes118.exe"
    1⤵
    • Loads dropped DLL
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:1344
    • C:\Users\Admin\AppData\Local\Temp\huter.exe
      "C:\Users\Admin\AppData\Local\Temp\huter.exe"
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      PID:2256
    • C:\Windows\SysWOW64\cmd.exe
      cmd /c ""C:\Users\Admin\AppData\Local\Temp\sanfdr.bat" "
      2⤵
      • Deletes itself
      • System Location Discovery: System Language Discovery
      PID:3012

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\golfinfo.ini

    Filesize

    512B

    MD5

    4514d58bb3af5fd2132870ab9e2897d9

    SHA1

    9bf67ec19026e2485416a37315a32a19972a69ff

    SHA256

    8bc8fa165190f94d0f84f4c5772a7aee9aafd778e395effcdf501055b0658fa8

    SHA512

    07941b5f5275a931b8b7be9c94062714a6f8546ff3df4479638b6638960f61d35ad25fefa3bd7fc9b0934e9814c40169dce5803aac5e25ae932b698c85688738

  • C:\Users\Admin\AppData\Local\Temp\sanfdr.bat

    Filesize

    302B

    MD5

    fb316370e87de74083319d43bcbf188a

    SHA1

    b3069646b6991d2663f1a6faf68a445b01b6cdba

    SHA256

    d46c3da6406aa50bf9837ae9d95b9f187766a207a57281cd5cdb0e82c2a95dbe

    SHA512

    16d154ae0a0710bbb6b8f32dd01863ee961bc97f51b278ba7ced2785240648923a0bb4a8b962a103996b282a5d69d095dcc514a324d279c279b7ca9406c8c2f1

  • \Users\Admin\AppData\Local\Temp\huter.exe

    Filesize

    264KB

    MD5

    1328c7b8bc25e909bd1ed2192209417b

    SHA1

    89394f46f91569c2896b67c5f21bb18469c2eb2c

    SHA256

    ba7840994685e5ecb5a82c5b10671b106b6d1b5fd7126f741ff562d0c210e6e8

    SHA512

    be4cb40a49df38b8597910a8520a50bc55e100c0ab8bb635620c178db5cccc3442907cd0dbd3f3bbfa447edb00caf898f9732caa958697fd7a4adffd541b241b

  • memory/1344-0-0x0000000001130000-0x0000000001181000-memory.dmp

    Filesize

    324KB

  • memory/1344-8-0x0000000000AE0000-0x0000000000B31000-memory.dmp

    Filesize

    324KB

  • memory/1344-18-0x0000000001130000-0x0000000001181000-memory.dmp

    Filesize

    324KB

  • memory/2256-10-0x0000000000220000-0x0000000000271000-memory.dmp

    Filesize

    324KB

  • memory/2256-21-0x0000000000220000-0x0000000000271000-memory.dmp

    Filesize

    324KB

  • memory/2256-22-0x0000000000220000-0x0000000000271000-memory.dmp

    Filesize

    324KB