Analysis
-
max time kernel
90s -
max time network
93s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
13-12-2024 04:39
Behavioral task
behavioral1
Sample
e9ee4b6aa74639e8828bc4a855738e2b_JaffaCakes118.exe
Resource
win7-20241010-en
General
-
Target
e9ee4b6aa74639e8828bc4a855738e2b_JaffaCakes118.exe
-
Size
264KB
-
MD5
e9ee4b6aa74639e8828bc4a855738e2b
-
SHA1
c3de0da45b74cb2e2fe366048f2272ac54950843
-
SHA256
c7ce8e90ff659501b6ce2c4c76b2a753ae5ac6b48825b3cc259c05af4293fb12
-
SHA512
61617ac90a7fb16ea8ebd14d2a5f52c01d56610fb5051b7653a18de28ad451f9a9a9c41173736c570fafd3205f77737fac680aece684258d70cf064cd72b43e3
-
SSDEEP
3072:AUApueDWSppTaeskDEjUrqfkZ557YzAL9gFoI3X3fZE5UANakD:ASeyGpTaesaQUufkL57YsL9NIx9ANae
Malware Config
Extracted
urelas
112.175.88.207
112.175.88.208
Signatures
-
Urelas family
-
Deletes itself 1 IoCs
pid Process 3012 cmd.exe -
Executes dropped EXE 1 IoCs
pid Process 2256 huter.exe -
Loads dropped DLL 1 IoCs
pid Process 1344 e9ee4b6aa74639e8828bc4a855738e2b_JaffaCakes118.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language e9ee4b6aa74639e8828bc4a855738e2b_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language huter.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 1344 wrote to memory of 2256 1344 e9ee4b6aa74639e8828bc4a855738e2b_JaffaCakes118.exe 29 PID 1344 wrote to memory of 2256 1344 e9ee4b6aa74639e8828bc4a855738e2b_JaffaCakes118.exe 29 PID 1344 wrote to memory of 2256 1344 e9ee4b6aa74639e8828bc4a855738e2b_JaffaCakes118.exe 29 PID 1344 wrote to memory of 2256 1344 e9ee4b6aa74639e8828bc4a855738e2b_JaffaCakes118.exe 29 PID 1344 wrote to memory of 3012 1344 e9ee4b6aa74639e8828bc4a855738e2b_JaffaCakes118.exe 30 PID 1344 wrote to memory of 3012 1344 e9ee4b6aa74639e8828bc4a855738e2b_JaffaCakes118.exe 30 PID 1344 wrote to memory of 3012 1344 e9ee4b6aa74639e8828bc4a855738e2b_JaffaCakes118.exe 30 PID 1344 wrote to memory of 3012 1344 e9ee4b6aa74639e8828bc4a855738e2b_JaffaCakes118.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\e9ee4b6aa74639e8828bc4a855738e2b_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\e9ee4b6aa74639e8828bc4a855738e2b_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1344 -
C:\Users\Admin\AppData\Local\Temp\huter.exe"C:\Users\Admin\AppData\Local\Temp\huter.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2256
-
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\sanfdr.bat" "2⤵
- Deletes itself
- System Location Discovery: System Language Discovery
PID:3012
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
512B
MD54514d58bb3af5fd2132870ab9e2897d9
SHA19bf67ec19026e2485416a37315a32a19972a69ff
SHA2568bc8fa165190f94d0f84f4c5772a7aee9aafd778e395effcdf501055b0658fa8
SHA51207941b5f5275a931b8b7be9c94062714a6f8546ff3df4479638b6638960f61d35ad25fefa3bd7fc9b0934e9814c40169dce5803aac5e25ae932b698c85688738
-
Filesize
302B
MD5fb316370e87de74083319d43bcbf188a
SHA1b3069646b6991d2663f1a6faf68a445b01b6cdba
SHA256d46c3da6406aa50bf9837ae9d95b9f187766a207a57281cd5cdb0e82c2a95dbe
SHA51216d154ae0a0710bbb6b8f32dd01863ee961bc97f51b278ba7ced2785240648923a0bb4a8b962a103996b282a5d69d095dcc514a324d279c279b7ca9406c8c2f1
-
Filesize
264KB
MD51328c7b8bc25e909bd1ed2192209417b
SHA189394f46f91569c2896b67c5f21bb18469c2eb2c
SHA256ba7840994685e5ecb5a82c5b10671b106b6d1b5fd7126f741ff562d0c210e6e8
SHA512be4cb40a49df38b8597910a8520a50bc55e100c0ab8bb635620c178db5cccc3442907cd0dbd3f3bbfa447edb00caf898f9732caa958697fd7a4adffd541b241b