Analysis
-
max time kernel
96s -
max time network
147s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
13-12-2024 04:39
Behavioral task
behavioral1
Sample
e9ee4b6aa74639e8828bc4a855738e2b_JaffaCakes118.exe
Resource
win7-20241010-en
General
-
Target
e9ee4b6aa74639e8828bc4a855738e2b_JaffaCakes118.exe
-
Size
264KB
-
MD5
e9ee4b6aa74639e8828bc4a855738e2b
-
SHA1
c3de0da45b74cb2e2fe366048f2272ac54950843
-
SHA256
c7ce8e90ff659501b6ce2c4c76b2a753ae5ac6b48825b3cc259c05af4293fb12
-
SHA512
61617ac90a7fb16ea8ebd14d2a5f52c01d56610fb5051b7653a18de28ad451f9a9a9c41173736c570fafd3205f77737fac680aece684258d70cf064cd72b43e3
-
SSDEEP
3072:AUApueDWSppTaeskDEjUrqfkZ557YzAL9gFoI3X3fZE5UANakD:ASeyGpTaesaQUufkL57YsL9NIx9ANae
Malware Config
Extracted
urelas
112.175.88.207
112.175.88.208
Signatures
-
Urelas family
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Control Panel\International\Geo\Nation e9ee4b6aa74639e8828bc4a855738e2b_JaffaCakes118.exe -
Executes dropped EXE 1 IoCs
pid Process 1992 huter.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language huter.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language e9ee4b6aa74639e8828bc4a855738e2b_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 4804 wrote to memory of 1992 4804 e9ee4b6aa74639e8828bc4a855738e2b_JaffaCakes118.exe 85 PID 4804 wrote to memory of 1992 4804 e9ee4b6aa74639e8828bc4a855738e2b_JaffaCakes118.exe 85 PID 4804 wrote to memory of 1992 4804 e9ee4b6aa74639e8828bc4a855738e2b_JaffaCakes118.exe 85 PID 4804 wrote to memory of 3532 4804 e9ee4b6aa74639e8828bc4a855738e2b_JaffaCakes118.exe 86 PID 4804 wrote to memory of 3532 4804 e9ee4b6aa74639e8828bc4a855738e2b_JaffaCakes118.exe 86 PID 4804 wrote to memory of 3532 4804 e9ee4b6aa74639e8828bc4a855738e2b_JaffaCakes118.exe 86
Processes
-
C:\Users\Admin\AppData\Local\Temp\e9ee4b6aa74639e8828bc4a855738e2b_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\e9ee4b6aa74639e8828bc4a855738e2b_JaffaCakes118.exe"1⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4804 -
C:\Users\Admin\AppData\Local\Temp\huter.exe"C:\Users\Admin\AppData\Local\Temp\huter.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1992
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\sanfdr.bat" "2⤵
- System Location Discovery: System Language Discovery
PID:3532
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
512B
MD54514d58bb3af5fd2132870ab9e2897d9
SHA19bf67ec19026e2485416a37315a32a19972a69ff
SHA2568bc8fa165190f94d0f84f4c5772a7aee9aafd778e395effcdf501055b0658fa8
SHA51207941b5f5275a931b8b7be9c94062714a6f8546ff3df4479638b6638960f61d35ad25fefa3bd7fc9b0934e9814c40169dce5803aac5e25ae932b698c85688738
-
Filesize
264KB
MD529f9a096b387e438d5debfd3099f6d1f
SHA1621b10bd48c6e9c1ef0cb1740edfbfedd44d093d
SHA25686ae67224234d68459e9798557e79e84b9fdbe3ec899cb24f1d27c3e0d4ee474
SHA5123eecd9ad0efb3e7ae5a33e0ee1f45a1a8eb00315c617af9ac505492a371af5da8ff652bb5c3f1e154f85d07550ced4341d25c04092d0a68843dcc6f9b74b957e
-
Filesize
302B
MD5fb316370e87de74083319d43bcbf188a
SHA1b3069646b6991d2663f1a6faf68a445b01b6cdba
SHA256d46c3da6406aa50bf9837ae9d95b9f187766a207a57281cd5cdb0e82c2a95dbe
SHA51216d154ae0a0710bbb6b8f32dd01863ee961bc97f51b278ba7ced2785240648923a0bb4a8b962a103996b282a5d69d095dcc514a324d279c279b7ca9406c8c2f1