Analysis

  • max time kernel
    96s
  • max time network
    147s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    13-12-2024 04:39

General

  • Target

    e9ee4b6aa74639e8828bc4a855738e2b_JaffaCakes118.exe

  • Size

    264KB

  • MD5

    e9ee4b6aa74639e8828bc4a855738e2b

  • SHA1

    c3de0da45b74cb2e2fe366048f2272ac54950843

  • SHA256

    c7ce8e90ff659501b6ce2c4c76b2a753ae5ac6b48825b3cc259c05af4293fb12

  • SHA512

    61617ac90a7fb16ea8ebd14d2a5f52c01d56610fb5051b7653a18de28ad451f9a9a9c41173736c570fafd3205f77737fac680aece684258d70cf064cd72b43e3

  • SSDEEP

    3072:AUApueDWSppTaeskDEjUrqfkZ557YzAL9gFoI3X3fZE5UANakD:ASeyGpTaesaQUufkL57YsL9NIx9ANae

Score
10/10

Malware Config

Extracted

Family

urelas

C2

112.175.88.207

112.175.88.208

Signatures

  • Urelas

    Urelas is a trojan targeting card games.

  • Urelas family
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\e9ee4b6aa74639e8828bc4a855738e2b_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\e9ee4b6aa74639e8828bc4a855738e2b_JaffaCakes118.exe"
    1⤵
    • Checks computer location settings
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:4804
    • C:\Users\Admin\AppData\Local\Temp\huter.exe
      "C:\Users\Admin\AppData\Local\Temp\huter.exe"
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      PID:1992
    • C:\Windows\SysWOW64\cmd.exe
      C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\sanfdr.bat" "
      2⤵
      • System Location Discovery: System Language Discovery
      PID:3532

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\golfinfo.ini

    Filesize

    512B

    MD5

    4514d58bb3af5fd2132870ab9e2897d9

    SHA1

    9bf67ec19026e2485416a37315a32a19972a69ff

    SHA256

    8bc8fa165190f94d0f84f4c5772a7aee9aafd778e395effcdf501055b0658fa8

    SHA512

    07941b5f5275a931b8b7be9c94062714a6f8546ff3df4479638b6638960f61d35ad25fefa3bd7fc9b0934e9814c40169dce5803aac5e25ae932b698c85688738

  • C:\Users\Admin\AppData\Local\Temp\huter.exe

    Filesize

    264KB

    MD5

    29f9a096b387e438d5debfd3099f6d1f

    SHA1

    621b10bd48c6e9c1ef0cb1740edfbfedd44d093d

    SHA256

    86ae67224234d68459e9798557e79e84b9fdbe3ec899cb24f1d27c3e0d4ee474

    SHA512

    3eecd9ad0efb3e7ae5a33e0ee1f45a1a8eb00315c617af9ac505492a371af5da8ff652bb5c3f1e154f85d07550ced4341d25c04092d0a68843dcc6f9b74b957e

  • C:\Users\Admin\AppData\Local\Temp\sanfdr.bat

    Filesize

    302B

    MD5

    fb316370e87de74083319d43bcbf188a

    SHA1

    b3069646b6991d2663f1a6faf68a445b01b6cdba

    SHA256

    d46c3da6406aa50bf9837ae9d95b9f187766a207a57281cd5cdb0e82c2a95dbe

    SHA512

    16d154ae0a0710bbb6b8f32dd01863ee961bc97f51b278ba7ced2785240648923a0bb4a8b962a103996b282a5d69d095dcc514a324d279c279b7ca9406c8c2f1

  • memory/1992-11-0x0000000000D90000-0x0000000000DE1000-memory.dmp

    Filesize

    324KB

  • memory/1992-17-0x0000000000D90000-0x0000000000DE1000-memory.dmp

    Filesize

    324KB

  • memory/1992-18-0x0000000000D90000-0x0000000000DE1000-memory.dmp

    Filesize

    324KB

  • memory/4804-0-0x0000000000660000-0x00000000006B1000-memory.dmp

    Filesize

    324KB

  • memory/4804-14-0x0000000000660000-0x00000000006B1000-memory.dmp

    Filesize

    324KB