Analysis
-
max time kernel
148s -
max time network
74s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
15-12-2024 07:13
Behavioral task
behavioral1
Sample
f2df30ab3dc6a8298005ced4a8c58032_JaffaCakes118.exe
Resource
win7-20240903-en
General
-
Target
f2df30ab3dc6a8298005ced4a8c58032_JaffaCakes118.exe
-
Size
689KB
-
MD5
f2df30ab3dc6a8298005ced4a8c58032
-
SHA1
e57e8f03b39887034cfb613336a1df06f0c41622
-
SHA256
dcf55e637c4590a1b2da8d7dd24021999991de7e84d26f37d3ca9ee2a439bc91
-
SHA512
18bd7492522c1d036821275f12acf07ab945a7f1904533f7c2c2986d09705d647e06ee7fcac0e7983b7476f20331e2acd1fa37dd4aec03b0489d0c0393cf2e21
-
SSDEEP
12288:LUyI6hJQglQA0IWb8DmPySxEuBZDxywHBlP94jpguwDxXlZ1nw:dVh6gl6Iy8R9+ZdnnP94jpgl9Bnw
Malware Config
Extracted
urelas
218.54.31.226
218.54.31.165
Signatures
-
Urelas family
-
Deletes itself 1 IoCs
pid Process 2360 cmd.exe -
Executes dropped EXE 3 IoCs
pid Process 2744 koipg.exe 2676 zilyaz.exe 2368 pedyv.exe -
Loads dropped DLL 5 IoCs
pid Process 2400 f2df30ab3dc6a8298005ced4a8c58032_JaffaCakes118.exe 2400 f2df30ab3dc6a8298005ced4a8c58032_JaffaCakes118.exe 2744 koipg.exe 2744 koipg.exe 2676 zilyaz.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 6 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language zilyaz.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language pedyv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language f2df30ab3dc6a8298005ced4a8c58032_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language koipg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Suspicious behavior: EnumeratesProcesses 13 IoCs
pid Process 2368 pedyv.exe 2368 pedyv.exe 2368 pedyv.exe 2368 pedyv.exe 2368 pedyv.exe 2368 pedyv.exe 2368 pedyv.exe 2368 pedyv.exe 2368 pedyv.exe 2368 pedyv.exe 2368 pedyv.exe 2368 pedyv.exe 2368 pedyv.exe -
Suspicious use of WriteProcessMemory 20 IoCs
description pid Process procid_target PID 2400 wrote to memory of 2744 2400 f2df30ab3dc6a8298005ced4a8c58032_JaffaCakes118.exe 30 PID 2400 wrote to memory of 2744 2400 f2df30ab3dc6a8298005ced4a8c58032_JaffaCakes118.exe 30 PID 2400 wrote to memory of 2744 2400 f2df30ab3dc6a8298005ced4a8c58032_JaffaCakes118.exe 30 PID 2400 wrote to memory of 2744 2400 f2df30ab3dc6a8298005ced4a8c58032_JaffaCakes118.exe 30 PID 2400 wrote to memory of 2360 2400 f2df30ab3dc6a8298005ced4a8c58032_JaffaCakes118.exe 31 PID 2400 wrote to memory of 2360 2400 f2df30ab3dc6a8298005ced4a8c58032_JaffaCakes118.exe 31 PID 2400 wrote to memory of 2360 2400 f2df30ab3dc6a8298005ced4a8c58032_JaffaCakes118.exe 31 PID 2400 wrote to memory of 2360 2400 f2df30ab3dc6a8298005ced4a8c58032_JaffaCakes118.exe 31 PID 2744 wrote to memory of 2676 2744 koipg.exe 33 PID 2744 wrote to memory of 2676 2744 koipg.exe 33 PID 2744 wrote to memory of 2676 2744 koipg.exe 33 PID 2744 wrote to memory of 2676 2744 koipg.exe 33 PID 2676 wrote to memory of 2368 2676 zilyaz.exe 34 PID 2676 wrote to memory of 2368 2676 zilyaz.exe 34 PID 2676 wrote to memory of 2368 2676 zilyaz.exe 34 PID 2676 wrote to memory of 2368 2676 zilyaz.exe 34 PID 2676 wrote to memory of 3048 2676 zilyaz.exe 35 PID 2676 wrote to memory of 3048 2676 zilyaz.exe 35 PID 2676 wrote to memory of 3048 2676 zilyaz.exe 35 PID 2676 wrote to memory of 3048 2676 zilyaz.exe 35
Processes
-
C:\Users\Admin\AppData\Local\Temp\f2df30ab3dc6a8298005ced4a8c58032_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\f2df30ab3dc6a8298005ced4a8c58032_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2400 -
C:\Users\Admin\AppData\Local\Temp\koipg.exe"C:\Users\Admin\AppData\Local\Temp\koipg.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2744 -
C:\Users\Admin\AppData\Local\Temp\zilyaz.exe"C:\Users\Admin\AppData\Local\Temp\zilyaz.exe" OK3⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2676 -
C:\Users\Admin\AppData\Local\Temp\pedyv.exe"C:\Users\Admin\AppData\Local\Temp\pedyv.exe"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2368
-
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\_vslite.bat" "4⤵
- System Location Discovery: System Language Discovery
PID:3048
-
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\_vslite.bat" "2⤵
- Deletes itself
- System Location Discovery: System Language Discovery
PID:2360
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
304B
MD5010ef92c704fc698e235a8477d9f40a4
SHA1b5a3e3b84c3a4796cb54fa048f3276c19209d1b5
SHA256ed0a76e80710b6d046b6ede85c959903d416d29aa55b36bebc010827e68e6d69
SHA512c9581b51833b2193c4f348d37800691d8898d63dfafbc5324516e8fc25eab461ee69b414b3856d4b40e6a839fa044d62fe1dfb527a81859bf198e95ace72c6d8
-
Filesize
224B
MD527ed66d938a5cc1aaa2b6a9abd9d765a
SHA1047ad7fe6808a2bd68e6b6fcd7282c6ec928eef4
SHA256f99afe245c93d24d45f1539d9f261a026c62e0b217d1c7ab909965170f1c5ad4
SHA5128541cd2e3e400a4eaf907b1b41c8211ef8ca7508e80982dd0c10fd493b0959ca36adb66208a986990d7c522f633865d650575f36566cc2f51c20e9f0cfa02fe1
-
Filesize
104B
MD5dbef593bccc2049f860f718cd6fec321
SHA1e7e9f8235b4eb70aa99dd2c38009f2152575a8d0
SHA25630f820bb1ca6c20bcd77113c7377e01f31cdf0ec5b64864f22887d41a9bf3c7a
SHA5123e87c661c343b72f5dff4587b99688dbf655be9d6d903a75151bd9f204f55858e90388591f660bcbded5278ef94e322bf3e7c57374c9b16fce1eef7082395a2a
-
Filesize
512B
MD52e961f99300c5f807e1805c74381f640
SHA181625282892e9a44e7ef8e0a305e21a3ebcf1d31
SHA256b94274faf4d33efb4cba8b955d4499c26d8aadd0d3d51731819aed3c46a5cec1
SHA5122fcc3e2c6493660d2bdaf5cb053a2f033ce9f5f3b6c06087b65dda7aa79226960d869485b92911735c78831864b77b4646ec09ba21a73199526af6d8374a53c5
-
Filesize
689KB
MD5a3e6828573981e879429ca23c57bf992
SHA1e4decf8b1b7da4744007883a74d67c70da0d213a
SHA256f3f68a7f950cbc1eedfb93b7108559a2d199c11b769f7ed87bf722513706ab3f
SHA5120e0494341f3a45922ea5fec2c65ae92c17cc4bb46d647f39859e0374ea314299ceedf65e5d2aee7c55ca85db384239690d9480d4734c769c9fe06ad82f38f537
-
Filesize
469KB
MD59da353d4758ef39c6fcab22ca9ffb731
SHA14bb964579379e8e6b1a19de3f498cada7021df3e
SHA2568975e234fe73b57fc60c139120d948e14f0cc04f63d0f6f758038da61fa72ef0
SHA51247dad664606ef42186f73a1599c2d5fd912f09a70027ffe25fb2c73b9ea93940794ecef93cffb6940cbf165b24c5c2b39f7dceaa0643fdc939337d2c00b5baf0