Analysis
-
max time kernel
149s -
max time network
148s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
16-12-2024 10:19
Behavioral task
behavioral1
Sample
f88cd779d9bab641e74e74e61afd2da2_JaffaCakes118.exe
Resource
win7-20240903-en
General
-
Target
f88cd779d9bab641e74e74e61afd2da2_JaffaCakes118.exe
-
Size
466KB
-
MD5
f88cd779d9bab641e74e74e61afd2da2
-
SHA1
f188afa244b6a3a20f79eb4c561b89170f004a5a
-
SHA256
660cd2f79587b978e8449da2fc2926b3d815626c595facfeadd35a95133d144f
-
SHA512
39c140fdd4d525c73e0e698cf5b7a173f3f900c18d1232a146be9aefdeed10b62f7dc5664ef4cc22905db018fa033cc5211152157e253158ee46e72ca4e5c3e0
-
SSDEEP
12288:Y6twjLHj/8/GcHUIdPPzEmvTnabAh0ZnAr1Ui:Y6tQCG0UUPzEkTn4AC1+J
Malware Config
Extracted
urelas
1.234.83.146
133.242.129.155
218.54.31.226
218.54.30.235
Signatures
-
Urelas family
-
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Control Panel\International\Geo\Nation f88cd779d9bab641e74e74e61afd2da2_JaffaCakes118.exe Key value queried \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Control Panel\International\Geo\Nation woxud.exe -
Executes dropped EXE 2 IoCs
pid Process 3392 woxud.exe 3956 domid.exe -
resource yara_rule behavioral2/files/0x0005000000000034-22.dat upx behavioral2/memory/3956-26-0x0000000000400000-0x000000000049F000-memory.dmp upx behavioral2/memory/3956-29-0x0000000000400000-0x000000000049F000-memory.dmp upx behavioral2/memory/3956-30-0x0000000000400000-0x000000000049F000-memory.dmp upx behavioral2/memory/3956-31-0x0000000000400000-0x000000000049F000-memory.dmp upx behavioral2/memory/3956-32-0x0000000000400000-0x000000000049F000-memory.dmp upx behavioral2/memory/3956-33-0x0000000000400000-0x000000000049F000-memory.dmp upx behavioral2/memory/3956-34-0x0000000000400000-0x000000000049F000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language f88cd779d9bab641e74e74e61afd2da2_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language woxud.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language domid.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 3956 domid.exe 3956 domid.exe 3956 domid.exe 3956 domid.exe 3956 domid.exe 3956 domid.exe 3956 domid.exe 3956 domid.exe 3956 domid.exe 3956 domid.exe 3956 domid.exe 3956 domid.exe 3956 domid.exe 3956 domid.exe 3956 domid.exe 3956 domid.exe 3956 domid.exe 3956 domid.exe 3956 domid.exe 3956 domid.exe 3956 domid.exe 3956 domid.exe 3956 domid.exe 3956 domid.exe 3956 domid.exe 3956 domid.exe 3956 domid.exe 3956 domid.exe 3956 domid.exe 3956 domid.exe 3956 domid.exe 3956 domid.exe 3956 domid.exe 3956 domid.exe 3956 domid.exe 3956 domid.exe 3956 domid.exe 3956 domid.exe 3956 domid.exe 3956 domid.exe 3956 domid.exe 3956 domid.exe 3956 domid.exe 3956 domid.exe 3956 domid.exe 3956 domid.exe 3956 domid.exe 3956 domid.exe 3956 domid.exe 3956 domid.exe 3956 domid.exe 3956 domid.exe 3956 domid.exe 3956 domid.exe 3956 domid.exe 3956 domid.exe 3956 domid.exe 3956 domid.exe 3956 domid.exe 3956 domid.exe 3956 domid.exe 3956 domid.exe 3956 domid.exe 3956 domid.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 1208 wrote to memory of 3392 1208 f88cd779d9bab641e74e74e61afd2da2_JaffaCakes118.exe 82 PID 1208 wrote to memory of 3392 1208 f88cd779d9bab641e74e74e61afd2da2_JaffaCakes118.exe 82 PID 1208 wrote to memory of 3392 1208 f88cd779d9bab641e74e74e61afd2da2_JaffaCakes118.exe 82 PID 1208 wrote to memory of 3960 1208 f88cd779d9bab641e74e74e61afd2da2_JaffaCakes118.exe 83 PID 1208 wrote to memory of 3960 1208 f88cd779d9bab641e74e74e61afd2da2_JaffaCakes118.exe 83 PID 1208 wrote to memory of 3960 1208 f88cd779d9bab641e74e74e61afd2da2_JaffaCakes118.exe 83 PID 3392 wrote to memory of 3956 3392 woxud.exe 94 PID 3392 wrote to memory of 3956 3392 woxud.exe 94 PID 3392 wrote to memory of 3956 3392 woxud.exe 94
Processes
-
C:\Users\Admin\AppData\Local\Temp\f88cd779d9bab641e74e74e61afd2da2_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\f88cd779d9bab641e74e74e61afd2da2_JaffaCakes118.exe"1⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1208 -
C:\Users\Admin\AppData\Local\Temp\woxud.exe"C:\Users\Admin\AppData\Local\Temp\woxud.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3392 -
C:\Users\Admin\AppData\Local\Temp\domid.exe"C:\Users\Admin\AppData\Local\Temp\domid.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:3956
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\_sannuy.bat" "2⤵
- System Location Discovery: System Language Discovery
PID:3960
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
304B
MD58a02e4aa8dbb123b3deb28f00aba5baa
SHA16b79b6b03b76876e63e957522a755b1b741eb4d6
SHA25645adc6bb7fb413d0961bfab892ff274c8c3c55cf45ac62d8702008fe54db57e7
SHA512c41b5381b8c6a20a243724b2742a3da1dc09375c5bf316d1f2d2861c238bcee3e7a50500f5ad27120464e13e5b727249d3c9599ee5396732acd1be2cbe813259
-
Filesize
198KB
MD563ba2d031a08d84b9034a16ddca1245e
SHA18444ecb632299c8872ccf97d4316f2dc435c65e3
SHA2569e82aff7a43029f8d5752573cda65770694b2a9e491c476bfe9233ad674f3bdd
SHA51281d30a4cf354839689b4a9382a0621d5e2a628a15740c3e48f7d2dee44ce00269caa3534c593950ad79cccfac6afaf7a4128920baa5cf0df671bef01ce6119cd
-
Filesize
512B
MD59daa36390707c3ef3d99e0bcf2eecc7f
SHA13a1bf424a99b5fc668e39b37b270efb7d70391d2
SHA2567a3632d612e9c243a82ff8a299e83bc9e6f8d70efb0e33976d53f66de7ac697d
SHA512f561b72375cf95744044c1a076590f15accad946b69f006fde356e4db4a5df72bb1e1631b85a992a5c63858467dc86b67469c035b8a2e112ebf442bc6dac72f1
-
Filesize
467KB
MD5e5ec38a342a97d581c09802ec16fd067
SHA1cdacc23e6a9fe46fb5a541e73ac34a300b6e8392
SHA25650cc590aee50ea122f6e30d954a22b3675267732ea0bfb2f4d012ed4294d4d04
SHA5123d4defddc48c454a0e4a54c8aeca82aa27b308a53e0f81c5972fb81d19a33e0b7a1abf1b407be7725faa4cb04af09be3f3caab3d2d8c5622fced1a1e2c56f15b