Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
149s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
19/12/2024, 08:36
Behavioral task
behavioral1
Sample
ff2b44271e9fc1445eed772127711c2c_JaffaCakes118.exe
Resource
win7-20240903-en
General
-
Target
ff2b44271e9fc1445eed772127711c2c_JaffaCakes118.exe
-
Size
510KB
-
MD5
ff2b44271e9fc1445eed772127711c2c
-
SHA1
021f59e4188045c81865b5cfe39aef317ba16254
-
SHA256
57c9cd06c2af5592ce38d3246112878ca76ca875e91cb90f569cfdfe303428f5
-
SHA512
44ad99cb4419b7aa7bf28d9d1ca3178935e66ab7a10cda835ffeace8a4ea550dbba5ad684d7a8b487c1cde313f1d58a7ff055259812d9f1d5764e75943f36ba1
-
SSDEEP
12288:j/fCEOMsm8nc3qWQ8wqKhb43nLl5tDrXlFV:j/D0caF8wvhb43pDbV
Malware Config
Extracted
urelas
1.234.83.146
133.242.129.155
218.54.31.226
218.54.30.235
218.54.31.165
Signatures
-
Urelas family
-
Deletes itself 1 IoCs
pid Process 2668 cmd.exe -
Executes dropped EXE 2 IoCs
pid Process 2748 uhelo.exe 1276 zoiso.exe -
Loads dropped DLL 2 IoCs
pid Process 2440 ff2b44271e9fc1445eed772127711c2c_JaffaCakes118.exe 2748 uhelo.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language uhelo.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language zoiso.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ff2b44271e9fc1445eed772127711c2c_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Suspicious behavior: EnumeratesProcesses 54 IoCs
pid Process 1276 zoiso.exe 1276 zoiso.exe 1276 zoiso.exe 1276 zoiso.exe 1276 zoiso.exe 1276 zoiso.exe 1276 zoiso.exe 1276 zoiso.exe 1276 zoiso.exe 1276 zoiso.exe 1276 zoiso.exe 1276 zoiso.exe 1276 zoiso.exe 1276 zoiso.exe 1276 zoiso.exe 1276 zoiso.exe 1276 zoiso.exe 1276 zoiso.exe 1276 zoiso.exe 1276 zoiso.exe 1276 zoiso.exe 1276 zoiso.exe 1276 zoiso.exe 1276 zoiso.exe 1276 zoiso.exe 1276 zoiso.exe 1276 zoiso.exe 1276 zoiso.exe 1276 zoiso.exe 1276 zoiso.exe 1276 zoiso.exe 1276 zoiso.exe 1276 zoiso.exe 1276 zoiso.exe 1276 zoiso.exe 1276 zoiso.exe 1276 zoiso.exe 1276 zoiso.exe 1276 zoiso.exe 1276 zoiso.exe 1276 zoiso.exe 1276 zoiso.exe 1276 zoiso.exe 1276 zoiso.exe 1276 zoiso.exe 1276 zoiso.exe 1276 zoiso.exe 1276 zoiso.exe 1276 zoiso.exe 1276 zoiso.exe 1276 zoiso.exe 1276 zoiso.exe 1276 zoiso.exe 1276 zoiso.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 2440 wrote to memory of 2748 2440 ff2b44271e9fc1445eed772127711c2c_JaffaCakes118.exe 30 PID 2440 wrote to memory of 2748 2440 ff2b44271e9fc1445eed772127711c2c_JaffaCakes118.exe 30 PID 2440 wrote to memory of 2748 2440 ff2b44271e9fc1445eed772127711c2c_JaffaCakes118.exe 30 PID 2440 wrote to memory of 2748 2440 ff2b44271e9fc1445eed772127711c2c_JaffaCakes118.exe 30 PID 2440 wrote to memory of 2668 2440 ff2b44271e9fc1445eed772127711c2c_JaffaCakes118.exe 31 PID 2440 wrote to memory of 2668 2440 ff2b44271e9fc1445eed772127711c2c_JaffaCakes118.exe 31 PID 2440 wrote to memory of 2668 2440 ff2b44271e9fc1445eed772127711c2c_JaffaCakes118.exe 31 PID 2440 wrote to memory of 2668 2440 ff2b44271e9fc1445eed772127711c2c_JaffaCakes118.exe 31 PID 2748 wrote to memory of 1276 2748 uhelo.exe 34 PID 2748 wrote to memory of 1276 2748 uhelo.exe 34 PID 2748 wrote to memory of 1276 2748 uhelo.exe 34 PID 2748 wrote to memory of 1276 2748 uhelo.exe 34
Processes
-
C:\Users\Admin\AppData\Local\Temp\ff2b44271e9fc1445eed772127711c2c_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\ff2b44271e9fc1445eed772127711c2c_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2440 -
C:\Users\Admin\AppData\Local\Temp\uhelo.exe"C:\Users\Admin\AppData\Local\Temp\uhelo.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2748 -
C:\Users\Admin\AppData\Local\Temp\zoiso.exe"C:\Users\Admin\AppData\Local\Temp\zoiso.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1276
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\_uinsey.bat" "2⤵
- Deletes itself
- System Location Discovery: System Language Discovery
PID:2668
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
304B
MD5f8e92b8f1f18b5f6b11313f535b02510
SHA1c85ea45e8c2f1f304aea60775151577d3ce5862f
SHA25652d6eb91d3d54e438c432aa6036b11e960467fcf79317d8b6f7ab63d510d0275
SHA5127e78c942256018be6bb464d96a5501884ea90a6b823a2380275fd9526ff395af34eacbc98069d7a18ae11b0f04a2a1233b963fb0de2610d543dafa4be14fadb8
-
Filesize
512B
MD522382e57ca811015f696f19e589654e2
SHA13ddb15cd7487aa6637673434d2d070de0d916d32
SHA25678f84d21ab2681ae350fed420bcc113aa97d6641913a7c120c7b7960391d7c87
SHA5124e4cc21bc027e8898f871c105d7e4404400266f32769d9580ed4ca8652ccd289ed68fa04aa6e261fe3710b0d9bab16ee8c39006e7777101c1b7698dc8b8083f7
-
Filesize
510KB
MD5fc0dd0982b8c7c06e35aade6f02e6015
SHA199e2beaa9b3fc962392cdcb4addc1d7b4a2aaae6
SHA256e5e290876604137ef4c6a928831455113b44c1e500257478bf9bb152acede4c3
SHA51294499b57ef65ab01325046feacbe2ac9a4213a5c369d08624a2cce5af21ed04b86d5fb46d8f7cfa6faca169e08cd89bba9c4767751f697ad63f2027a2e155b7d
-
Filesize
218KB
MD5a75207a6627a10600739caefacc59d70
SHA11d5fc7dc79d09342f5f83866835e3def0b6d8adb
SHA256b2818a624339f5d76c86dd838bb092efee37d871cab79500966bdda6ace221f4
SHA512e50af990580ac6fd15cd4b9125fa4c986c39c8468c33a66392a7edfb79de79141215947fa7c4253fcc2ed1ea69c94fc1c0c00dfad75acad34ea3b84f0fe68e5e