Analysis

  • max time kernel
    127s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240508-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system
  • submitted
    16-05-2024 11:22

General

  • Target

    4ad1b0398bc3a371a82923383de2d0a4_JaffaCakes118.exe

  • Size

    7.4MB

  • MD5

    4ad1b0398bc3a371a82923383de2d0a4

  • SHA1

    9f977029800b4328dc752741156a6a0e5f6fa109

  • SHA256

    2877bf056524695a30300cc6f5469202538727e8003ea14e8d13480a59600171

  • SHA512

    469300fef819aebfe9dbeacf05f60eb509e31abaef0f596575107c69fbe56f0a95ac92135256e98c21c2e2c027fe2d12e1a5d8c402b59a758fea42fba671618b

  • SSDEEP

    98304:Zg560g56dJ0MpqXQg56Mx6rAVQ2QBPAUoU9H0YCg56L8uQhHrqrkjp:a5M5QpU5fvQxAUf9HXp5+hQHrdl

Malware Config

Extracted

Family

remcos

Version

1.7 Pro

Botnet

Host

C2

seasons444.ddns.net:8128

Attributes
  • audio_folder

    audio

  • audio_path

    %AppData%

  • audio_record_time

    5

  • connect_delay

    0

  • connect_interval

    5

  • copy_file

    remcos.exe

  • copy_folder

    remcos

  • delete_file

    false

  • hide_file

    false

  • hide_keylog_file

    true

  • install_flag

    false

  • install_path

    %AppData%

  • keylog_crypt

    true

  • keylog_file

    logs.dat

  • keylog_flag

    false

  • keylog_folder

    window

  • keylog_path

    %AppData%

  • mouse_option

    false

  • mutex

    Office_vgqkluqlnw

  • screenshot_crypt

    false

  • screenshot_flag

    false

  • screenshot_folder

    Screens

  • screenshot_path

    %AppData%

  • screenshot_time

    1

  • startup_value

    remcos

  • take_screenshot_option

    false

  • take_screenshot_time

    5

Extracted

Family

sality

C2

http://89.119.67.154/testo5/

http://kukutrustnet777.info/home.gif

http://kukutrustnet888.info/home.gif

http://kukutrustnet987.info/home.gif

http://www.klkjwre9fqwieluoi.info/

http://kukutrustnet777888.info/

Extracted

Family

limerat

Wallets

1BVfdhbuDbDuMXWErhTv8XwgwYP1K34oTD

Attributes
  • aes_key

    MAXS20

  • antivm

    false

  • c2_url

    https://pastebin.com/raw/vnPLhhBH

  • delay

    3

  • download_payload

    false

  • install

    false

  • install_name

    Wservices.exe

  • main_folder

    AppData

  • pin_spread

    false

  • sub_folder

    \

  • usb_spread

    false

Extracted

Family

warzonerat

C2

cornerload.dynu.net:5500

Extracted

Family

limerat

Attributes
  • antivm

    false

  • c2_url

    https://pastebin.com/raw/vnPLhhBH

  • download_payload

    false

  • install

    false

  • pin_spread

    false

  • usb_spread

    false

Signatures

  • LimeRAT

    Simple yet powerful RAT for Windows machines written in .NET.

  • Modifies firewall policy service 2 TTPs 3 IoCs
  • Remcos

    Remcos is a closed-source remote control and surveillance software.

  • Sality

    Sality is backdoor written in C++, first discovered in 2003.

  • UAC bypass 3 TTPs 1 IoCs
  • WarzoneRat, AveMaria

    WarzoneRat is a native RAT developed in C++ with multiple plugins sold as a MaaS.

  • Windows security bypass 2 TTPs 6 IoCs
  • Warzone RAT payload 2 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Drops startup file 3 IoCs
  • Executes dropped EXE 5 IoCs
  • UPX packed file 21 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Enumerates connected drives 3 TTPs 21 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
  • AutoIT Executable 3 IoCs

    AutoIT scripts compiled to PE executables.

  • Drops autorun.inf file 1 TTPs 2 IoCs

    Malware can abuse Windows Autorun to spread further via attached volumes.

  • Suspicious use of SetThreadContext 4 IoCs
  • Drops file in Program Files directory 12 IoCs
  • Drops file in Windows directory 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: MapViewOfSection 5 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of FindShellTrayWindow 13 IoCs
  • Suspicious use of SendNotifyMessage 12 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Windows\system32\fontdrvhost.exe
    "fontdrvhost.exe"
    1⤵
      PID:800
    • C:\Windows\system32\fontdrvhost.exe
      "fontdrvhost.exe"
      1⤵
        PID:808
      • C:\Windows\system32\dwm.exe
        "dwm.exe"
        1⤵
          PID:384
        • C:\Windows\system32\sihost.exe
          sihost.exe
          1⤵
            PID:3012
          • C:\Windows\system32\svchost.exe
            C:\Windows\system32\svchost.exe -k UnistackSvcGroup -s CDPUserSvc
            1⤵
              PID:3036
            • C:\Windows\system32\taskhostw.exe
              taskhostw.exe {222A245B-E637-4AE9-A93F-A59CA119A75E}
              1⤵
                PID:2828
              • C:\Windows\Explorer.EXE
                C:\Windows\Explorer.EXE
                1⤵
                  PID:3424
                  • C:\Users\Admin\AppData\Local\Temp\4ad1b0398bc3a371a82923383de2d0a4_JaffaCakes118.exe
                    "C:\Users\Admin\AppData\Local\Temp\4ad1b0398bc3a371a82923383de2d0a4_JaffaCakes118.exe"
                    2⤵
                    • Checks computer location settings
                    • Drops startup file
                    • Suspicious use of SetThreadContext
                    • Suspicious behavior: EnumeratesProcesses
                    • Suspicious behavior: MapViewOfSection
                    • Suspicious use of FindShellTrayWindow
                    • Suspicious use of SendNotifyMessage
                    • Suspicious use of WriteProcessMemory
                    PID:3728
                    • C:\Users\Admin\AppData\Local\Temp\seg32.exe
                      "C:\Users\Admin\AppData\Local\Temp\seg32.exe"
                      3⤵
                      • Drops startup file
                      • Executes dropped EXE
                      • Suspicious use of SetThreadContext
                      • Suspicious behavior: MapViewOfSection
                      • Suspicious use of FindShellTrayWindow
                      • Suspicious use of SendNotifyMessage
                      • Suspicious use of WriteProcessMemory
                      PID:2816
                      • C:\Users\Admin\AppData\Local\Temp\seg32.exe
                        "C:\Users\Admin\AppData\Local\Temp\seg32.exe"
                        4⤵
                        • Executes dropped EXE
                        PID:768
                      • C:\Users\Admin\AppData\Local\Temp\seg32.exe
                        "C:\Users\Admin\AppData\Local\Temp\seg32.exe"
                        4⤵
                        • Executes dropped EXE
                        • Suspicious use of WriteProcessMemory
                        PID:3956
                        • C:\Windows\SysWOW64\cmd.exe
                          "C:\Windows\System32\cmd.exe"
                          5⤵
                            PID:4612
                            • C:\Windows\System32\Conhost.exe
                              \??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                              6⤵
                                PID:4388
                        • C:\Users\Admin\AppData\Local\Temp\Servicez.exe
                          "C:\Users\Admin\AppData\Local\Temp\Servicez.exe"
                          3⤵
                          • Executes dropped EXE
                          • Suspicious use of SetThreadContext
                          • Suspicious behavior: MapViewOfSection
                          • Suspicious use of FindShellTrayWindow
                          • Suspicious use of SendNotifyMessage
                          • Suspicious use of WriteProcessMemory
                          PID:4552
                          • C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe
                            "C:\\\\Windows\\\\Microsoft.NET\\\\Framework\\\\v4.0.30319\\\\MSBuild.exe"
                            4⤵
                              PID:640
                          • C:\Users\Admin\AppData\Local\Temp\Internets.exe
                            "C:\Users\Admin\AppData\Local\Temp\Internets.exe"
                            3⤵
                            • Drops startup file
                            • Executes dropped EXE
                            • Suspicious use of SetThreadContext
                            • Suspicious behavior: MapViewOfSection
                            • Suspicious use of FindShellTrayWindow
                            • Suspicious use of SendNotifyMessage
                            PID:4856
                            • C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exe
                              "C:\\\\Windows\\\\Microsoft.NET\\\\Framework\\\\v2.0.50727\\\\RegAsm.exe"
                              4⤵
                              • Suspicious use of FindShellTrayWindow
                              PID:456
                          • C:\Windows\SysWOW64\svchost.exe
                            "C:\Windows\SysWOW64\svchost.exe"
                            3⤵
                            • Modifies firewall policy service
                            • UAC bypass
                            • Windows security bypass
                            • Enumerates connected drives
                            • Drops autorun.inf file
                            • Drops file in Program Files directory
                            • Drops file in Windows directory
                            • Suspicious behavior: EnumeratesProcesses
                            • Suspicious use of AdjustPrivilegeToken
                            • Suspicious use of SetWindowsHookEx
                            • Suspicious use of WriteProcessMemory
                            PID:4904
                      • C:\Windows\system32\svchost.exe
                        C:\Windows\system32\svchost.exe -k ClipboardSvcGroup -p -s cbdhsvc
                        1⤵
                          PID:3576
                        • C:\Windows\system32\DllHost.exe
                          C:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}
                          1⤵
                            PID:3756
                          • C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe
                            "C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca
                            1⤵
                              PID:3852
                            • C:\Windows\System32\RuntimeBroker.exe
                              C:\Windows\System32\RuntimeBroker.exe -Embedding
                              1⤵
                                PID:3920
                              • C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe
                                "C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca
                                1⤵
                                  PID:4008
                                • C:\Windows\System32\RuntimeBroker.exe
                                  C:\Windows\System32\RuntimeBroker.exe -Embedding
                                  1⤵
                                    PID:4148
                                  • C:\Windows\System32\RuntimeBroker.exe
                                    C:\Windows\System32\RuntimeBroker.exe -Embedding
                                    1⤵
                                      PID:2136
                                    • C:\Windows\SystemApps\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\InputApp\TextInputHost.exe
                                      "C:\Windows\SystemApps\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\InputApp\TextInputHost.exe" -ServerName:InputApp.AppX9jnwykgrccxc8by3hsrsh07r423xzvav.mca
                                      1⤵
                                        PID:2812
                                      • C:\Windows\system32\backgroundTaskHost.exe
                                        "C:\Windows\system32\backgroundTaskHost.exe" -ServerName:CortanaUI.AppX3bn25b6f886wmg6twh46972vprk9tnbf.mca
                                        1⤵
                                          PID:2288
                                        • C:\Windows\System32\RuntimeBroker.exe
                                          C:\Windows\System32\RuntimeBroker.exe -Embedding
                                          1⤵
                                            PID:2840
                                          • C:\Windows\System32\RuntimeBroker.exe
                                            C:\Windows\System32\RuntimeBroker.exe -Embedding
                                            1⤵
                                              PID:1556
                                            • C:\Windows\system32\backgroundTaskHost.exe
                                              "C:\Windows\system32\backgroundTaskHost.exe" -ServerName:App.AppXmtcan0h2tfbfy7k9kn8hbxb6dmzz1zh0.mca
                                              1⤵
                                                PID:4788

                                              Network

                                              MITRE ATT&CK Enterprise v15

                                              Replay Monitor

                                              Loading Replay Monitor...

                                              Downloads

                                              • C:\Users\Admin\AppData\Local\Temp\Internets.exe

                                                Filesize

                                                2.4MB

                                                MD5

                                                ecdcf6e29f917239ecd9f3c4cd4bd4b4

                                                SHA1

                                                131f924924ace74686b31640d3b781052abfd39e

                                                SHA256

                                                add54490ee3977e1bf2c7090d44a7ecd42dfc9488470e98ff9c3d8169e437b99

                                                SHA512

                                                78946683a1a3f1415b22fa7fad5c4a736591399e3fc915bce798470b437d4430f6f7679272b3d7818662e6451817aa3cba44b9ae6d404834ac8d92fde5847733

                                              • C:\Users\Admin\AppData\Local\Temp\Servicez.exe

                                                Filesize

                                                1.5MB

                                                MD5

                                                457d4329b66efcbd6bcba521502df6a8

                                                SHA1

                                                99228fcf0fcde75cfcba2f35a7060bf3917a507b

                                                SHA256

                                                276073fc5509436fed91dfa63e1a05478c8d1fe56d974fc5881bb3d545ab4aa7

                                                SHA512

                                                61303aa92141241914b707b8afdb12affa6fe2ad6e6a670268963078e31a09c1d1d557c527b038ace8eec9921dbc3b6edf686ec82cd64a7be30fad97fda74b33

                                              • C:\Users\Admin\AppData\Local\Temp\seg32.exe

                                                Filesize

                                                1.6MB

                                                MD5

                                                0c6fa100c0fd612d9f55a87017989621

                                                SHA1

                                                3298eeae3f5138d3bb8ed821f43090362c12f362

                                                SHA256

                                                facb90d2a9cf3daa839e624a6a2d12ea2555b357ca7397fbcfae65dba25e2d16

                                                SHA512

                                                9659f78562558e3b30369fb008386131fe63724d5c668ae456905007ef7cab803f54b69199c5e4fac99ca05e817d813b4fbeb113450dd852afbabb29dde03364

                                              • C:\qxwcu.pif

                                                Filesize

                                                100KB

                                                MD5

                                                0f78ac7f8875fdeaa4c511755f2f6cb5

                                                SHA1

                                                d9015b4f730188920c37b5b8ba2b7fd73d433877

                                                SHA256

                                                d964c41313488c1cfb2e9e5076b1250f75f610862768ecc4300dcd31572f8961

                                                SHA512

                                                e6a4f55d05b742f32d102f608e46fa99590bda7e1fee4afb80952d53cafc37d2d8365e2d424a8c9d67aaacba8c536ab569f1a6729e99d10ea7b0169abd1d3f10

                                              • memory/456-113-0x0000000000400000-0x000000000049E000-memory.dmp

                                                Filesize

                                                632KB

                                              • memory/640-95-0x0000000001020000-0x0000000001022000-memory.dmp

                                                Filesize

                                                8KB

                                              • memory/640-104-0x0000000006110000-0x00000000066B4000-memory.dmp

                                                Filesize

                                                5.6MB

                                              • memory/640-102-0x00000000051D0000-0x0000000005236000-memory.dmp

                                                Filesize

                                                408KB

                                              • memory/640-90-0x0000000001050000-0x0000000001051000-memory.dmp

                                                Filesize

                                                4KB

                                              • memory/640-107-0x0000000005EE0000-0x0000000005F72000-memory.dmp

                                                Filesize

                                                584KB

                                              • memory/640-78-0x0000000000400000-0x000000000040C000-memory.dmp

                                                Filesize

                                                48KB

                                              • memory/640-80-0x00000000050C0000-0x000000000515C000-memory.dmp

                                                Filesize

                                                624KB

                                              • memory/2816-50-0x0000000001AA0000-0x0000000001AA1000-memory.dmp

                                                Filesize

                                                4KB

                                              • memory/2816-53-0x0000000001A50000-0x0000000001A52000-memory.dmp

                                                Filesize

                                                8KB

                                              • memory/3728-52-0x0000000001720000-0x0000000001722000-memory.dmp

                                                Filesize

                                                8KB

                                              • memory/3728-48-0x0000000004590000-0x0000000004591000-memory.dmp

                                                Filesize

                                                4KB

                                              • memory/3728-47-0x0000000001720000-0x0000000001722000-memory.dmp

                                                Filesize

                                                8KB

                                              • memory/3956-92-0x0000000003910000-0x0000000003911000-memory.dmp

                                                Filesize

                                                4KB

                                              • memory/3956-84-0x0000000000400000-0x000000000041D000-memory.dmp

                                                Filesize

                                                116KB

                                              • memory/3956-82-0x0000000000400000-0x000000000041D000-memory.dmp

                                                Filesize

                                                116KB

                                              • memory/3956-96-0x00000000034C0000-0x00000000034C2000-memory.dmp

                                                Filesize

                                                8KB

                                              • memory/4552-61-0x0000000001E00000-0x0000000001E02000-memory.dmp

                                                Filesize

                                                8KB

                                              • memory/4552-55-0x0000000001E10000-0x0000000001E11000-memory.dmp

                                                Filesize

                                                4KB

                                              • memory/4612-97-0x0000000000520000-0x0000000000522000-memory.dmp

                                                Filesize

                                                8KB

                                              • memory/4612-100-0x0000000000540000-0x0000000000541000-memory.dmp

                                                Filesize

                                                4KB

                                              • memory/4612-94-0x0000000000530000-0x0000000000531000-memory.dmp

                                                Filesize

                                                4KB

                                              • memory/4856-62-0x0000000000D10000-0x0000000000D12000-memory.dmp

                                                Filesize

                                                8KB

                                              • memory/4856-57-0x0000000004AB0000-0x0000000004AB1000-memory.dmp

                                                Filesize

                                                4KB

                                              • memory/4904-60-0x0000000002FA0000-0x000000000402E000-memory.dmp

                                                Filesize

                                                16.6MB

                                              • memory/4904-46-0x0000000002FA0000-0x000000000402E000-memory.dmp

                                                Filesize

                                                16.6MB

                                              • memory/4904-76-0x0000000002FA0000-0x000000000402E000-memory.dmp

                                                Filesize

                                                16.6MB

                                              • memory/4904-77-0x0000000002FA0000-0x000000000402E000-memory.dmp

                                                Filesize

                                                16.6MB

                                              • memory/4904-51-0x0000000002FA0000-0x000000000402E000-memory.dmp

                                                Filesize

                                                16.6MB

                                              • memory/4904-68-0x0000000002FA0000-0x000000000402E000-memory.dmp

                                                Filesize

                                                16.6MB

                                              • memory/4904-66-0x0000000002FA0000-0x000000000402E000-memory.dmp

                                                Filesize

                                                16.6MB

                                              • memory/4904-65-0x0000000002FA0000-0x000000000402E000-memory.dmp

                                                Filesize

                                                16.6MB

                                              • memory/4904-88-0x0000000002FA0000-0x000000000402E000-memory.dmp

                                                Filesize

                                                16.6MB

                                              • memory/4904-64-0x0000000002FA0000-0x000000000402E000-memory.dmp

                                                Filesize

                                                16.6MB

                                              • memory/4904-41-0x0000000002FA0000-0x000000000402E000-memory.dmp

                                                Filesize

                                                16.6MB

                                              • memory/4904-63-0x0000000000F60000-0x0000000000F62000-memory.dmp

                                                Filesize

                                                8KB

                                              • memory/4904-67-0x0000000002FA0000-0x000000000402E000-memory.dmp

                                                Filesize

                                                16.6MB

                                              • memory/4904-75-0x0000000002FA0000-0x000000000402E000-memory.dmp

                                                Filesize

                                                16.6MB

                                              • memory/4904-45-0x0000000002FA0000-0x000000000402E000-memory.dmp

                                                Filesize

                                                16.6MB

                                              • memory/4904-99-0x0000000002FA0000-0x000000000402E000-memory.dmp

                                                Filesize

                                                16.6MB

                                              • memory/4904-59-0x0000000000FE0000-0x0000000000FE1000-memory.dmp

                                                Filesize

                                                4KB

                                              • memory/4904-42-0x0000000000400000-0x000000000042A000-memory.dmp

                                                Filesize

                                                168KB

                                              • memory/4904-103-0x0000000002FA0000-0x000000000402E000-memory.dmp

                                                Filesize

                                                16.6MB

                                              • memory/4904-39-0x0000000002FA0000-0x000000000402E000-memory.dmp

                                                Filesize

                                                16.6MB

                                              • memory/4904-38-0x0000000000400000-0x000000000042A000-memory.dmp

                                                Filesize

                                                168KB

                                              • memory/4904-105-0x0000000002FA0000-0x000000000402E000-memory.dmp

                                                Filesize

                                                16.6MB

                                              • memory/4904-108-0x0000000002FA0000-0x000000000402E000-memory.dmp

                                                Filesize

                                                16.6MB

                                              • memory/4904-112-0x0000000002FA0000-0x000000000402E000-memory.dmp

                                                Filesize

                                                16.6MB

                                              • memory/4904-37-0x0000000000400000-0x000000000042A000-memory.dmp

                                                Filesize

                                                168KB

                                              • memory/4904-114-0x0000000002FA0000-0x000000000402E000-memory.dmp

                                                Filesize

                                                16.6MB

                                              • memory/4904-36-0x0000000000400000-0x000000000042A000-memory.dmp

                                                Filesize

                                                168KB