Analysis

  • max time kernel
    121s
  • max time network
    122s
  • platform
    windows7_x64
  • resource
    win7-20240215-en
  • resource tags

    arch:x64arch:x86image:win7-20240215-enlocale:en-usos:windows7-x64system
  • submitted
    17-05-2024 05:58

General

  • Target

    4eb4210e0c2ae6f9eddd871ccc194d2e_JaffaCakes118.exe

  • Size

    120KB

  • MD5

    4eb4210e0c2ae6f9eddd871ccc194d2e

  • SHA1

    25df32e67a1f0581d1ee60fb0deda607343743ea

  • SHA256

    ceacd96438f933acfbf6b01a34f37c36db4db79362f66d660fb6b33541581204

  • SHA512

    8bb8e8949821e3fe746f2b494fc0902c8148baa8c852b45ad37dd8cc5d9221f1d8633a822815bd7abb8e394fb5a61943bb0f119e663d5c271485d03e14d54ccc

  • SSDEEP

    3072:1FNUcekHxRkuHxSWMDUajQJf/p/itxBCBpEzImXnr+vHI+zIcdpr72u1p:1HUcLxRkuRSWMDUaGf/p/sxWpEzImXqV

Malware Config

Extracted

Family

remcos

Version

2.0.5 Pro

Botnet

NEW

C2

195.154.242.51:2404

Attributes
  • audio_folder

    audio

  • audio_path

    %AppData%

  • audio_record_time

    5

  • connect_delay

    0

  • connect_interval

    5

  • copy_file

    syscmd.exe

  • copy_folder

    Syscmd

  • delete_file

    false

  • hide_file

    true

  • hide_keylog_file

    true

  • install_flag

    true

  • install_path

    %AppData%

  • keylog_crypt

    true

  • keylog_file

    logs.dat

  • keylog_flag

    false

  • keylog_folder

    Syscmd

  • keylog_path

    %AppData%

  • mouse_option

    true

  • mutex

    Syscmd-TEC6F3

  • screenshot_crypt

    false

  • screenshot_flag

    false

  • screenshot_folder

    Screenshots

  • screenshot_path

    %AppData%

  • screenshot_time

    10

  • startup_value

    syscmd

  • take_screenshot_option

    false

  • take_screenshot_time

    5

Signatures

  • Remcos

    Remcos is a closed-source remote control and surveillance software.

  • Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 2 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of WriteProcessMemory 23 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\4eb4210e0c2ae6f9eddd871ccc194d2e_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\4eb4210e0c2ae6f9eddd871ccc194d2e_JaffaCakes118.exe"
    1⤵
    • Identifies VirtualBox via ACPI registry values (likely anti-VM)
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:2072
    • C:\Windows\SysWOW64\WScript.exe
      "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\install.vbs"
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:3048
      • C:\Windows\SysWOW64\cmd.exe
        "C:\Windows\System32\cmd.exe" /c "C:\Users\Admin\AppData\Roaming\Syscmd\syscmd.exe"
        3⤵
        • Loads dropped DLL
        • Suspicious use of WriteProcessMemory
        PID:2588
        • C:\Users\Admin\AppData\Roaming\Syscmd\syscmd.exe
          C:\Users\Admin\AppData\Roaming\Syscmd\syscmd.exe
          4⤵
          • Identifies VirtualBox via ACPI registry values (likely anti-VM)
          • Executes dropped EXE
          • Adds Run key to start application
          • Suspicious use of SetThreadContext
          • Suspicious use of WriteProcessMemory
          PID:2648
          • C:\Program Files (x86)\Internet Explorer\iexplore.exe
            "C:\Program Files (x86)\Internet Explorer\iexplore.exe"
            5⤵
              PID:2556

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\install.vbs

      Filesize

      418B

      MD5

      a188db36cc78c3a687fefe769400911f

      SHA1

      c76a6749da9941cabadbf26399ee950aa4dc2782

      SHA256

      66ba60e9d8ecda66fcee8ce0a80855a67e14704f823d5c058751746208e7d4d3

      SHA512

      9587847ede7ad801c22eb2d1c3ffdc09aec9fd249b5835ba40b75b150ae87982b13e7828cd9e11290db8a8e28dec02a1b3a712de9694a24349c75b190857f929

    • \Users\Admin\AppData\Roaming\Syscmd\syscmd.exe

      Filesize

      120KB

      MD5

      4eb4210e0c2ae6f9eddd871ccc194d2e

      SHA1

      25df32e67a1f0581d1ee60fb0deda607343743ea

      SHA256

      ceacd96438f933acfbf6b01a34f37c36db4db79362f66d660fb6b33541581204

      SHA512

      8bb8e8949821e3fe746f2b494fc0902c8148baa8c852b45ad37dd8cc5d9221f1d8633a822815bd7abb8e394fb5a61943bb0f119e663d5c271485d03e14d54ccc

    • memory/2556-10-0x0000000000400000-0x000000000041E000-memory.dmp

      Filesize

      120KB