Analysis

  • max time kernel
    143s
  • max time network
    144s
  • platform
    windows7_x64
  • resource
    win7-20240508-en
  • resource tags

    arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system
  • submitted
    17-05-2024 07:24

General

  • Target

    4ef5d993dfcfced0e8ca4529613c2d7f_JaffaCakes118.exe

  • Size

    524KB

  • MD5

    4ef5d993dfcfced0e8ca4529613c2d7f

  • SHA1

    c9ef68198440a7baed2ff287956a22a2a6da282c

  • SHA256

    0836bb223ab5657775962a4913387399291103cab772ad0156834f669575e3d3

  • SHA512

    ea1422319ae1753bba25d77908c86688ea1f31545d62c147b4937c5e14f3f5b971e0c0b84dd3a6e7b9ab11fff5a0ef5b11a7efe052e66845172f6ec7e0b8b7e8

  • SSDEEP

    3072:sdopXoLkYk+XgOVzM0IsYnNh+MddCbBLNN4WJ9pUwVc6dIIWkJCTnW917h:QohYkPO6znBdC7N4OuXiWkwWB

Score
10/10

Malware Config

Extracted

Family

remcos

Version

1.9.5 Pro

Botnet

REM95

C2

casillas.hicam.net:2404

casillasmx.chickenkiller.com:2404

casillas45.hopto.org:2404

casillas.libfoobar.so:2404

du4alr0ute.sendsmtp.com:2404

Attributes
  • audio_folder

    audio

  • audio_path

    %AppData%

  • audio_record_time

    5

  • connect_delay

    0

  • connect_interval

    5

  • copy_file

    remcos.exe

  • copy_folder

    remcos

  • delete_file

    false

  • hide_file

    false

  • hide_keylog_file

    false

  • install_flag

    false

  • install_path

    %AppData%

  • keylog_crypt

    false

  • keylog_file

    logs.dat

  • keylog_flag

    false

  • keylog_folder

    remcos

  • keylog_path

    %AppData%

  • mouse_option

    false

  • mutex

    REM95-DM1QMV

  • screenshot_crypt

    false

  • screenshot_flag

    false

  • screenshot_folder

    Screenshots

  • screenshot_path

    %AppData%

  • screenshot_time

    1

  • startup_value

    remcos

  • take_screenshot_option

    false

  • take_screenshot_time

    5

Signatures

  • Remcos

    Remcos is a closed-source remote control and surveillance software.

  • Suspicious use of SetThreadContext 2 IoCs
  • Drops file in Windows directory 2 IoCs
  • Modifies system certificate store 2 TTPs 4 IoCs
  • Suspicious behavior: EnumeratesProcesses 25 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 22 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\4ef5d993dfcfced0e8ca4529613c2d7f_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\4ef5d993dfcfced0e8ca4529613c2d7f_JaffaCakes118.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Drops file in Windows directory
    • Modifies system certificate store
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2072
    • C:\Users\Admin\AppData\Local\Temp\4ef5d993dfcfced0e8ca4529613c2d7f_JaffaCakes118.exe
      "C:\Users\Admin\AppData\Local\Temp\4ef5d993dfcfced0e8ca4529613c2d7f_JaffaCakes118.exe"
      2⤵
      • Suspicious use of SetWindowsHookEx
      PID:2920
    • C:\Windows\Microsoft.NET\Framework\v2.0.50727\regasm.exe
      "C:\Windows\Microsoft.NET\Framework\v2.0.50727\regasm.exe" C:\Users\Admin\AppData\Local\Temp\4ef5d993dfcfced0e8ca4529613c2d7f_JaffaCakes118.exe 2920 cd70ae03f3c24299abd87066babcaa52
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:1424

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\Cab2915.tmp

    Filesize

    68KB

    MD5

    29f65ba8e88c063813cc50a4ea544e93

    SHA1

    05a7040d5c127e68c25d81cc51271ffb8bef3568

    SHA256

    1ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184

    SHA512

    e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa

  • C:\Users\Admin\AppData\Local\Temp\Tar2937.tmp

    Filesize

    177KB

    MD5

    435a9ac180383f9fa094131b173a2f7b

    SHA1

    76944ea657a9db94f9a4bef38f88c46ed4166983

    SHA256

    67dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34

    SHA512

    1a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a

  • C:\Windows\Microsoft.NET\Framework\v2.0.50727\config\security.config.cch

    Filesize

    908B

    MD5

    3a46690923308c4d48784bccbf246c42

    SHA1

    872f2c1e7ddc0887b9864aa64596d258e37d2e9f

    SHA256

    0c05a1e24f275d6ef9bc1e5e0cb12cf16846ce5ca181590128071b47411c9f2d

    SHA512

    a7166da5af50898cf9b9dc8f80c290fb8d5a65b88bc2d1b9c3f0d7588de2d84b2cb2d74fa52d6a4fbdca543a7380581d90aabd7e136dd79c8096a62b4ab77ed8

  • memory/1424-74-0x0000000000400000-0x0000000000408000-memory.dmp

    Filesize

    32KB

  • memory/1424-72-0x0000000000400000-0x0000000000408000-memory.dmp

    Filesize

    32KB

  • memory/1424-76-0x0000000000400000-0x0000000000408000-memory.dmp

    Filesize

    32KB

  • memory/1424-78-0x0000000000400000-0x0000000000408000-memory.dmp

    Filesize

    32KB

  • memory/1424-80-0x000000007EFDE000-0x000000007EFDF000-memory.dmp

    Filesize

    4KB

  • memory/1424-84-0x0000000000400000-0x0000000000408000-memory.dmp

    Filesize

    32KB

  • memory/1424-86-0x0000000000400000-0x0000000000408000-memory.dmp

    Filesize

    32KB

  • memory/1424-82-0x0000000000400000-0x0000000000408000-memory.dmp

    Filesize

    32KB

  • memory/2072-0-0x0000000074781000-0x0000000074782000-memory.dmp

    Filesize

    4KB

  • memory/2072-97-0x0000000074780000-0x0000000074D2B000-memory.dmp

    Filesize

    5.7MB

  • memory/2072-1-0x0000000074780000-0x0000000074D2B000-memory.dmp

    Filesize

    5.7MB

  • memory/2072-2-0x0000000074780000-0x0000000074D2B000-memory.dmp

    Filesize

    5.7MB

  • memory/2920-58-0x0000000000400000-0x000000000041B000-memory.dmp

    Filesize

    108KB

  • memory/2920-60-0x0000000000400000-0x000000000041B000-memory.dmp

    Filesize

    108KB

  • memory/2920-62-0x0000000000400000-0x000000000041B000-memory.dmp

    Filesize

    108KB

  • memory/2920-70-0x0000000000400000-0x000000000041B000-memory.dmp

    Filesize

    108KB

  • memory/2920-68-0x000000007EFDE000-0x000000007EFDF000-memory.dmp

    Filesize

    4KB

  • memory/2920-87-0x0000000000400000-0x000000000041B000-memory.dmp

    Filesize

    108KB

  • memory/2920-91-0x0000000000400000-0x000000000041B000-memory.dmp

    Filesize

    108KB

  • memory/2920-88-0x0000000000400000-0x000000000041B000-memory.dmp

    Filesize

    108KB

  • memory/2920-66-0x0000000000400000-0x000000000041B000-memory.dmp

    Filesize

    108KB

  • memory/2920-64-0x0000000000400000-0x000000000041B000-memory.dmp

    Filesize

    108KB

  • memory/2920-99-0x0000000000400000-0x000000000041B000-memory.dmp

    Filesize

    108KB