Analysis

  • max time kernel
    148s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240426-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system
  • submitted
    17-05-2024 07:24

General

  • Target

    4ef5d993dfcfced0e8ca4529613c2d7f_JaffaCakes118.exe

  • Size

    524KB

  • MD5

    4ef5d993dfcfced0e8ca4529613c2d7f

  • SHA1

    c9ef68198440a7baed2ff287956a22a2a6da282c

  • SHA256

    0836bb223ab5657775962a4913387399291103cab772ad0156834f669575e3d3

  • SHA512

    ea1422319ae1753bba25d77908c86688ea1f31545d62c147b4937c5e14f3f5b971e0c0b84dd3a6e7b9ab11fff5a0ef5b11a7efe052e66845172f6ec7e0b8b7e8

  • SSDEEP

    3072:sdopXoLkYk+XgOVzM0IsYnNh+MddCbBLNN4WJ9pUwVc6dIIWkJCTnW917h:QohYkPO6znBdC7N4OuXiWkwWB

Score
10/10

Malware Config

Extracted

Family

remcos

Version

1.9.5 Pro

Botnet

REM95

C2

casillas.hicam.net:2404

casillasmx.chickenkiller.com:2404

casillas45.hopto.org:2404

casillas.libfoobar.so:2404

du4alr0ute.sendsmtp.com:2404

Attributes
  • audio_folder

    audio

  • audio_path

    %AppData%

  • audio_record_time

    5

  • connect_delay

    0

  • connect_interval

    5

  • copy_file

    remcos.exe

  • copy_folder

    remcos

  • delete_file

    false

  • hide_file

    false

  • hide_keylog_file

    false

  • install_flag

    false

  • install_path

    %AppData%

  • keylog_crypt

    false

  • keylog_file

    logs.dat

  • keylog_flag

    false

  • keylog_folder

    remcos

  • keylog_path

    %AppData%

  • mouse_option

    false

  • mutex

    REM95-DM1QMV

  • screenshot_crypt

    false

  • screenshot_flag

    false

  • screenshot_folder

    Screenshots

  • screenshot_path

    %AppData%

  • screenshot_time

    1

  • startup_value

    remcos

  • take_screenshot_option

    false

  • take_screenshot_time

    5

Signatures

  • Remcos

    Remcos is a closed-source remote control and surveillance software.

  • Suspicious use of SetThreadContext 2 IoCs
  • Drops file in Windows directory 2 IoCs
  • Modifies system certificate store 2 TTPs 3 IoCs
  • Suspicious behavior: EnumeratesProcesses 30 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 23 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\4ef5d993dfcfced0e8ca4529613c2d7f_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\4ef5d993dfcfced0e8ca4529613c2d7f_JaffaCakes118.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Drops file in Windows directory
    • Modifies system certificate store
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:4584
    • C:\Users\Admin\AppData\Local\Temp\4ef5d993dfcfced0e8ca4529613c2d7f_JaffaCakes118.exe
      "C:\Users\Admin\AppData\Local\Temp\4ef5d993dfcfced0e8ca4529613c2d7f_JaffaCakes118.exe"
      2⤵
        PID:4252
      • C:\Users\Admin\AppData\Local\Temp\4ef5d993dfcfced0e8ca4529613c2d7f_JaffaCakes118.exe
        "C:\Users\Admin\AppData\Local\Temp\4ef5d993dfcfced0e8ca4529613c2d7f_JaffaCakes118.exe"
        2⤵
          PID:2820
        • C:\Users\Admin\AppData\Local\Temp\4ef5d993dfcfced0e8ca4529613c2d7f_JaffaCakes118.exe
          "C:\Users\Admin\AppData\Local\Temp\4ef5d993dfcfced0e8ca4529613c2d7f_JaffaCakes118.exe"
          2⤵
          • Suspicious use of SetWindowsHookEx
          PID:1600
        • C:\Windows\Microsoft.NET\Framework\v2.0.50727\regasm.exe
          "C:\Windows\Microsoft.NET\Framework\v2.0.50727\regasm.exe" C:\Users\Admin\AppData\Local\Temp\4ef5d993dfcfced0e8ca4529613c2d7f_JaffaCakes118.exe 1600 cd70ae03f3c24299abd87066babcaa52
          2⤵
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:3052

      Network

      MITRE ATT&CK Enterprise v15

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Windows\Microsoft.NET\Framework\v2.0.50727\config\security.config.cch

        Filesize

        908B

        MD5

        2d1532bdffdd41d4708b95da66bd8b01

        SHA1

        acaa04073f6e4d1a262dd0b896fd04134bf725b7

        SHA256

        0fb2798786896d702d773916c56c7f0117264384a3168c6660b8e7608333abe0

        SHA512

        214a73e4d46ae0cc8e684dfeb0eef73be33f8ff75b55281369d9e39fbc5347f5d991bf7c0f278fc324ad3256e513577a6176ed7efbcb0ddbc5579578338358f2

      • memory/1600-25-0x0000000000400000-0x000000000041B000-memory.dmp

        Filesize

        108KB

      • memory/1600-20-0x0000000000400000-0x000000000041B000-memory.dmp

        Filesize

        108KB

      • memory/1600-36-0x0000000000400000-0x000000000041B000-memory.dmp

        Filesize

        108KB

      • memory/1600-17-0x0000000000400000-0x000000000041B000-memory.dmp

        Filesize

        108KB

      • memory/1600-22-0x0000000000400000-0x000000000041B000-memory.dmp

        Filesize

        108KB

      • memory/3052-31-0x0000000074A10000-0x0000000074FC1000-memory.dmp

        Filesize

        5.7MB

      • memory/3052-19-0x0000000000400000-0x0000000000408000-memory.dmp

        Filesize

        32KB

      • memory/3052-29-0x0000000074A12000-0x0000000074A13000-memory.dmp

        Filesize

        4KB

      • memory/3052-33-0x0000000074A10000-0x0000000074FC1000-memory.dmp

        Filesize

        5.7MB

      • memory/3052-37-0x0000000074A10000-0x0000000074FC1000-memory.dmp

        Filesize

        5.7MB

      • memory/4584-2-0x0000000074A10000-0x0000000074FC1000-memory.dmp

        Filesize

        5.7MB

      • memory/4584-1-0x0000000074A10000-0x0000000074FC1000-memory.dmp

        Filesize

        5.7MB

      • memory/4584-0-0x0000000074A12000-0x0000000074A13000-memory.dmp

        Filesize

        4KB

      • memory/4584-34-0x0000000074A10000-0x0000000074FC1000-memory.dmp

        Filesize

        5.7MB

      • memory/4584-16-0x0000000074A10000-0x0000000074FC1000-memory.dmp

        Filesize

        5.7MB