Analysis

  • max time kernel
    149s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240508-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system
  • submitted
    25-05-2024 08:24

General

  • Target

    7160c922014ca2e09814ea97e0892575_JaffaCakes118.exe

  • Size

    330KB

  • MD5

    7160c922014ca2e09814ea97e0892575

  • SHA1

    4b89e8c0e55360eb92040feae26d80c73542846c

  • SHA256

    f053c60697e0af53615df9ef94f936ea9f571a2f697e19c7db8955d36fe12a4a

  • SHA512

    2adf6b0a5ad50c92152a2aa5a8d3c8c113c374a5a9e823f4ddf391de9beed3069597ad5fc7fde0571bd18c2c91a8042121bfb6fad4ffde768cfb69ee08ac7b22

  • SSDEEP

    6144:2w6JMnBKjX33LRxKEV+KliE3IvHlouxcAG42uZ:D6MI7LRECFiHegnT

Malware Config

Extracted

Family

remcos

Version

2.4.7 Pro

Botnet

28-07-2019

C2

muhoste.ddnsfree.com:2401

koustaeik.dynu.net:2424

houstus.gleeze.com:2525

foustraje.mywire.org:2626

housteko.mywire.org:2727

houstrik.gleeze.com:2828

Attributes
  • audio_folder

    MicRecords

  • audio_path

    %AppData%

  • audio_record_time

    5

  • connect_delay

    0

  • connect_interval

    3

  • copy_file

    servicesT.exe

  • copy_folder

    Windows10Update

  • delete_file

    false

  • hide_file

    false

  • hide_keylog_file

    true

  • install_flag

    true

  • install_path

    %AppData%

  • keylog_crypt

    false

  • keylog_file

    logs.dat

  • keylog_flag

    false

  • keylog_folder

    SystemWindows7

  • keylog_path

    %AppData%

  • mouse_option

    false

  • mutex

    le1boss2019-P7U0OY

  • screenshot_crypt

    false

  • screenshot_flag

    false

  • screenshot_folder

    sips3

  • screenshot_path

    %AppData%

  • screenshot_time

    10

  • startup_value

    Defender-Update-System

  • take_screenshot_option

    true

  • take_screenshot_time

    1

  • take_screenshot_title

    amazon;secure;checkout;payment;rakuten;order;sncf;secure2;pay;hipay;bricoprive;webpayment;payline;Alipay;hsbc;3d;secur5e;authentification;paybox;récapitilatif;systempay;worldpay;secure1;cic;sips;3dsecure;sogenactif;paiement;paypal;paylib;webpayment

Signatures

  • Remcos

    Remcos is a closed-source remote control and surveillance software.

  • Checks computer location settings 2 TTPs 4 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 3 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Suspicious use of SetThreadContext 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies registry class 1 IoCs
  • NTFS ADS 3 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 35 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\7160c922014ca2e09814ea97e0892575_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\7160c922014ca2e09814ea97e0892575_JaffaCakes118.exe"
    1⤵
    • Checks computer location settings
    • Suspicious use of SetThreadContext
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:3236
    • C:\Windows\SysWOW64\cmd.exe
      "C:\Windows\System32\cmd.exe" /C type nul > "C:\Users\Admin\AppData\Local\Temp\7160c922014ca2e09814ea97e0892575_JaffaCakes118.exe:Zone.Identifier"
      2⤵
      • NTFS ADS
      PID:1372
    • C:\Users\Admin\AppData\Local\Temp\7160c922014ca2e09814ea97e0892575_JaffaCakes118.exe
      C:\Users\Admin\AppData\Local\Temp\7160c922014ca2e09814ea97e0892575_JaffaCakes118.exe
      2⤵
      • Checks computer location settings
      • Executes dropped EXE
      • Adds Run key to start application
      • Modifies registry class
      • NTFS ADS
      • Suspicious use of WriteProcessMemory
      PID:3840
      • C:\Windows\SysWOW64\WScript.exe
        "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\install.vbs"
        3⤵
        • Checks computer location settings
        • Suspicious use of WriteProcessMemory
        PID:4864
        • C:\Windows\SysWOW64\cmd.exe
          "C:\Windows\System32\cmd.exe" /c "C:\Users\Admin\AppData\Roaming\Windows10Update\servicesT.exe"
          4⤵
          • Suspicious use of WriteProcessMemory
          PID:1616
          • C:\Users\Admin\AppData\Roaming\Windows10Update\servicesT.exe
            C:\Users\Admin\AppData\Roaming\Windows10Update\servicesT.exe
            5⤵
            • Checks computer location settings
            • Executes dropped EXE
            • Suspicious use of SetThreadContext
            • Suspicious use of AdjustPrivilegeToken
            • Suspicious use of WriteProcessMemory
            PID:4728
            • C:\Windows\SysWOW64\cmd.exe
              "C:\Windows\System32\cmd.exe" /C type nul > "C:\Users\Admin\AppData\Roaming\Windows10Update\servicesT.exe:Zone.Identifier"
              6⤵
              • NTFS ADS
              PID:2840
            • C:\Users\Admin\AppData\Roaming\Windows10Update\servicesT.exe
              C:\Users\Admin\AppData\Roaming\Windows10Update\servicesT.exe
              6⤵
              • Executes dropped EXE
              • Adds Run key to start application
              • Suspicious use of SetWindowsHookEx
              PID:2400

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\7160c922014ca2e09814ea97e0892575_JaffaCakes118.exe

    Filesize

    330KB

    MD5

    7160c922014ca2e09814ea97e0892575

    SHA1

    4b89e8c0e55360eb92040feae26d80c73542846c

    SHA256

    f053c60697e0af53615df9ef94f936ea9f571a2f697e19c7db8955d36fe12a4a

    SHA512

    2adf6b0a5ad50c92152a2aa5a8d3c8c113c374a5a9e823f4ddf391de9beed3069597ad5fc7fde0571bd18c2c91a8042121bfb6fad4ffde768cfb69ee08ac7b22

  • C:\Users\Admin\AppData\Local\Temp\install.vbs

    Filesize

    442B

    MD5

    ad6142dbff8f2dc512e4b02eb2d99235

    SHA1

    4fa753dadd6e969634e8fc9efea8fdd94a79a5f6

    SHA256

    f57cfb9871673dd7135346493efeba1b8de7a3a84d322e735e6f3b33885d4542

    SHA512

    2b772b10c413321e96d6ce4f0385ed022deff7e1ece68cff02c81f3395d2d842e1ea90042624919aa19d2243d002e32abe932e576d39ebe34922a8dae2c6575c

  • C:\Users\Admin\AppData\Roaming\SystemWindows7\logs.dat

    Filesize

    79B

    MD5

    640d4f458ba07c356848ef9ff43f0371

    SHA1

    51c00ae5b41a6c2db064380c277dca832ae68903

    SHA256

    d64f30d29dcd87a05f8499e36493d32158a293187c44f9356b7caf0a265a3bb1

    SHA512

    59a04f9a88966c37263b6e9a333a25208ce31214b40058a96582841613d89329f58050960d4e0742e986bd5fc9f89c2eaddc5fa12ae4b8b1c099676625c46996

  • memory/2400-35-0x0000000000400000-0x0000000000420000-memory.dmp

    Filesize

    128KB

  • memory/2400-39-0x0000000000400000-0x0000000000420000-memory.dmp

    Filesize

    128KB

  • memory/3236-12-0x00000000064F0000-0x000000000658C000-memory.dmp

    Filesize

    624KB

  • memory/3236-5-0x0000000005490000-0x00000000054B2000-memory.dmp

    Filesize

    136KB

  • memory/3236-7-0x0000000074A10000-0x00000000751C0000-memory.dmp

    Filesize

    7.7MB

  • memory/3236-8-0x00000000065B0000-0x0000000006B54000-memory.dmp

    Filesize

    5.6MB

  • memory/3236-9-0x0000000006B60000-0x0000000006D22000-memory.dmp

    Filesize

    1.8MB

  • memory/3236-10-0x0000000074A1E000-0x0000000074A1F000-memory.dmp

    Filesize

    4KB

  • memory/3236-11-0x0000000074A10000-0x00000000751C0000-memory.dmp

    Filesize

    7.7MB

  • memory/3236-0-0x0000000074A1E000-0x0000000074A1F000-memory.dmp

    Filesize

    4KB

  • memory/3236-1-0x0000000000AE0000-0x0000000000B38000-memory.dmp

    Filesize

    352KB

  • memory/3236-6-0x0000000005620000-0x0000000005686000-memory.dmp

    Filesize

    408KB

  • memory/3236-2-0x0000000002EC0000-0x0000000002EE2000-memory.dmp

    Filesize

    136KB

  • memory/3236-3-0x0000000002DE0000-0x0000000002E04000-memory.dmp

    Filesize

    144KB

  • memory/3236-22-0x0000000074A10000-0x00000000751C0000-memory.dmp

    Filesize

    7.7MB

  • memory/3236-4-0x0000000005500000-0x0000000005592000-memory.dmp

    Filesize

    584KB

  • memory/3840-25-0x0000000000400000-0x0000000000420000-memory.dmp

    Filesize

    128KB

  • memory/3840-18-0x0000000000400000-0x0000000000420000-memory.dmp

    Filesize

    128KB

  • memory/3840-17-0x0000000000400000-0x0000000000420000-memory.dmp

    Filesize

    128KB

  • memory/3840-13-0x0000000000400000-0x0000000000420000-memory.dmp

    Filesize

    128KB

  • memory/4728-30-0x0000000002900000-0x0000000002924000-memory.dmp

    Filesize

    144KB