Analysis

  • max time kernel
    147s
  • max time network
    121s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    25-05-2024 15:35

General

  • Target

    726eec69e99d3cd35bf5d4a141cff8c0_JaffaCakes118.exe

  • Size

    556KB

  • MD5

    726eec69e99d3cd35bf5d4a141cff8c0

  • SHA1

    f1ca1da7a39ba80cbf0157e03390c30ae44b4b3a

  • SHA256

    b45828548d894e2e2e78c7615e5441ebd199d0a4c31c684d54d49ba4321ac5af

  • SHA512

    aff9e08f9708a0e0f30b30d04e69e11238bfe3e2c423b26c6871ce4ad4ff8b5816fa954d8d731b89fdc7388147b72b0a6850c35230ba14d29db0b12e5c9c674f

  • SSDEEP

    6144:rYTN3Y3EG5bKIi0W9ZJ6NGzr2Hb3DawZZdbmRAINVnLYjz1L7cIakKBxKnPzRGRV:2y3tbK10vGPqewmRXngp7csK+rRfEj

Score
10/10

Malware Config

Signatures

  • Remcos

    Remcos is a closed-source remote control and surveillance software.

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of SetWindowsHookEx 3 IoCs
  • Suspicious use of UnmapMainImage 2 IoCs
  • Suspicious use of WriteProcessMemory 23 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\726eec69e99d3cd35bf5d4a141cff8c0_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\726eec69e99d3cd35bf5d4a141cff8c0_JaffaCakes118.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of UnmapMainImage
    • Suspicious use of WriteProcessMemory
    PID:1640
    • C:\Windows\SysWOW64\WScript.exe
      "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\install.vbs"
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:2944
      • C:\Windows\SysWOW64\cmd.exe
        "C:\Windows\System32\cmd.exe" /c "C:\Users\Admin\AppData\Roaming\Remc\Remc.exe"
        3⤵
        • Loads dropped DLL
        • Suspicious use of WriteProcessMemory
        PID:2728
        • C:\Users\Admin\AppData\Roaming\Remc\Remc.exe
          C:\Users\Admin\AppData\Roaming\Remc\Remc.exe
          4⤵
          • Executes dropped EXE
          • Adds Run key to start application
          • Suspicious use of SetThreadContext
          • Suspicious use of SetWindowsHookEx
          • Suspicious use of UnmapMainImage
          • Suspicious use of WriteProcessMemory
          PID:2568
          • C:\Windows\SysWOW64\svchost.exe
            C:\Windows\SysWOW64\svchost.exe
            5⤵
              PID:2792

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\install.vbs

      Filesize

      410B

      MD5

      837b54af2c8d285fb69d719cc9061206

      SHA1

      b31b75216a46b744eb0d89dd9885431a8ecde820

      SHA256

      353bf067c7071e2b6904205a0f6755433a8711a4b2a9b48ac32ff538463f0e46

      SHA512

      6cc4e846538cf16de26004343a157a565fe9730ad5c253e3fb6c64098405849e732bd2216fbdecd52cc3cbcb84e24e4dca23b5fd4f68bcdc0e73d485479e2311

    • C:\Users\Admin\AppData\Roaming\Remc\Remc.exe

      Filesize

      556KB

      MD5

      726eec69e99d3cd35bf5d4a141cff8c0

      SHA1

      f1ca1da7a39ba80cbf0157e03390c30ae44b4b3a

      SHA256

      b45828548d894e2e2e78c7615e5441ebd199d0a4c31c684d54d49ba4321ac5af

      SHA512

      aff9e08f9708a0e0f30b30d04e69e11238bfe3e2c423b26c6871ce4ad4ff8b5816fa954d8d731b89fdc7388147b72b0a6850c35230ba14d29db0b12e5c9c674f

    • C:\Users\Admin\AppData\Roaming\Remc\logs.dat

      Filesize

      79B

      MD5

      b4a1b180e11fb920610fe7df65e7b0ac

      SHA1

      86a5572a0c1b287a3876568c7ad4c7745d9d9de3

      SHA256

      9fc9c141bda43ec033c45d006fdc6a65107547107385da3741026d635b0475f5

      SHA512

      5b7c6c5721e391eac7d47fcf543271586b2d4cb853fdaae8469b119784e44ffaa2cc50b1fbec5fb5fc64a7fb9f287fb01fc65bcbd9b8c2f04330a4864e2e5ca0

    • memory/1640-3-0x0000000000400000-0x000000000041E000-memory.dmp

      Filesize

      120KB

    • memory/1640-6-0x0000000000400000-0x000000000041E000-memory.dmp

      Filesize

      120KB

    • memory/1640-7-0x0000000072940000-0x0000000072A60000-memory.dmp

      Filesize

      1.1MB

    • memory/1640-11-0x0000000072940000-0x0000000072A60000-memory.dmp

      Filesize

      1.1MB

    • memory/1640-10-0x0000000000400000-0x000000000041E000-memory.dmp

      Filesize

      120KB

    • memory/1640-2-0x0000000077430000-0x0000000077506000-memory.dmp

      Filesize

      856KB

    • memory/2568-19-0x0000000000400000-0x000000000041E000-memory.dmp

      Filesize

      120KB

    • memory/2568-22-0x0000000000400000-0x000000000041E000-memory.dmp

      Filesize

      120KB

    • memory/2792-36-0x000000007EFDE000-0x000000007EFDF000-memory.dmp

      Filesize

      4KB

    • memory/2792-38-0x0000000000400000-0x000000000041E000-memory.dmp

      Filesize

      120KB

    • memory/2792-34-0x0000000000400000-0x000000000041E000-memory.dmp

      Filesize

      120KB

    • memory/2792-32-0x0000000000400000-0x000000000041E000-memory.dmp

      Filesize

      120KB

    • memory/2792-30-0x0000000000400000-0x000000000041E000-memory.dmp

      Filesize

      120KB

    • memory/2792-28-0x0000000000400000-0x000000000041E000-memory.dmp

      Filesize

      120KB

    • memory/2792-26-0x0000000000400000-0x000000000041E000-memory.dmp

      Filesize

      120KB

    • memory/2792-24-0x0000000000400000-0x000000000041E000-memory.dmp

      Filesize

      120KB