Analysis Overview
SHA256
f62ca03ce9a80ac13bce5c2854a3efbf8bcb9f38cd2bf0dce8209af516b2338f
Threat Level: Known bad
The file 604199cbc88628d6d93fe507f23ac2d0_JaffaCakes118 was found to be: Known bad.
Malicious Activity Summary
Remcos
Loads dropped DLL
Suspicious use of SetThreadContext
Enumerates physical storage devices
Program crash
Unsigned PE
NSIS installer
Suspicious behavior: MapViewOfSection
Suspicious use of SetWindowsHookEx
Suspicious behavior: EnumeratesProcesses
Suspicious use of WriteProcessMemory
MITRE ATT&CK
Enterprise Matrix V15
Analysis: static1
Detonation Overview
Reported
2024-07-20 22:36
Signatures
Unsigned PE
| Description | Indicator | Process | Target |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
NSIS installer
| Description | Indicator | Process | Target |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
Analysis: behavioral6
Detonation Overview
Submitted
2024-07-20 22:36
Reported
2024-07-20 22:39
Platform
win10v2004-20240709-en
Max time kernel
141s
Max time network
108s
Command Line
Signatures
Program crash
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Windows\SysWOW64\WerFault.exe | C:\Windows\SysWOW64\rundll32.exe |
Suspicious behavior: EnumeratesProcesses
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Windows\SysWOW64\rundll32.exe | N/A |
| N/A | N/A | C:\Windows\SysWOW64\rundll32.exe | N/A |
| N/A | N/A | C:\Windows\SysWOW64\rundll32.exe | N/A |
| N/A | N/A | C:\Windows\SysWOW64\rundll32.exe | N/A |
| N/A | N/A | C:\Windows\SysWOW64\rundll32.exe | N/A |
| N/A | N/A | C:\Windows\SysWOW64\rundll32.exe | N/A |
| N/A | N/A | C:\Windows\SysWOW64\rundll32.exe | N/A |
| N/A | N/A | C:\Windows\SysWOW64\rundll32.exe | N/A |
Suspicious use of WriteProcessMemory
| Description | Indicator | Process | Target |
| PID 4884 wrote to memory of 3908 | N/A | C:\Windows\system32\rundll32.exe | C:\Windows\SysWOW64\rundll32.exe |
| PID 4884 wrote to memory of 3908 | N/A | C:\Windows\system32\rundll32.exe | C:\Windows\SysWOW64\rundll32.exe |
| PID 4884 wrote to memory of 3908 | N/A | C:\Windows\system32\rundll32.exe | C:\Windows\SysWOW64\rundll32.exe |
Processes
C:\Windows\system32\rundll32.exe
rundll32.exe C:\Users\Admin\AppData\Local\Temp\p01ehv9wv.dll,#1
C:\Windows\SysWOW64\rundll32.exe
rundll32.exe C:\Users\Admin\AppData\Local\Temp\p01ehv9wv.dll,#1
C:\Windows\SysWOW64\WerFault.exe
C:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 3908 -ip 3908
C:\Windows\SysWOW64\WerFault.exe
C:\Windows\SysWOW64\WerFault.exe -u -p 3908 -s 732
Network
| Country | Destination | Domain | Proto |
| US | 8.8.8.8:53 | g.bing.com | udp |
| US | 204.79.197.237:443 | g.bing.com | tcp |
| US | 8.8.8.8:53 | 154.239.44.20.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 237.197.79.204.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 73.159.190.20.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 88.156.103.20.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 28.118.140.52.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 157.123.68.40.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 206.23.85.13.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 217.135.221.88.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 43.58.199.20.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 19.229.111.52.in-addr.arpa | udp |
| US | 8.8.8.8:53 | tse1.mm.bing.net | udp |
| US | 150.171.27.10:443 | tse1.mm.bing.net | tcp |
| US | 150.171.27.10:443 | tse1.mm.bing.net | tcp |
| US | 150.171.27.10:443 | tse1.mm.bing.net | tcp |
| US | 150.171.27.10:443 | tse1.mm.bing.net | tcp |
| US | 150.171.27.10:443 | tse1.mm.bing.net | tcp |
| US | 8.8.8.8:53 | 10.27.171.150.in-addr.arpa | udp |
Files
memory/3908-0-0x0000000010000000-0x0000000010008000-memory.dmp
memory/3908-1-0x0000000010000000-0x0000000010008000-memory.dmp
Analysis: behavioral1
Detonation Overview
Submitted
2024-07-20 22:36
Reported
2024-07-20 22:39
Platform
win7-20240704-en
Max time kernel
148s
Max time network
148s
Command Line
Signatures
Remcos
Loads dropped DLL
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\604199cbc88628d6d93fe507f23ac2d0_JaffaCakes118.exe | N/A |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\604199cbc88628d6d93fe507f23ac2d0_JaffaCakes118.exe | N/A |
Suspicious use of SetThreadContext
| Description | Indicator | Process | Target |
| PID 2448 set thread context of 1436 | N/A | C:\Users\Admin\AppData\Local\Temp\604199cbc88628d6d93fe507f23ac2d0_JaffaCakes118.exe | C:\Users\Admin\AppData\Local\Temp\604199cbc88628d6d93fe507f23ac2d0_JaffaCakes118.exe |
Enumerates physical storage devices
Suspicious behavior: EnumeratesProcesses
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\604199cbc88628d6d93fe507f23ac2d0_JaffaCakes118.exe | N/A |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\604199cbc88628d6d93fe507f23ac2d0_JaffaCakes118.exe | N/A |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\604199cbc88628d6d93fe507f23ac2d0_JaffaCakes118.exe | N/A |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\604199cbc88628d6d93fe507f23ac2d0_JaffaCakes118.exe | N/A |
Suspicious behavior: MapViewOfSection
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\604199cbc88628d6d93fe507f23ac2d0_JaffaCakes118.exe | N/A |
Suspicious use of SetWindowsHookEx
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\604199cbc88628d6d93fe507f23ac2d0_JaffaCakes118.exe | N/A |
Suspicious use of WriteProcessMemory
Processes
C:\Users\Admin\AppData\Local\Temp\604199cbc88628d6d93fe507f23ac2d0_JaffaCakes118.exe
"C:\Users\Admin\AppData\Local\Temp\604199cbc88628d6d93fe507f23ac2d0_JaffaCakes118.exe"
C:\Users\Admin\AppData\Local\Temp\604199cbc88628d6d93fe507f23ac2d0_JaffaCakes118.exe
"C:\Users\Admin\AppData\Local\Temp\604199cbc88628d6d93fe507f23ac2d0_JaffaCakes118.exe"
Network
| Country | Destination | Domain | Proto |
| VN | 103.153.76.111:2667 | tcp | |
| VN | 103.153.76.111:2667 | tcp | |
| VN | 103.153.76.111:2667 | tcp | |
| VN | 103.153.76.111:2667 | tcp | |
| VN | 103.153.76.111:2667 | tcp | |
| VN | 103.153.76.111:2667 | tcp | |
| VN | 103.153.76.111:2667 | tcp |
Files
\Users\Admin\AppData\Local\Temp\nso1FD1.tmp\System.dll
| MD5 | fccff8cb7a1067e23fd2e2b63971a8e1 |
| SHA1 | 30e2a9e137c1223a78a0f7b0bf96a1c361976d91 |
| SHA256 | 6fcea34c8666b06368379c6c402b5321202c11b00889401c743fb96c516c679e |
| SHA512 | f4335e84e6f8d70e462a22f1c93d2998673a7616c868177cac3e8784a3be1d7d0bb96f2583fa0ed82f4f2b6b8f5d9b33521c279a42e055d80a94b4f3f1791e0c |
\Users\Admin\AppData\Local\Temp\p01ehv9wv.dll
| MD5 | 3f68de8284608c37fa2273f9fc8d9b19 |
| SHA1 | 7cf819fa8a6c2cf2e25811282445742ceba54a96 |
| SHA256 | 523ebe047debe82ad79dcc25215c32df1fd93353c00bab190567025a64fdc0c3 |
| SHA512 | 488310eea4ee067e25c9d9c2806db64ef79edef1e0030957ef899f360fac7420af0702878b6e85184c6c9ed992d2757142063308bc23ce134628cd8af116a4c3 |
memory/2448-11-0x0000000010000000-0x0000000010008000-memory.dmp
memory/1436-12-0x0000000000400000-0x0000000000421000-memory.dmp
memory/2448-15-0x0000000010000000-0x0000000010008000-memory.dmp
memory/1436-14-0x0000000000400000-0x0000000000421000-memory.dmp
memory/1436-16-0x0000000000400000-0x0000000000421000-memory.dmp
memory/1436-17-0x0000000000400000-0x0000000000421000-memory.dmp
memory/1436-20-0x0000000000400000-0x0000000000421000-memory.dmp
memory/1436-22-0x0000000000400000-0x0000000000421000-memory.dmp
memory/1436-26-0x0000000000400000-0x0000000000421000-memory.dmp
C:\Users\Admin\AppData\Roaming\EXCEL\logs.dat
| MD5 | 1c17f04fca6c25f1cb79fd5ed8dc6498 |
| SHA1 | 933a90d6782de7e0cd4cdfe612af688eda651ae2 |
| SHA256 | 948a5c00157d270ffda3d7630adbe16677182e90d5bc2aacfb4f474dabf0ba74 |
| SHA512 | f9b7c89bcde690a7ccac361e53733beb23ce24361ed3eb8e9062026d07ca08f457acfc68fd72e70d4e32b9d6336d087a874d33473005741525b52bd9c76a8908 |
memory/1436-30-0x0000000000400000-0x0000000000421000-memory.dmp
memory/1436-34-0x0000000000400000-0x0000000000421000-memory.dmp
memory/1436-38-0x0000000000400000-0x0000000000421000-memory.dmp
memory/1436-44-0x0000000000400000-0x0000000000421000-memory.dmp
memory/1436-48-0x0000000000400000-0x0000000000421000-memory.dmp
Analysis: behavioral2
Detonation Overview
Submitted
2024-07-20 22:36
Reported
2024-07-20 22:39
Platform
win10v2004-20240704-en
Max time kernel
150s
Max time network
152s
Command Line
Signatures
Loads dropped DLL
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\604199cbc88628d6d93fe507f23ac2d0_JaffaCakes118.exe | N/A |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\604199cbc88628d6d93fe507f23ac2d0_JaffaCakes118.exe | N/A |
Enumerates physical storage devices
Program crash
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Windows\SysWOW64\WerFault.exe | C:\Users\Admin\AppData\Local\Temp\604199cbc88628d6d93fe507f23ac2d0_JaffaCakes118.exe |
Suspicious behavior: EnumeratesProcesses
Suspicious use of WriteProcessMemory
| Description | Indicator | Process | Target |
| PID 4984 wrote to memory of 3996 | N/A | C:\Users\Admin\AppData\Local\Temp\604199cbc88628d6d93fe507f23ac2d0_JaffaCakes118.exe | C:\Users\Admin\AppData\Local\Temp\604199cbc88628d6d93fe507f23ac2d0_JaffaCakes118.exe |
| PID 4984 wrote to memory of 3996 | N/A | C:\Users\Admin\AppData\Local\Temp\604199cbc88628d6d93fe507f23ac2d0_JaffaCakes118.exe | C:\Users\Admin\AppData\Local\Temp\604199cbc88628d6d93fe507f23ac2d0_JaffaCakes118.exe |
| PID 4984 wrote to memory of 3996 | N/A | C:\Users\Admin\AppData\Local\Temp\604199cbc88628d6d93fe507f23ac2d0_JaffaCakes118.exe | C:\Users\Admin\AppData\Local\Temp\604199cbc88628d6d93fe507f23ac2d0_JaffaCakes118.exe |
Processes
C:\Users\Admin\AppData\Local\Temp\604199cbc88628d6d93fe507f23ac2d0_JaffaCakes118.exe
"C:\Users\Admin\AppData\Local\Temp\604199cbc88628d6d93fe507f23ac2d0_JaffaCakes118.exe"
C:\Users\Admin\AppData\Local\Temp\604199cbc88628d6d93fe507f23ac2d0_JaffaCakes118.exe
"C:\Users\Admin\AppData\Local\Temp\604199cbc88628d6d93fe507f23ac2d0_JaffaCakes118.exe"
C:\Windows\SysWOW64\WerFault.exe
C:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 4984 -ip 4984
C:\Windows\SysWOW64\WerFault.exe
C:\Windows\SysWOW64\WerFault.exe -u -p 4984 -s 1000
Network
| Country | Destination | Domain | Proto |
| US | 8.8.8.8:53 | g.bing.com | udp |
| US | 204.79.197.237:443 | g.bing.com | tcp |
| US | 8.8.8.8:53 | 217.106.137.52.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 172.210.232.199.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 0.159.190.20.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 237.197.79.204.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 55.36.223.20.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 154.239.44.20.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 157.123.68.40.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 171.39.242.20.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 18.134.221.88.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 19.229.111.52.in-addr.arpa | udp |
| US | 8.8.8.8:53 | tse1.mm.bing.net | udp |
| US | 150.171.28.10:443 | tse1.mm.bing.net | tcp |
| US | 150.171.28.10:443 | tse1.mm.bing.net | tcp |
| US | 150.171.28.10:443 | tse1.mm.bing.net | tcp |
| US | 150.171.28.10:443 | tse1.mm.bing.net | tcp |
| US | 150.171.28.10:443 | tse1.mm.bing.net | tcp |
| US | 8.8.8.8:53 | 10.28.171.150.in-addr.arpa | udp |
| US | 8.8.8.8:53 | udp |
Files
C:\Users\Admin\AppData\Local\Temp\nsi756F.tmp\System.dll
| MD5 | fccff8cb7a1067e23fd2e2b63971a8e1 |
| SHA1 | 30e2a9e137c1223a78a0f7b0bf96a1c361976d91 |
| SHA256 | 6fcea34c8666b06368379c6c402b5321202c11b00889401c743fb96c516c679e |
| SHA512 | f4335e84e6f8d70e462a22f1c93d2998673a7616c868177cac3e8784a3be1d7d0bb96f2583fa0ed82f4f2b6b8f5d9b33521c279a42e055d80a94b4f3f1791e0c |
C:\Users\Admin\AppData\Local\Temp\p01ehv9wv.dll
| MD5 | 3f68de8284608c37fa2273f9fc8d9b19 |
| SHA1 | 7cf819fa8a6c2cf2e25811282445742ceba54a96 |
| SHA256 | 523ebe047debe82ad79dcc25215c32df1fd93353c00bab190567025a64fdc0c3 |
| SHA512 | 488310eea4ee067e25c9d9c2806db64ef79edef1e0030957ef899f360fac7420af0702878b6e85184c6c9ed992d2757142063308bc23ce134628cd8af116a4c3 |
memory/4984-9-0x0000000010000000-0x0000000010008000-memory.dmp
memory/4984-10-0x0000000010000000-0x0000000010008000-memory.dmp
Analysis: behavioral3
Detonation Overview
Submitted
2024-07-20 22:36
Reported
2024-07-20 22:39
Platform
win7-20240708-en
Max time kernel
117s
Max time network
118s
Command Line
Signatures
Program crash
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Windows\SysWOW64\WerFault.exe | C:\Windows\SysWOW64\rundll32.exe |
Suspicious use of WriteProcessMemory
Processes
C:\Windows\system32\rundll32.exe
rundll32.exe C:\Users\Admin\AppData\Local\Temp\$PLUGINSDIR\System.dll,#1
C:\Windows\SysWOW64\rundll32.exe
rundll32.exe C:\Users\Admin\AppData\Local\Temp\$PLUGINSDIR\System.dll,#1
C:\Windows\SysWOW64\WerFault.exe
C:\Windows\SysWOW64\WerFault.exe -u -p 2376 -s 220
Network
Files
Analysis: behavioral4
Detonation Overview
Submitted
2024-07-20 22:36
Reported
2024-07-20 22:39
Platform
win10v2004-20240709-en
Max time kernel
148s
Max time network
151s
Command Line
Signatures
Program crash
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Windows\SysWOW64\WerFault.exe | C:\Windows\SysWOW64\rundll32.exe |
Suspicious use of WriteProcessMemory
| Description | Indicator | Process | Target |
| PID 3024 wrote to memory of 4676 | N/A | C:\Windows\system32\rundll32.exe | C:\Windows\SysWOW64\rundll32.exe |
| PID 3024 wrote to memory of 4676 | N/A | C:\Windows\system32\rundll32.exe | C:\Windows\SysWOW64\rundll32.exe |
| PID 3024 wrote to memory of 4676 | N/A | C:\Windows\system32\rundll32.exe | C:\Windows\SysWOW64\rundll32.exe |
Processes
C:\Windows\system32\rundll32.exe
rundll32.exe C:\Users\Admin\AppData\Local\Temp\$PLUGINSDIR\System.dll,#1
C:\Windows\SysWOW64\rundll32.exe
rundll32.exe C:\Users\Admin\AppData\Local\Temp\$PLUGINSDIR\System.dll,#1
C:\Windows\SysWOW64\WerFault.exe
C:\Windows\SysWOW64\WerFault.exe -pss -s 412 -p 4676 -ip 4676
C:\Windows\SysWOW64\WerFault.exe
C:\Windows\SysWOW64\WerFault.exe -u -p 4676 -s 612
Network
| Country | Destination | Domain | Proto |
| US | 8.8.8.8:53 | g.bing.com | udp |
| US | 204.79.197.237:443 | g.bing.com | tcp |
| US | 8.8.8.8:53 | tse1.mm.bing.net | udp |
| US | 150.171.28.10:443 | tse1.mm.bing.net | tcp |
| US | 150.171.28.10:443 | tse1.mm.bing.net | tcp |
| US | 150.171.28.10:443 | tse1.mm.bing.net | tcp |
| US | 8.8.8.8:53 | 8.8.8.8.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 149.220.183.52.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 237.197.79.204.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 73.31.126.40.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 172.214.232.199.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 154.239.44.20.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 86.23.85.13.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 171.39.242.20.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 217.135.221.88.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 0.205.248.87.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 55.36.223.20.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 48.229.111.52.in-addr.arpa | udp |
| US | 8.8.8.8:53 | tse1.mm.bing.net | udp |
| US | 150.171.27.10:443 | tse1.mm.bing.net | tcp |
| US | 150.171.27.10:443 | tse1.mm.bing.net | tcp |
| US | 150.171.27.10:443 | tse1.mm.bing.net | tcp |
| US | 150.171.27.10:443 | tse1.mm.bing.net | tcp |
| US | 150.171.27.10:443 | tse1.mm.bing.net | tcp |
| US | 8.8.8.8:53 | 10.27.171.150.in-addr.arpa | udp |
Files
Analysis: behavioral5
Detonation Overview
Submitted
2024-07-20 22:36
Reported
2024-07-20 22:39
Platform
win7-20240704-en
Max time kernel
119s
Max time network
121s
Command Line
Signatures
Suspicious behavior: EnumeratesProcesses
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Windows\SysWOW64\rundll32.exe | N/A |
| N/A | N/A | C:\Windows\SysWOW64\rundll32.exe | N/A |
| N/A | N/A | C:\Windows\SysWOW64\rundll32.exe | N/A |
| N/A | N/A | C:\Windows\SysWOW64\rundll32.exe | N/A |
Suspicious use of WriteProcessMemory
| Description | Indicator | Process | Target |
| PID 2820 wrote to memory of 2964 | N/A | C:\Windows\system32\rundll32.exe | C:\Windows\SysWOW64\rundll32.exe |
| PID 2820 wrote to memory of 2964 | N/A | C:\Windows\system32\rundll32.exe | C:\Windows\SysWOW64\rundll32.exe |
| PID 2820 wrote to memory of 2964 | N/A | C:\Windows\system32\rundll32.exe | C:\Windows\SysWOW64\rundll32.exe |
| PID 2820 wrote to memory of 2964 | N/A | C:\Windows\system32\rundll32.exe | C:\Windows\SysWOW64\rundll32.exe |
| PID 2820 wrote to memory of 2964 | N/A | C:\Windows\system32\rundll32.exe | C:\Windows\SysWOW64\rundll32.exe |
| PID 2820 wrote to memory of 2964 | N/A | C:\Windows\system32\rundll32.exe | C:\Windows\SysWOW64\rundll32.exe |
| PID 2820 wrote to memory of 2964 | N/A | C:\Windows\system32\rundll32.exe | C:\Windows\SysWOW64\rundll32.exe |
Processes
C:\Windows\system32\rundll32.exe
rundll32.exe C:\Users\Admin\AppData\Local\Temp\p01ehv9wv.dll,#1
C:\Windows\SysWOW64\rundll32.exe
rundll32.exe C:\Users\Admin\AppData\Local\Temp\p01ehv9wv.dll,#1
Network
Files
memory/2964-0-0x0000000010000000-0x0000000010008000-memory.dmp
memory/2964-1-0x0000000010000000-0x0000000010008000-memory.dmp