Analysis
-
max time kernel
149s -
max time network
156s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
23/08/2024, 02:19
Static task
static1
Behavioral task
behavioral1
Sample
b9fb950578a5b3c4744528ca19853523_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
b9fb950578a5b3c4744528ca19853523_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
b9fb950578a5b3c4744528ca19853523_JaffaCakes118.exe
-
Size
3.4MB
-
MD5
b9fb950578a5b3c4744528ca19853523
-
SHA1
0aa69cd449c65069b77d0e257a9c64d81ea07cc1
-
SHA256
9186d22215e3710701624ff6cbe64806d3d38c48797eea595bfd6715db8dae2b
-
SHA512
746ccc35f49ecfaeb212b4ababfb989aa10a72bd3bc193305ab5e6c83e577432ccc636abf8c2a7e236692dbf4f66e1d040cc69889bf0bd8bc1749c19f367e25f
-
SSDEEP
49152:8QDZlITvSLO8YHnS1HEIPhaJPeEtyRn+hTz:lDZlR1kIZaJPeEtRV
Malware Config
Extracted
remcos
3.0.0 Pro
5852ESGESHB$SRHBGSEF
89.163.144.125:5852
-
audio_folder
MicRecords
-
audio_path
%AppData%
-
audio_record_time
5
-
connect_delay
0
-
connect_interval
1
-
copy_file
remcos.exe
-
copy_folder
Remcos
-
delete_file
false
-
hide_file
false
-
hide_keylog_file
false
-
install_flag
false
-
install_path
%AppData%
-
keylog_crypt
true
-
keylog_file
rackless.bin
-
keylog_flag
false
-
keylog_folder
Aspero
-
keylog_path
%Temp%
-
mouse_option
false
-
mutex
5852ETEY$GWEFAWGW-EPZ21B
-
screenshot_crypt
false
-
screenshot_flag
false
-
screenshot_folder
Screenshots
-
screenshot_path
%AppData%
-
screenshot_time
10
-
startup_value
Remcos
-
take_screenshot_option
false
-
take_screenshot_time
5
-
take_screenshot_title
wikipedia;solitaire;
Signatures
-
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\Windows\Tasks\vmsync.job notepad.exe -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language notepad.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language b9fb950578a5b3c4744528ca19853523_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language notepad.exe -
Suspicious behavior: EnumeratesProcesses 7 IoCs
pid Process 2796 b9fb950578a5b3c4744528ca19853523_JaffaCakes118.exe 1664 notepad.exe 1664 notepad.exe 1664 notepad.exe 1664 notepad.exe 1664 notepad.exe 1664 notepad.exe -
Suspicious behavior: MapViewOfSection 6 IoCs
pid Process 1664 notepad.exe 1664 notepad.exe 1664 notepad.exe 1664 notepad.exe 1664 notepad.exe 1664 notepad.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2796 b9fb950578a5b3c4744528ca19853523_JaffaCakes118.exe 3008 notepad.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2796 wrote to memory of 1664 2796 b9fb950578a5b3c4744528ca19853523_JaffaCakes118.exe 29 PID 2796 wrote to memory of 1664 2796 b9fb950578a5b3c4744528ca19853523_JaffaCakes118.exe 29 PID 2796 wrote to memory of 1664 2796 b9fb950578a5b3c4744528ca19853523_JaffaCakes118.exe 29 PID 2796 wrote to memory of 1664 2796 b9fb950578a5b3c4744528ca19853523_JaffaCakes118.exe 29 PID 2796 wrote to memory of 1664 2796 b9fb950578a5b3c4744528ca19853523_JaffaCakes118.exe 29 PID 2796 wrote to memory of 1664 2796 b9fb950578a5b3c4744528ca19853523_JaffaCakes118.exe 29 PID 2796 wrote to memory of 1664 2796 b9fb950578a5b3c4744528ca19853523_JaffaCakes118.exe 29 PID 2796 wrote to memory of 1664 2796 b9fb950578a5b3c4744528ca19853523_JaffaCakes118.exe 29 PID 2796 wrote to memory of 1664 2796 b9fb950578a5b3c4744528ca19853523_JaffaCakes118.exe 29 PID 2796 wrote to memory of 1664 2796 b9fb950578a5b3c4744528ca19853523_JaffaCakes118.exe 29 PID 2796 wrote to memory of 1664 2796 b9fb950578a5b3c4744528ca19853523_JaffaCakes118.exe 29 PID 2796 wrote to memory of 1664 2796 b9fb950578a5b3c4744528ca19853523_JaffaCakes118.exe 29 PID 2796 wrote to memory of 1664 2796 b9fb950578a5b3c4744528ca19853523_JaffaCakes118.exe 29 PID 2796 wrote to memory of 1664 2796 b9fb950578a5b3c4744528ca19853523_JaffaCakes118.exe 29 PID 2796 wrote to memory of 1664 2796 b9fb950578a5b3c4744528ca19853523_JaffaCakes118.exe 29 PID 2796 wrote to memory of 1664 2796 b9fb950578a5b3c4744528ca19853523_JaffaCakes118.exe 29 PID 2796 wrote to memory of 1664 2796 b9fb950578a5b3c4744528ca19853523_JaffaCakes118.exe 29 PID 2796 wrote to memory of 1664 2796 b9fb950578a5b3c4744528ca19853523_JaffaCakes118.exe 29 PID 2796 wrote to memory of 1664 2796 b9fb950578a5b3c4744528ca19853523_JaffaCakes118.exe 29 PID 2796 wrote to memory of 1664 2796 b9fb950578a5b3c4744528ca19853523_JaffaCakes118.exe 29 PID 2796 wrote to memory of 1664 2796 b9fb950578a5b3c4744528ca19853523_JaffaCakes118.exe 29 PID 2796 wrote to memory of 1664 2796 b9fb950578a5b3c4744528ca19853523_JaffaCakes118.exe 29 PID 2796 wrote to memory of 1664 2796 b9fb950578a5b3c4744528ca19853523_JaffaCakes118.exe 29 PID 2796 wrote to memory of 1664 2796 b9fb950578a5b3c4744528ca19853523_JaffaCakes118.exe 29 PID 2796 wrote to memory of 1664 2796 b9fb950578a5b3c4744528ca19853523_JaffaCakes118.exe 29 PID 2796 wrote to memory of 1664 2796 b9fb950578a5b3c4744528ca19853523_JaffaCakes118.exe 29 PID 2796 wrote to memory of 1664 2796 b9fb950578a5b3c4744528ca19853523_JaffaCakes118.exe 29 PID 2796 wrote to memory of 1664 2796 b9fb950578a5b3c4744528ca19853523_JaffaCakes118.exe 29 PID 2796 wrote to memory of 1664 2796 b9fb950578a5b3c4744528ca19853523_JaffaCakes118.exe 29 PID 2796 wrote to memory of 1664 2796 b9fb950578a5b3c4744528ca19853523_JaffaCakes118.exe 29 PID 2796 wrote to memory of 1664 2796 b9fb950578a5b3c4744528ca19853523_JaffaCakes118.exe 29 PID 2796 wrote to memory of 1664 2796 b9fb950578a5b3c4744528ca19853523_JaffaCakes118.exe 29 PID 2796 wrote to memory of 1664 2796 b9fb950578a5b3c4744528ca19853523_JaffaCakes118.exe 29 PID 2796 wrote to memory of 1664 2796 b9fb950578a5b3c4744528ca19853523_JaffaCakes118.exe 29 PID 1664 wrote to memory of 2104 1664 notepad.exe 30 PID 1664 wrote to memory of 2104 1664 notepad.exe 30 PID 1664 wrote to memory of 2104 1664 notepad.exe 30 PID 1664 wrote to memory of 2104 1664 notepad.exe 30 PID 1664 wrote to memory of 2104 1664 notepad.exe 30 PID 1664 wrote to memory of 2104 1664 notepad.exe 30 PID 1664 wrote to memory of 2104 1664 notepad.exe 30 PID 1664 wrote to memory of 2104 1664 notepad.exe 30 PID 1664 wrote to memory of 2104 1664 notepad.exe 30 PID 1664 wrote to memory of 2104 1664 notepad.exe 30 PID 1664 wrote to memory of 2104 1664 notepad.exe 30 PID 1664 wrote to memory of 2104 1664 notepad.exe 30 PID 1664 wrote to memory of 2104 1664 notepad.exe 30 PID 1664 wrote to memory of 2456 1664 notepad.exe 31 PID 1664 wrote to memory of 2456 1664 notepad.exe 31 PID 1664 wrote to memory of 2456 1664 notepad.exe 31 PID 1664 wrote to memory of 2456 1664 notepad.exe 31 PID 1664 wrote to memory of 2456 1664 notepad.exe 31 PID 1664 wrote to memory of 2456 1664 notepad.exe 31 PID 1664 wrote to memory of 2456 1664 notepad.exe 31 PID 1664 wrote to memory of 2456 1664 notepad.exe 31 PID 1664 wrote to memory of 2456 1664 notepad.exe 31 PID 1664 wrote to memory of 2456 1664 notepad.exe 31 PID 1664 wrote to memory of 2456 1664 notepad.exe 31 PID 1664 wrote to memory of 2456 1664 notepad.exe 31 PID 1664 wrote to memory of 2456 1664 notepad.exe 31 PID 1664 wrote to memory of 1700 1664 notepad.exe 32 PID 1664 wrote to memory of 1700 1664 notepad.exe 32 PID 1664 wrote to memory of 1700 1664 notepad.exe 32 PID 1664 wrote to memory of 1700 1664 notepad.exe 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\b9fb950578a5b3c4744528ca19853523_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\b9fb950578a5b3c4744528ca19853523_JaffaCakes118.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2796 -
C:\Windows\SysWOW64\notepad.exe"C:\Windows\system32\notepad.exe"2⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:1664 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe"3⤵PID:2104
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe"3⤵PID:2456
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe"3⤵PID:1700
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe"3⤵PID:1640
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe"3⤵PID:2328
-
-
C:\Windows\SysWOW64\notepad.exe"C:\Windows\system32\notepad.exe"3⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:3008
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
74B
MD54e604965452604e0b0e9917408f69cfd
SHA173cf90d0a9d4361bf9a34634c6cce27c1e7ba448
SHA256afc581d398d63d28b8aa84fd3324c22402dc09691d33c95cebe53eeff9fb7fae
SHA5121fb40183417e98bfb5f23a0ad6957e5433c0bd458d9a947346f9ba2c754bc25d80789861ad0af554e8a71172b2c99858921ba138ac5658d13f7eb24035813923