Analysis
-
max time kernel
149s -
max time network
155s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
23/08/2024, 02:19
Static task
static1
Behavioral task
behavioral1
Sample
b9fb950578a5b3c4744528ca19853523_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
b9fb950578a5b3c4744528ca19853523_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
b9fb950578a5b3c4744528ca19853523_JaffaCakes118.exe
-
Size
3.4MB
-
MD5
b9fb950578a5b3c4744528ca19853523
-
SHA1
0aa69cd449c65069b77d0e257a9c64d81ea07cc1
-
SHA256
9186d22215e3710701624ff6cbe64806d3d38c48797eea595bfd6715db8dae2b
-
SHA512
746ccc35f49ecfaeb212b4ababfb989aa10a72bd3bc193305ab5e6c83e577432ccc636abf8c2a7e236692dbf4f66e1d040cc69889bf0bd8bc1749c19f367e25f
-
SSDEEP
49152:8QDZlITvSLO8YHnS1HEIPhaJPeEtyRn+hTz:lDZlR1kIZaJPeEtRV
Malware Config
Extracted
remcos
3.0.0 Pro
5852ESGESHB$SRHBGSEF
89.163.144.125:5852
-
audio_folder
MicRecords
-
audio_path
%AppData%
-
audio_record_time
5
-
connect_delay
0
-
connect_interval
1
-
copy_file
remcos.exe
-
copy_folder
Remcos
-
delete_file
false
-
hide_file
false
-
hide_keylog_file
false
-
install_flag
false
-
install_path
%AppData%
-
keylog_crypt
true
-
keylog_file
rackless.bin
-
keylog_flag
false
-
keylog_folder
Aspero
-
keylog_path
%Temp%
-
mouse_option
false
-
mutex
5852ETEY$GWEFAWGW-EPZ21B
-
screenshot_crypt
false
-
screenshot_flag
false
-
screenshot_folder
Screenshots
-
screenshot_path
%AppData%
-
screenshot_time
10
-
startup_value
Remcos
-
take_screenshot_option
false
-
take_screenshot_time
5
-
take_screenshot_title
wikipedia;solitaire;
Signatures
-
Blocklisted process makes network request 30 IoCs
flow pid Process 50 2728 cmd.exe 51 2728 cmd.exe 52 2728 cmd.exe 53 2728 cmd.exe 54 2728 cmd.exe 58 2728 cmd.exe 62 2728 cmd.exe 63 2728 cmd.exe 64 2728 cmd.exe 65 2728 cmd.exe 66 2728 cmd.exe 67 2728 cmd.exe 68 2728 cmd.exe 74 2728 cmd.exe 80 2728 cmd.exe 87 2728 cmd.exe 88 2728 cmd.exe 89 2728 cmd.exe 90 2728 cmd.exe 91 2728 cmd.exe 92 2728 cmd.exe 93 2728 cmd.exe 94 2728 cmd.exe 95 2728 cmd.exe 96 2728 cmd.exe 97 2728 cmd.exe 98 2728 cmd.exe 99 2728 cmd.exe 100 2728 cmd.exe 101 2728 cmd.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\Windows\Tasks\vmsync.job cmd.exe -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language b9fb950578a5b3c4744528ca19853523_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language notepad.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 4416 b9fb950578a5b3c4744528ca19853523_JaffaCakes118.exe 1552 notepad.exe -
Suspicious behavior: MapViewOfSection 1 IoCs
pid Process 1552 notepad.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 4416 b9fb950578a5b3c4744528ca19853523_JaffaCakes118.exe 2728 cmd.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4416 wrote to memory of 1552 4416 b9fb950578a5b3c4744528ca19853523_JaffaCakes118.exe 84 PID 4416 wrote to memory of 1552 4416 b9fb950578a5b3c4744528ca19853523_JaffaCakes118.exe 84 PID 4416 wrote to memory of 1552 4416 b9fb950578a5b3c4744528ca19853523_JaffaCakes118.exe 84 PID 4416 wrote to memory of 1552 4416 b9fb950578a5b3c4744528ca19853523_JaffaCakes118.exe 84 PID 4416 wrote to memory of 1552 4416 b9fb950578a5b3c4744528ca19853523_JaffaCakes118.exe 84 PID 4416 wrote to memory of 1552 4416 b9fb950578a5b3c4744528ca19853523_JaffaCakes118.exe 84 PID 4416 wrote to memory of 1552 4416 b9fb950578a5b3c4744528ca19853523_JaffaCakes118.exe 84 PID 4416 wrote to memory of 1552 4416 b9fb950578a5b3c4744528ca19853523_JaffaCakes118.exe 84 PID 4416 wrote to memory of 1552 4416 b9fb950578a5b3c4744528ca19853523_JaffaCakes118.exe 84 PID 4416 wrote to memory of 1552 4416 b9fb950578a5b3c4744528ca19853523_JaffaCakes118.exe 84 PID 4416 wrote to memory of 1552 4416 b9fb950578a5b3c4744528ca19853523_JaffaCakes118.exe 84 PID 4416 wrote to memory of 1552 4416 b9fb950578a5b3c4744528ca19853523_JaffaCakes118.exe 84 PID 4416 wrote to memory of 1552 4416 b9fb950578a5b3c4744528ca19853523_JaffaCakes118.exe 84 PID 4416 wrote to memory of 1552 4416 b9fb950578a5b3c4744528ca19853523_JaffaCakes118.exe 84 PID 4416 wrote to memory of 1552 4416 b9fb950578a5b3c4744528ca19853523_JaffaCakes118.exe 84 PID 4416 wrote to memory of 1552 4416 b9fb950578a5b3c4744528ca19853523_JaffaCakes118.exe 84 PID 4416 wrote to memory of 1552 4416 b9fb950578a5b3c4744528ca19853523_JaffaCakes118.exe 84 PID 4416 wrote to memory of 1552 4416 b9fb950578a5b3c4744528ca19853523_JaffaCakes118.exe 84 PID 4416 wrote to memory of 1552 4416 b9fb950578a5b3c4744528ca19853523_JaffaCakes118.exe 84 PID 4416 wrote to memory of 1552 4416 b9fb950578a5b3c4744528ca19853523_JaffaCakes118.exe 84 PID 4416 wrote to memory of 1552 4416 b9fb950578a5b3c4744528ca19853523_JaffaCakes118.exe 84 PID 4416 wrote to memory of 1552 4416 b9fb950578a5b3c4744528ca19853523_JaffaCakes118.exe 84 PID 4416 wrote to memory of 1552 4416 b9fb950578a5b3c4744528ca19853523_JaffaCakes118.exe 84 PID 4416 wrote to memory of 1552 4416 b9fb950578a5b3c4744528ca19853523_JaffaCakes118.exe 84 PID 4416 wrote to memory of 1552 4416 b9fb950578a5b3c4744528ca19853523_JaffaCakes118.exe 84 PID 4416 wrote to memory of 1552 4416 b9fb950578a5b3c4744528ca19853523_JaffaCakes118.exe 84 PID 4416 wrote to memory of 1552 4416 b9fb950578a5b3c4744528ca19853523_JaffaCakes118.exe 84 PID 4416 wrote to memory of 1552 4416 b9fb950578a5b3c4744528ca19853523_JaffaCakes118.exe 84 PID 4416 wrote to memory of 1552 4416 b9fb950578a5b3c4744528ca19853523_JaffaCakes118.exe 84 PID 4416 wrote to memory of 1552 4416 b9fb950578a5b3c4744528ca19853523_JaffaCakes118.exe 84 PID 4416 wrote to memory of 1552 4416 b9fb950578a5b3c4744528ca19853523_JaffaCakes118.exe 84 PID 4416 wrote to memory of 1552 4416 b9fb950578a5b3c4744528ca19853523_JaffaCakes118.exe 84 PID 4416 wrote to memory of 1552 4416 b9fb950578a5b3c4744528ca19853523_JaffaCakes118.exe 84 PID 4416 wrote to memory of 1552 4416 b9fb950578a5b3c4744528ca19853523_JaffaCakes118.exe 84 PID 4416 wrote to memory of 1552 4416 b9fb950578a5b3c4744528ca19853523_JaffaCakes118.exe 84 PID 4416 wrote to memory of 1552 4416 b9fb950578a5b3c4744528ca19853523_JaffaCakes118.exe 84 PID 4416 wrote to memory of 1552 4416 b9fb950578a5b3c4744528ca19853523_JaffaCakes118.exe 84 PID 4416 wrote to memory of 1552 4416 b9fb950578a5b3c4744528ca19853523_JaffaCakes118.exe 84 PID 4416 wrote to memory of 1552 4416 b9fb950578a5b3c4744528ca19853523_JaffaCakes118.exe 84 PID 4416 wrote to memory of 1552 4416 b9fb950578a5b3c4744528ca19853523_JaffaCakes118.exe 84 PID 4416 wrote to memory of 1552 4416 b9fb950578a5b3c4744528ca19853523_JaffaCakes118.exe 84 PID 4416 wrote to memory of 1552 4416 b9fb950578a5b3c4744528ca19853523_JaffaCakes118.exe 84 PID 4416 wrote to memory of 1552 4416 b9fb950578a5b3c4744528ca19853523_JaffaCakes118.exe 84 PID 4416 wrote to memory of 1552 4416 b9fb950578a5b3c4744528ca19853523_JaffaCakes118.exe 84 PID 4416 wrote to memory of 1552 4416 b9fb950578a5b3c4744528ca19853523_JaffaCakes118.exe 84 PID 4416 wrote to memory of 1552 4416 b9fb950578a5b3c4744528ca19853523_JaffaCakes118.exe 84 PID 4416 wrote to memory of 1552 4416 b9fb950578a5b3c4744528ca19853523_JaffaCakes118.exe 84 PID 4416 wrote to memory of 1552 4416 b9fb950578a5b3c4744528ca19853523_JaffaCakes118.exe 84 PID 4416 wrote to memory of 1552 4416 b9fb950578a5b3c4744528ca19853523_JaffaCakes118.exe 84 PID 4416 wrote to memory of 1552 4416 b9fb950578a5b3c4744528ca19853523_JaffaCakes118.exe 84 PID 4416 wrote to memory of 1552 4416 b9fb950578a5b3c4744528ca19853523_JaffaCakes118.exe 84 PID 4416 wrote to memory of 1552 4416 b9fb950578a5b3c4744528ca19853523_JaffaCakes118.exe 84 PID 4416 wrote to memory of 1552 4416 b9fb950578a5b3c4744528ca19853523_JaffaCakes118.exe 84 PID 4416 wrote to memory of 1552 4416 b9fb950578a5b3c4744528ca19853523_JaffaCakes118.exe 84 PID 4416 wrote to memory of 1552 4416 b9fb950578a5b3c4744528ca19853523_JaffaCakes118.exe 84 PID 4416 wrote to memory of 1552 4416 b9fb950578a5b3c4744528ca19853523_JaffaCakes118.exe 84 PID 4416 wrote to memory of 1552 4416 b9fb950578a5b3c4744528ca19853523_JaffaCakes118.exe 84 PID 4416 wrote to memory of 1552 4416 b9fb950578a5b3c4744528ca19853523_JaffaCakes118.exe 84 PID 4416 wrote to memory of 1552 4416 b9fb950578a5b3c4744528ca19853523_JaffaCakes118.exe 84 PID 4416 wrote to memory of 1552 4416 b9fb950578a5b3c4744528ca19853523_JaffaCakes118.exe 84 PID 4416 wrote to memory of 1552 4416 b9fb950578a5b3c4744528ca19853523_JaffaCakes118.exe 84 PID 4416 wrote to memory of 1552 4416 b9fb950578a5b3c4744528ca19853523_JaffaCakes118.exe 84 PID 4416 wrote to memory of 1552 4416 b9fb950578a5b3c4744528ca19853523_JaffaCakes118.exe 84 PID 4416 wrote to memory of 1552 4416 b9fb950578a5b3c4744528ca19853523_JaffaCakes118.exe 84
Processes
-
C:\Users\Admin\AppData\Local\Temp\b9fb950578a5b3c4744528ca19853523_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\b9fb950578a5b3c4744528ca19853523_JaffaCakes118.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4416 -
C:\Windows\SysWOW64\notepad.exe"C:\Windows\system32\notepad.exe"2⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
PID:1552 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe"3⤵
- Blocklisted process makes network request
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2728
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
74B
MD56b88a254d5a7f7bb31ea66b3b98dcaed
SHA112f4374785c728db449c2ba11862af8fc5502d77
SHA256b82616e7d961344db24ad35d641b4413fc9c7b5e33a124d713f724a1da1c429d
SHA5120d3fc8d06137354dc2ae364ddd858c944a2035432f114c1584d66f7edf2e421133c75f9e179a6e79e8ae6c8655f5db1ab7ab43883a2b195eb340dff80a0919af