Analysis

  • max time kernel
    148s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    23/08/2024, 11:59

General

  • Target

    bba3903c87f39e9e679653e2fbaa0999_JaffaCakes118.exe

  • Size

    1023KB

  • MD5

    bba3903c87f39e9e679653e2fbaa0999

  • SHA1

    2f4e86f8d917df2d2c702bbea0e5657cb4621b00

  • SHA256

    68c7c81b15818419222a9c58550c72c78d30856ccde7a6fe4fc1a096fcd6f064

  • SHA512

    2123a653e9b57e87c5423f60456090e9373c339d01a15f27b9aca76a2ac163a9b84bf5066f74769d77a31fc40e4e7b4c2e0cd92345ba73b875a9483e8dd1d6e5

  • SSDEEP

    24576:ZcDd3aWy0W9ZfbntVcOAlXTl+DELC1+ohQK3y2WI1T1:k5afbnHcOABADF7hL379

Malware Config

Extracted

Family

remcos

Version

3.0.2 Pro

Botnet

RemoteHost

C2

berryttttiere.duckdns.org:6553

asddskfjjer.duckdns.org:6553

fjgjkhltyjj.duckdns.org:6553

Attributes
  • audio_folder

    MicRecords

  • audio_path

    %AppData%

  • audio_record_time

    5

  • connect_delay

    0

  • connect_interval

    1

  • copy_file

    remcos.exe

  • copy_folder

    Remcos

  • delete_file

    false

  • hide_file

    false

  • hide_keylog_file

    false

  • install_flag

    true

  • install_path

    %AppData%

  • keylog_crypt

    false

  • keylog_file

    logs.dat

  • keylog_flag

    false

  • keylog_folder

    remcos

  • keylog_path

    %AppData%

  • mouse_option

    false

  • mutex

    Remcos-0DI0HG

  • screenshot_crypt

    false

  • screenshot_flag

    false

  • screenshot_folder

    Screenshots

  • screenshot_path

    %AppData%

  • screenshot_time

    10

  • startup_value

    Remcos

  • take_screenshot_option

    false

  • take_screenshot_time

    5

  • take_screenshot_title

    wikipedia;solitaire;

Signatures

  • Remcos

    Remcos is a closed-source remote control and surveillance software.

  • Checks computer location settings 2 TTPs 2 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 4 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Suspicious use of SetThreadContext 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 6 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies registry class 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 42 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\bba3903c87f39e9e679653e2fbaa0999_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\bba3903c87f39e9e679653e2fbaa0999_JaffaCakes118.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:1508
    • C:\Users\Admin\AppData\Local\Temp\bba3903c87f39e9e679653e2fbaa0999_JaffaCakes118.exe
      "{path}"
      2⤵
      • Checks computer location settings
      • Adds Run key to start application
      • System Location Discovery: System Language Discovery
      • Modifies registry class
      • Suspicious use of WriteProcessMemory
      PID:1860
      • C:\Windows\SysWOW64\WScript.exe
        "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\install.vbs"
        3⤵
        • Checks computer location settings
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:3960
        • C:\Windows\SysWOW64\cmd.exe
          "C:\Windows\System32\cmd.exe" /c "C:\Users\Admin\AppData\Roaming\Remcos\remcos.exe"
          4⤵
          • System Location Discovery: System Language Discovery
          • Suspicious use of WriteProcessMemory
          PID:3940
          • C:\Users\Admin\AppData\Roaming\Remcos\remcos.exe
            C:\Users\Admin\AppData\Roaming\Remcos\remcos.exe
            5⤵
            • Executes dropped EXE
            • Suspicious use of SetThreadContext
            • System Location Discovery: System Language Discovery
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            • Suspicious use of WriteProcessMemory
            PID:844
            • C:\Users\Admin\AppData\Roaming\Remcos\remcos.exe
              "{path}"
              6⤵
              • Executes dropped EXE
              PID:892
            • C:\Users\Admin\AppData\Roaming\Remcos\remcos.exe
              "{path}"
              6⤵
              • Executes dropped EXE
              PID:3428
            • C:\Users\Admin\AppData\Roaming\Remcos\remcos.exe
              "{path}"
              6⤵
              • Executes dropped EXE
              • Adds Run key to start application
              • System Location Discovery: System Language Discovery
              • Suspicious use of SetWindowsHookEx
              • Suspicious use of WriteProcessMemory
              PID:3012
              • C:\Windows\SysWOW64\svchost.exe
                C:\Windows\SysWOW64\svchost.exe
                7⤵
                  PID:4696

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\install.vbs

      Filesize

      418B

      MD5

      b92d64fe5b1d1f59df4b738262aea8df

      SHA1

      c8fb1981759c2d9bb2ec91b705985fba5fc7af63

      SHA256

      fa20e9aab03dc8e9f1910aaf0cf42662379fa16ae3a22642084fb97fa3d4f83a

      SHA512

      2566248b93c0cfb0414f033b8dd18bbd4f88180093eac2861107289bcb4ee160f9593706ff1f7d1f2e4ecea430d67a5a2897551a4f9ebd82b707243e300520e2

    • C:\Users\Admin\AppData\Roaming\Remcos\logs.dat

      Filesize

      74B

      MD5

      bb2c3c60130278818fc8ea6f8cdc7efa

      SHA1

      406fea97654e54194d8184d3cb754cb72634665b

      SHA256

      ad7e2c465bc1c527ec7a4c6b5feeaebc3a9cf6b6cd66cd267360ee86cce584ac

      SHA512

      7f8b187619d5026044de97d342da8c6f9781663d8b6233f079e1aec87fd3246a4d6af74a2a73f22964c008e4d91c8cecd594b50c2c9c64d2c6bb5f29182577de

    • C:\Users\Admin\AppData\Roaming\Remcos\remcos.exe

      Filesize

      1023KB

      MD5

      bba3903c87f39e9e679653e2fbaa0999

      SHA1

      2f4e86f8d917df2d2c702bbea0e5657cb4621b00

      SHA256

      68c7c81b15818419222a9c58550c72c78d30856ccde7a6fe4fc1a096fcd6f064

      SHA512

      2123a653e9b57e87c5423f60456090e9373c339d01a15f27b9aca76a2ac163a9b84bf5066f74769d77a31fc40e4e7b4c2e0cd92345ba73b875a9483e8dd1d6e5

    • memory/1508-6-0x0000000007F80000-0x000000000801C000-memory.dmp

      Filesize

      624KB

    • memory/1508-18-0x0000000074BC0000-0x0000000075370000-memory.dmp

      Filesize

      7.7MB

    • memory/1508-5-0x0000000005220000-0x000000000522A000-memory.dmp

      Filesize

      40KB

    • memory/1508-0-0x0000000074BCE000-0x0000000074BCF000-memory.dmp

      Filesize

      4KB

    • memory/1508-7-0x00000000068F0000-0x00000000068F8000-memory.dmp

      Filesize

      32KB

    • memory/1508-8-0x0000000074BCE000-0x0000000074BCF000-memory.dmp

      Filesize

      4KB

    • memory/1508-9-0x0000000074BC0000-0x0000000075370000-memory.dmp

      Filesize

      7.7MB

    • memory/1508-10-0x0000000008120000-0x00000000081F2000-memory.dmp

      Filesize

      840KB

    • memory/1508-1-0x0000000000750000-0x0000000000856000-memory.dmp

      Filesize

      1.0MB

    • memory/1508-2-0x0000000005760000-0x0000000005D04000-memory.dmp

      Filesize

      5.6MB

    • memory/1508-3-0x0000000005250000-0x00000000052E2000-memory.dmp

      Filesize

      584KB

    • memory/1508-4-0x0000000074BC0000-0x0000000075370000-memory.dmp

      Filesize

      7.7MB

    • memory/1860-17-0x0000000000400000-0x0000000000478000-memory.dmp

      Filesize

      480KB

    • memory/1860-21-0x0000000000400000-0x0000000000478000-memory.dmp

      Filesize

      480KB

    • memory/1860-14-0x0000000000400000-0x0000000000478000-memory.dmp

      Filesize

      480KB

    • memory/1860-12-0x0000000000400000-0x0000000000478000-memory.dmp

      Filesize

      480KB

    • memory/1860-11-0x0000000000400000-0x0000000000478000-memory.dmp

      Filesize

      480KB

    • memory/3012-32-0x0000000000400000-0x0000000000478000-memory.dmp

      Filesize

      480KB

    • memory/3012-36-0x0000000000400000-0x0000000000478000-memory.dmp

      Filesize

      480KB

    • memory/3012-31-0x0000000000400000-0x0000000000478000-memory.dmp

      Filesize

      480KB

    • memory/3012-38-0x0000000000400000-0x0000000000478000-memory.dmp

      Filesize

      480KB