Analysis
-
max time kernel
149s -
max time network
126s -
platform
windows7_x64 -
resource
win7-20240729-en -
resource tags
arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system -
submitted
24-08-2024 21:03
Static task
static1
Behavioral task
behavioral1
Sample
bf67ca4c80bee07b239b2d1feb0f65be_JaffaCakes118.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
bf67ca4c80bee07b239b2d1feb0f65be_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
bf67ca4c80bee07b239b2d1feb0f65be_JaffaCakes118.exe
-
Size
3.6MB
-
MD5
bf67ca4c80bee07b239b2d1feb0f65be
-
SHA1
93257710d02088ac34d0adaf8f8af389dc20e933
-
SHA256
4ed08a45b8b00ee8d79fcdbfb68468a826fec1022473f440415197aecc1a187b
-
SHA512
569fc239b69eeb3b7bb7050b525f585e66f3bc87482f521246656f7fd4c3757992d806a8eb108f477cce47676246ae71ba42d91bc57f92586946ab1e36efca42
-
SSDEEP
49152:wHBaxpAS/DARf7gJ5O9GyyPwhI3T8t3EV:KdW5O0yyqIc
Malware Config
Extracted
remcos
2.7.0 Pro
FEBRERO 15
serviciospun.puntofr.cc:6696
-
audio_folder
audio
-
audio_path
%AppData%
-
audio_record_time
5
-
connect_delay
0
-
connect_interval
3
-
copy_file
remcos.exe
-
copy_folder
remcos
-
delete_file
false
-
hide_file
false
-
hide_keylog_file
false
-
install_flag
false
-
install_path
%AppData%
-
keylog_crypt
true
-
keylog_file
logs.dat
-
keylog_flag
false
-
keylog_folder
FREXCAZ
-
keylog_path
%AppData%
-
mouse_option
false
-
mutex
FORTILEX-FFBWFZ
-
screenshot_crypt
false
-
screenshot_flag
false
-
screenshot_folder
Screenshots
-
screenshot_path
%AppData%
-
screenshot_time
10
-
startup_value
remcos
-
take_screenshot_option
false
-
take_screenshot_time
5
Signatures
-
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\Windows\Tasks\sys.job cmd.exe -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language bf67ca4c80bee07b239b2d1feb0f65be_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language notepad.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2488 bf67ca4c80bee07b239b2d1feb0f65be_JaffaCakes118.exe 2644 notepad.exe -
Suspicious behavior: MapViewOfSection 1 IoCs
pid Process 2644 notepad.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2488 bf67ca4c80bee07b239b2d1feb0f65be_JaffaCakes118.exe 2552 cmd.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2488 wrote to memory of 2644 2488 bf67ca4c80bee07b239b2d1feb0f65be_JaffaCakes118.exe 30 PID 2488 wrote to memory of 2644 2488 bf67ca4c80bee07b239b2d1feb0f65be_JaffaCakes118.exe 30 PID 2488 wrote to memory of 2644 2488 bf67ca4c80bee07b239b2d1feb0f65be_JaffaCakes118.exe 30 PID 2488 wrote to memory of 2644 2488 bf67ca4c80bee07b239b2d1feb0f65be_JaffaCakes118.exe 30 PID 2488 wrote to memory of 2644 2488 bf67ca4c80bee07b239b2d1feb0f65be_JaffaCakes118.exe 30 PID 2488 wrote to memory of 2644 2488 bf67ca4c80bee07b239b2d1feb0f65be_JaffaCakes118.exe 30 PID 2488 wrote to memory of 2644 2488 bf67ca4c80bee07b239b2d1feb0f65be_JaffaCakes118.exe 30 PID 2488 wrote to memory of 2644 2488 bf67ca4c80bee07b239b2d1feb0f65be_JaffaCakes118.exe 30 PID 2488 wrote to memory of 2644 2488 bf67ca4c80bee07b239b2d1feb0f65be_JaffaCakes118.exe 30 PID 2488 wrote to memory of 2644 2488 bf67ca4c80bee07b239b2d1feb0f65be_JaffaCakes118.exe 30 PID 2488 wrote to memory of 2644 2488 bf67ca4c80bee07b239b2d1feb0f65be_JaffaCakes118.exe 30 PID 2488 wrote to memory of 2644 2488 bf67ca4c80bee07b239b2d1feb0f65be_JaffaCakes118.exe 30 PID 2488 wrote to memory of 2644 2488 bf67ca4c80bee07b239b2d1feb0f65be_JaffaCakes118.exe 30 PID 2488 wrote to memory of 2644 2488 bf67ca4c80bee07b239b2d1feb0f65be_JaffaCakes118.exe 30 PID 2488 wrote to memory of 2644 2488 bf67ca4c80bee07b239b2d1feb0f65be_JaffaCakes118.exe 30 PID 2488 wrote to memory of 2644 2488 bf67ca4c80bee07b239b2d1feb0f65be_JaffaCakes118.exe 30 PID 2488 wrote to memory of 2644 2488 bf67ca4c80bee07b239b2d1feb0f65be_JaffaCakes118.exe 30 PID 2488 wrote to memory of 2644 2488 bf67ca4c80bee07b239b2d1feb0f65be_JaffaCakes118.exe 30 PID 2488 wrote to memory of 2644 2488 bf67ca4c80bee07b239b2d1feb0f65be_JaffaCakes118.exe 30 PID 2488 wrote to memory of 2644 2488 bf67ca4c80bee07b239b2d1feb0f65be_JaffaCakes118.exe 30 PID 2488 wrote to memory of 2644 2488 bf67ca4c80bee07b239b2d1feb0f65be_JaffaCakes118.exe 30 PID 2488 wrote to memory of 2644 2488 bf67ca4c80bee07b239b2d1feb0f65be_JaffaCakes118.exe 30 PID 2488 wrote to memory of 2644 2488 bf67ca4c80bee07b239b2d1feb0f65be_JaffaCakes118.exe 30 PID 2488 wrote to memory of 2644 2488 bf67ca4c80bee07b239b2d1feb0f65be_JaffaCakes118.exe 30 PID 2488 wrote to memory of 2644 2488 bf67ca4c80bee07b239b2d1feb0f65be_JaffaCakes118.exe 30 PID 2488 wrote to memory of 2644 2488 bf67ca4c80bee07b239b2d1feb0f65be_JaffaCakes118.exe 30 PID 2488 wrote to memory of 2644 2488 bf67ca4c80bee07b239b2d1feb0f65be_JaffaCakes118.exe 30 PID 2488 wrote to memory of 2644 2488 bf67ca4c80bee07b239b2d1feb0f65be_JaffaCakes118.exe 30 PID 2488 wrote to memory of 2644 2488 bf67ca4c80bee07b239b2d1feb0f65be_JaffaCakes118.exe 30 PID 2488 wrote to memory of 2644 2488 bf67ca4c80bee07b239b2d1feb0f65be_JaffaCakes118.exe 30 PID 2488 wrote to memory of 2644 2488 bf67ca4c80bee07b239b2d1feb0f65be_JaffaCakes118.exe 30 PID 2488 wrote to memory of 2644 2488 bf67ca4c80bee07b239b2d1feb0f65be_JaffaCakes118.exe 30 PID 2488 wrote to memory of 2644 2488 bf67ca4c80bee07b239b2d1feb0f65be_JaffaCakes118.exe 30 PID 2488 wrote to memory of 2644 2488 bf67ca4c80bee07b239b2d1feb0f65be_JaffaCakes118.exe 30 PID 2644 wrote to memory of 2552 2644 notepad.exe 31 PID 2644 wrote to memory of 2552 2644 notepad.exe 31 PID 2644 wrote to memory of 2552 2644 notepad.exe 31 PID 2644 wrote to memory of 2552 2644 notepad.exe 31 PID 2644 wrote to memory of 2552 2644 notepad.exe 31 PID 2644 wrote to memory of 2552 2644 notepad.exe 31 PID 2644 wrote to memory of 2552 2644 notepad.exe 31 PID 2644 wrote to memory of 2552 2644 notepad.exe 31 PID 2644 wrote to memory of 2552 2644 notepad.exe 31 PID 2644 wrote to memory of 2552 2644 notepad.exe 31 PID 2644 wrote to memory of 2552 2644 notepad.exe 31 PID 2644 wrote to memory of 2552 2644 notepad.exe 31 PID 2644 wrote to memory of 2552 2644 notepad.exe 31 PID 2644 wrote to memory of 2552 2644 notepad.exe 31 PID 2644 wrote to memory of 2552 2644 notepad.exe 31 PID 2644 wrote to memory of 2552 2644 notepad.exe 31 PID 2644 wrote to memory of 2552 2644 notepad.exe 31 PID 2644 wrote to memory of 2552 2644 notepad.exe 31 PID 2644 wrote to memory of 2552 2644 notepad.exe 31 PID 2644 wrote to memory of 2552 2644 notepad.exe 31 PID 2644 wrote to memory of 2552 2644 notepad.exe 31 PID 2644 wrote to memory of 2552 2644 notepad.exe 31 PID 2644 wrote to memory of 2552 2644 notepad.exe 31 PID 2644 wrote to memory of 2552 2644 notepad.exe 31 PID 2644 wrote to memory of 2552 2644 notepad.exe 31 PID 2644 wrote to memory of 2552 2644 notepad.exe 31 PID 2644 wrote to memory of 2552 2644 notepad.exe 31 PID 2644 wrote to memory of 2552 2644 notepad.exe 31 PID 2644 wrote to memory of 2552 2644 notepad.exe 31 PID 2644 wrote to memory of 2552 2644 notepad.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\bf67ca4c80bee07b239b2d1feb0f65be_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\bf67ca4c80bee07b239b2d1feb0f65be_JaffaCakes118.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2488 -
C:\Windows\SysWOW64\notepad.exe"C:\Windows\system32\notepad.exe"2⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:2644 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe"3⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2552
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
74B
MD519fddb2660da3759da0dd2fd04332777
SHA1079ac8c95bc8d81fb084aceab91172e26279690c
SHA25662fce9d16073c51c0f61ff01ffa441b64428d0605bef24ec2f233c634d814df3
SHA512e08c2604046b5f3fede4fb3c2bb6aac913ae9d22cf2fcd7f4b8676afe2b0a20958fa076056be9365461de651b1a1cc06088558ea44a69ac0517f2acbde9517a2