Analysis
-
max time kernel
149s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
06-09-2024 16:58
Static task
static1
Behavioral task
behavioral1
Sample
d00447a4ef5a375f9b98fb966025b3f2_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
d00447a4ef5a375f9b98fb966025b3f2_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
d00447a4ef5a375f9b98fb966025b3f2_JaffaCakes118.exe
-
Size
236KB
-
MD5
d00447a4ef5a375f9b98fb966025b3f2
-
SHA1
4255d9b7a135c14362eb7a52b40abf02a2f1997b
-
SHA256
5cac3d994fcc5eefdaef9ffd6b9fae41dd49f1a699e88746e17fb51a49f73bd2
-
SHA512
9044f4d2474df628472d09d856bed76cc3b53807a623242f6878e287bb048f4402979aa71ddbbdb46ee204969de9e97587adb761d72726babe8cbafd69e65e10
-
SSDEEP
3072:6ge632NoBADcJqNQJebIV7OWGbBp8rF6201M/nd8aM:6i32PDcAm7V7OWGIZ6Snd8p
Malware Config
Extracted
remcos
2.5.0 Pro
WindowsDefender
top.fishingjoco.waw.pl:9334
top.fishingjoco.waw.pl:8152
top.fishingjoco.waw.pl:8153
sub.jofishingco.waw.pl:8153
sub.jofishingco.waw.pl:9334
-
audio_folder
MicRecords
-
audio_path
%AppData%
-
audio_record_time
5
-
connect_delay
0
-
connect_interval
1
-
copy_file
defender.exe
-
copy_folder
Windows Defender
-
delete_file
true
-
hide_file
true
-
hide_keylog_file
false
-
install_flag
true
-
install_path
%AppData%
-
keylog_crypt
false
-
keylog_file
logs.dat
-
keylog_flag
false
-
keylog_folder
defender
-
keylog_path
%AppData%
-
mouse_option
false
-
mutex
WindowsDefender-OFO9TZ
-
screenshot_crypt
false
-
screenshot_flag
false
-
screenshot_folder
Screenshots
-
screenshot_path
%AppData%
-
screenshot_time
10
-
startup_value
Windows Defender
-
take_screenshot_option
false
-
take_screenshot_time
5
-
take_screenshot_title
wikipedia;solitaire;
Signatures
-
Deletes itself 1 IoCs
pid Process 2516 WScript.exe -
Executes dropped EXE 1 IoCs
pid Process 2268 defender.exe -
Loads dropped DLL 2 IoCs
pid Process 2840 cmd.exe 2840 cmd.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Windows\CurrentVersion\Run\Windows Defender = "\"C:\\Users\\Admin\\AppData\\Roaming\\Windows Defender\\defender.exe\"" d00447a4ef5a375f9b98fb966025b3f2_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Windows Defender = "\"C:\\Users\\Admin\\AppData\\Roaming\\Windows Defender\\defender.exe\"" d00447a4ef5a375f9b98fb966025b3f2_JaffaCakes118.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Windows\CurrentVersion\Run\Windows Defender = "\"C:\\Users\\Admin\\AppData\\Roaming\\Windows Defender\\defender.exe\"" defender.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Windows Defender = "\"C:\\Users\\Admin\\AppData\\Roaming\\Windows Defender\\defender.exe\"" defender.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language d00447a4ef5a375f9b98fb966025b3f2_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WScript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language defender.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2268 defender.exe -
Suspicious use of WriteProcessMemory 16 IoCs
description pid Process procid_target PID 1732 wrote to memory of 2516 1732 d00447a4ef5a375f9b98fb966025b3f2_JaffaCakes118.exe 30 PID 1732 wrote to memory of 2516 1732 d00447a4ef5a375f9b98fb966025b3f2_JaffaCakes118.exe 30 PID 1732 wrote to memory of 2516 1732 d00447a4ef5a375f9b98fb966025b3f2_JaffaCakes118.exe 30 PID 1732 wrote to memory of 2516 1732 d00447a4ef5a375f9b98fb966025b3f2_JaffaCakes118.exe 30 PID 2516 wrote to memory of 2840 2516 WScript.exe 31 PID 2516 wrote to memory of 2840 2516 WScript.exe 31 PID 2516 wrote to memory of 2840 2516 WScript.exe 31 PID 2516 wrote to memory of 2840 2516 WScript.exe 31 PID 2840 wrote to memory of 2268 2840 cmd.exe 33 PID 2840 wrote to memory of 2268 2840 cmd.exe 33 PID 2840 wrote to memory of 2268 2840 cmd.exe 33 PID 2840 wrote to memory of 2268 2840 cmd.exe 33 PID 2268 wrote to memory of 2744 2268 defender.exe 34 PID 2268 wrote to memory of 2744 2268 defender.exe 34 PID 2268 wrote to memory of 2744 2268 defender.exe 34 PID 2268 wrote to memory of 2744 2268 defender.exe 34
Processes
-
C:\Users\Admin\AppData\Local\Temp\d00447a4ef5a375f9b98fb966025b3f2_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\d00447a4ef5a375f9b98fb966025b3f2_JaffaCakes118.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1732 -
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\install.vbs"2⤵
- Deletes itself
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2516 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c "C:\Users\Admin\AppData\Roaming\Windows Defender\defender.exe"3⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2840 -
C:\Users\Admin\AppData\Roaming\Windows Defender\defender.exe"C:\Users\Admin\AppData\Roaming\Windows Defender\defender.exe"4⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2268 -
C:\Program Files (x86)\Internet Explorer\iexplore.exe"C:\Program Files (x86)\Internet Explorer\iexplore.exe"5⤵PID:2744
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
646B
MD5cc8d542019f2f70319bee3d9bee22d94
SHA19ed41c0f8d043befcb4e2e485da111c28128d2d1
SHA2569a978b6fb173202d3da30a402de0f3e982029540a49b7d140ee104e64c965f7d
SHA5127564d7c65ea9adc0fbbc81bac766242c2d1a13195c7c2af65caaa141721c994ebf39e20400ef0ae03bb52402c34f80de58130cf8607fa1bf83996587b7e303cd
-
Filesize
236KB
MD5d00447a4ef5a375f9b98fb966025b3f2
SHA14255d9b7a135c14362eb7a52b40abf02a2f1997b
SHA2565cac3d994fcc5eefdaef9ffd6b9fae41dd49f1a699e88746e17fb51a49f73bd2
SHA5129044f4d2474df628472d09d856bed76cc3b53807a623242f6878e287bb048f4402979aa71ddbbdb46ee204969de9e97587adb761d72726babe8cbafd69e65e10