Analysis
-
max time kernel
149s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
09-09-2024 08:13
Static task
static1
Behavioral task
behavioral1
Sample
d5ee80ad1cc23eeb1b25cde2af60c9c1_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
d5ee80ad1cc23eeb1b25cde2af60c9c1_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
d5ee80ad1cc23eeb1b25cde2af60c9c1_JaffaCakes118.exe
-
Size
1.3MB
-
MD5
d5ee80ad1cc23eeb1b25cde2af60c9c1
-
SHA1
476d6a75a019ed3b2bb866c6f89e2c0970dccf22
-
SHA256
2a51ff41bcd2af80bf83a79b591a3da996bcc33043cb7f0b7b4493bff7a8a688
-
SHA512
8dc1e1fe6e06049357fee74820ad0922524a0755867e51a511bd4c948ea2cd9cabc2d5b65bf4e279c2dd55a759aee7d35d683385ae4a08e0c0b40c5c8a4d93eb
-
SSDEEP
6144:M/1vlzqKOMCfCO0iniUIO++3DwXZvqiQUF5l2Pra:S
Malware Config
Extracted
remcos
2.7.2 Pro
Ose_2021 NOIP
gdyhjjdhbvxgsfe.gotdns.ch:2177
-
audio_folder
MicRecords
-
audio_path
%AppData%
-
audio_record_time
5
-
connect_delay
0
-
connect_interval
1
-
copy_file
win.exe
-
delete_file
false
-
hide_file
true
-
hide_keylog_file
true
-
install_flag
true
-
install_path
%AppData%
-
keylog_crypt
false
-
keylog_file
logs.dat
-
keylog_flag
false
-
keylog_path
%AppData%
-
mouse_option
false
-
mutex
Remcos-PCZ95N
-
screenshot_crypt
false
-
screenshot_flag
false
-
screenshot_folder
Screenshots
-
screenshot_path
%AppData%
-
screenshot_time
10
-
startup_value
win
-
take_screenshot_option
false
-
take_screenshot_time
5
-
take_screenshot_title
wikipedia;solitaire;
Signatures
-
Executes dropped EXE 3 IoCs
pid Process 2676 win.exe 1936 win.exe 3044 win.exe -
Loads dropped DLL 5 IoCs
pid Process 2700 cmd.exe 2700 cmd.exe 716 WerFault.exe 716 WerFault.exe 716 WerFault.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Windows\CurrentVersion\Run\win = "\"C:\\Users\\Admin\\AppData\\Roaming\\win.exe\"" d5ee80ad1cc23eeb1b25cde2af60c9c1_JaffaCakes118.exe Set value (str) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Windows\CurrentVersion\Run\win = "\"C:\\Users\\Admin\\AppData\\Roaming\\win.exe\"" win.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 18 IoCs
pid Process 276 d5ee80ad1cc23eeb1b25cde2af60c9c1_JaffaCakes118.exe 276 d5ee80ad1cc23eeb1b25cde2af60c9c1_JaffaCakes118.exe 276 d5ee80ad1cc23eeb1b25cde2af60c9c1_JaffaCakes118.exe 276 d5ee80ad1cc23eeb1b25cde2af60c9c1_JaffaCakes118.exe 276 d5ee80ad1cc23eeb1b25cde2af60c9c1_JaffaCakes118.exe 276 d5ee80ad1cc23eeb1b25cde2af60c9c1_JaffaCakes118.exe 276 d5ee80ad1cc23eeb1b25cde2af60c9c1_JaffaCakes118.exe 276 d5ee80ad1cc23eeb1b25cde2af60c9c1_JaffaCakes118.exe 2676 win.exe 2676 win.exe 2676 win.exe 2676 win.exe 2676 win.exe 2676 win.exe 2676 win.exe 2676 win.exe 2676 win.exe 2676 win.exe -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 276 set thread context of 2752 276 d5ee80ad1cc23eeb1b25cde2af60c9c1_JaffaCakes118.exe 37 PID 2676 set thread context of 3044 2676 win.exe 47 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 2 IoCs
pid pid_target Process procid_target 2796 276 WerFault.exe 30 716 2676 WerFault.exe 42 -
System Location Discovery: System Language Discovery 1 TTPs 10 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language win.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language d5ee80ad1cc23eeb1b25cde2af60c9c1_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language timeout.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WScript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language win.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language d5ee80ad1cc23eeb1b25cde2af60c9c1_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language timeout.exe -
Delays execution with timeout.exe 2 IoCs
pid Process 2492 timeout.exe 2604 timeout.exe -
Suspicious behavior: EnumeratesProcesses 14 IoCs
pid Process 276 d5ee80ad1cc23eeb1b25cde2af60c9c1_JaffaCakes118.exe 276 d5ee80ad1cc23eeb1b25cde2af60c9c1_JaffaCakes118.exe 276 d5ee80ad1cc23eeb1b25cde2af60c9c1_JaffaCakes118.exe 276 d5ee80ad1cc23eeb1b25cde2af60c9c1_JaffaCakes118.exe 276 d5ee80ad1cc23eeb1b25cde2af60c9c1_JaffaCakes118.exe 276 d5ee80ad1cc23eeb1b25cde2af60c9c1_JaffaCakes118.exe 276 d5ee80ad1cc23eeb1b25cde2af60c9c1_JaffaCakes118.exe 276 d5ee80ad1cc23eeb1b25cde2af60c9c1_JaffaCakes118.exe 276 d5ee80ad1cc23eeb1b25cde2af60c9c1_JaffaCakes118.exe 2676 win.exe 2676 win.exe 2676 win.exe 2676 win.exe 2676 win.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 276 d5ee80ad1cc23eeb1b25cde2af60c9c1_JaffaCakes118.exe Token: SeDebugPrivilege 2676 win.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 3044 win.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 276 wrote to memory of 1668 276 d5ee80ad1cc23eeb1b25cde2af60c9c1_JaffaCakes118.exe 31 PID 276 wrote to memory of 1668 276 d5ee80ad1cc23eeb1b25cde2af60c9c1_JaffaCakes118.exe 31 PID 276 wrote to memory of 1668 276 d5ee80ad1cc23eeb1b25cde2af60c9c1_JaffaCakes118.exe 31 PID 276 wrote to memory of 1668 276 d5ee80ad1cc23eeb1b25cde2af60c9c1_JaffaCakes118.exe 31 PID 1668 wrote to memory of 2492 1668 cmd.exe 33 PID 1668 wrote to memory of 2492 1668 cmd.exe 33 PID 1668 wrote to memory of 2492 1668 cmd.exe 33 PID 1668 wrote to memory of 2492 1668 cmd.exe 33 PID 276 wrote to memory of 2340 276 d5ee80ad1cc23eeb1b25cde2af60c9c1_JaffaCakes118.exe 34 PID 276 wrote to memory of 2340 276 d5ee80ad1cc23eeb1b25cde2af60c9c1_JaffaCakes118.exe 34 PID 276 wrote to memory of 2340 276 d5ee80ad1cc23eeb1b25cde2af60c9c1_JaffaCakes118.exe 34 PID 276 wrote to memory of 2340 276 d5ee80ad1cc23eeb1b25cde2af60c9c1_JaffaCakes118.exe 34 PID 276 wrote to memory of 2292 276 d5ee80ad1cc23eeb1b25cde2af60c9c1_JaffaCakes118.exe 35 PID 276 wrote to memory of 2292 276 d5ee80ad1cc23eeb1b25cde2af60c9c1_JaffaCakes118.exe 35 PID 276 wrote to memory of 2292 276 d5ee80ad1cc23eeb1b25cde2af60c9c1_JaffaCakes118.exe 35 PID 276 wrote to memory of 2292 276 d5ee80ad1cc23eeb1b25cde2af60c9c1_JaffaCakes118.exe 35 PID 276 wrote to memory of 972 276 d5ee80ad1cc23eeb1b25cde2af60c9c1_JaffaCakes118.exe 36 PID 276 wrote to memory of 972 276 d5ee80ad1cc23eeb1b25cde2af60c9c1_JaffaCakes118.exe 36 PID 276 wrote to memory of 972 276 d5ee80ad1cc23eeb1b25cde2af60c9c1_JaffaCakes118.exe 36 PID 276 wrote to memory of 972 276 d5ee80ad1cc23eeb1b25cde2af60c9c1_JaffaCakes118.exe 36 PID 276 wrote to memory of 2752 276 d5ee80ad1cc23eeb1b25cde2af60c9c1_JaffaCakes118.exe 37 PID 276 wrote to memory of 2752 276 d5ee80ad1cc23eeb1b25cde2af60c9c1_JaffaCakes118.exe 37 PID 276 wrote to memory of 2752 276 d5ee80ad1cc23eeb1b25cde2af60c9c1_JaffaCakes118.exe 37 PID 276 wrote to memory of 2752 276 d5ee80ad1cc23eeb1b25cde2af60c9c1_JaffaCakes118.exe 37 PID 276 wrote to memory of 2752 276 d5ee80ad1cc23eeb1b25cde2af60c9c1_JaffaCakes118.exe 37 PID 276 wrote to memory of 2752 276 d5ee80ad1cc23eeb1b25cde2af60c9c1_JaffaCakes118.exe 37 PID 276 wrote to memory of 2752 276 d5ee80ad1cc23eeb1b25cde2af60c9c1_JaffaCakes118.exe 37 PID 276 wrote to memory of 2752 276 d5ee80ad1cc23eeb1b25cde2af60c9c1_JaffaCakes118.exe 37 PID 276 wrote to memory of 2752 276 d5ee80ad1cc23eeb1b25cde2af60c9c1_JaffaCakes118.exe 37 PID 276 wrote to memory of 2752 276 d5ee80ad1cc23eeb1b25cde2af60c9c1_JaffaCakes118.exe 37 PID 276 wrote to memory of 2752 276 d5ee80ad1cc23eeb1b25cde2af60c9c1_JaffaCakes118.exe 37 PID 276 wrote to memory of 2796 276 d5ee80ad1cc23eeb1b25cde2af60c9c1_JaffaCakes118.exe 38 PID 276 wrote to memory of 2796 276 d5ee80ad1cc23eeb1b25cde2af60c9c1_JaffaCakes118.exe 38 PID 276 wrote to memory of 2796 276 d5ee80ad1cc23eeb1b25cde2af60c9c1_JaffaCakes118.exe 38 PID 276 wrote to memory of 2796 276 d5ee80ad1cc23eeb1b25cde2af60c9c1_JaffaCakes118.exe 38 PID 2752 wrote to memory of 1800 2752 d5ee80ad1cc23eeb1b25cde2af60c9c1_JaffaCakes118.exe 39 PID 2752 wrote to memory of 1800 2752 d5ee80ad1cc23eeb1b25cde2af60c9c1_JaffaCakes118.exe 39 PID 2752 wrote to memory of 1800 2752 d5ee80ad1cc23eeb1b25cde2af60c9c1_JaffaCakes118.exe 39 PID 2752 wrote to memory of 1800 2752 d5ee80ad1cc23eeb1b25cde2af60c9c1_JaffaCakes118.exe 39 PID 1800 wrote to memory of 2700 1800 WScript.exe 40 PID 1800 wrote to memory of 2700 1800 WScript.exe 40 PID 1800 wrote to memory of 2700 1800 WScript.exe 40 PID 1800 wrote to memory of 2700 1800 WScript.exe 40 PID 2700 wrote to memory of 2676 2700 cmd.exe 42 PID 2700 wrote to memory of 2676 2700 cmd.exe 42 PID 2700 wrote to memory of 2676 2700 cmd.exe 42 PID 2700 wrote to memory of 2676 2700 cmd.exe 42 PID 2676 wrote to memory of 592 2676 win.exe 43 PID 2676 wrote to memory of 592 2676 win.exe 43 PID 2676 wrote to memory of 592 2676 win.exe 43 PID 2676 wrote to memory of 592 2676 win.exe 43 PID 592 wrote to memory of 2604 592 cmd.exe 45 PID 592 wrote to memory of 2604 592 cmd.exe 45 PID 592 wrote to memory of 2604 592 cmd.exe 45 PID 592 wrote to memory of 2604 592 cmd.exe 45 PID 2676 wrote to memory of 1936 2676 win.exe 46 PID 2676 wrote to memory of 1936 2676 win.exe 46 PID 2676 wrote to memory of 1936 2676 win.exe 46 PID 2676 wrote to memory of 1936 2676 win.exe 46 PID 2676 wrote to memory of 3044 2676 win.exe 47 PID 2676 wrote to memory of 3044 2676 win.exe 47 PID 2676 wrote to memory of 3044 2676 win.exe 47 PID 2676 wrote to memory of 3044 2676 win.exe 47 PID 2676 wrote to memory of 3044 2676 win.exe 47
Processes
-
C:\Users\Admin\AppData\Local\Temp\d5ee80ad1cc23eeb1b25cde2af60c9c1_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\d5ee80ad1cc23eeb1b25cde2af60c9c1_JaffaCakes118.exe"1⤵
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:276 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c timeout 12⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1668 -
C:\Windows\SysWOW64\timeout.exetimeout 13⤵
- System Location Discovery: System Language Discovery
- Delays execution with timeout.exe
PID:2492
-
-
-
C:\Users\Admin\AppData\Local\Temp\d5ee80ad1cc23eeb1b25cde2af60c9c1_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\d5ee80ad1cc23eeb1b25cde2af60c9c1_JaffaCakes118.exe"2⤵PID:2340
-
-
C:\Users\Admin\AppData\Local\Temp\d5ee80ad1cc23eeb1b25cde2af60c9c1_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\d5ee80ad1cc23eeb1b25cde2af60c9c1_JaffaCakes118.exe"2⤵PID:2292
-
-
C:\Users\Admin\AppData\Local\Temp\d5ee80ad1cc23eeb1b25cde2af60c9c1_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\d5ee80ad1cc23eeb1b25cde2af60c9c1_JaffaCakes118.exe"2⤵PID:972
-
-
C:\Users\Admin\AppData\Local\Temp\d5ee80ad1cc23eeb1b25cde2af60c9c1_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\d5ee80ad1cc23eeb1b25cde2af60c9c1_JaffaCakes118.exe"2⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2752 -
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\install.vbs"3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1800 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c "C:\Users\Admin\AppData\Roaming\win.exe"4⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2700 -
C:\Users\Admin\AppData\Roaming\win.exeC:\Users\Admin\AppData\Roaming\win.exe5⤵
- Executes dropped EXE
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2676 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c timeout 16⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:592 -
C:\Windows\SysWOW64\timeout.exetimeout 17⤵
- System Location Discovery: System Language Discovery
- Delays execution with timeout.exe
PID:2604
-
-
-
C:\Users\Admin\AppData\Roaming\win.exe"C:\Users\Admin\AppData\Roaming\win.exe"6⤵
- Executes dropped EXE
PID:1936
-
-
C:\Users\Admin\AppData\Roaming\win.exe"C:\Users\Admin\AppData\Roaming\win.exe"6⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:3044
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2676 -s 9206⤵
- Loads dropped DLL
- Program crash
PID:716
-
-
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 276 -s 8922⤵
- Program crash
PID:2796
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
398B
MD54a74e626596d6e66b4bbc59ee6848f2d
SHA1047849ac8735ecc0943428c7cd5e00b52eee06ed
SHA25698bd6dc219a7a3e04d3d67bbec9f0b4d4640831a3a6be0a0078b050041088b0e
SHA5121cd943482d0f1ce2ffaf6ee4a82895e4d57c52051bb14bbda0548cf072b4c5cbe719d2cdb549b5ae7c0241dd9c68dd9d1674acd26aed684b8145500079cc5403
-
Filesize
66B
MD56da661fde1fe0c3c2ceb7ef0f18f3379
SHA11e620b1b4c2fa8e1420917c5d40e365a0fed1268
SHA256764c1ce9c84464a50dfd68b9aad5c0cbe2cb685675222e73ad86704a903702c0
SHA51248fa5dfe253df23e8a9f4104dbbd3cb01c5f82b87d18f827f0977d1a0e586f6612b11d9d38cf620eb56120b70575f8d5dd4d838087b12cf1668d1b9df56e987c
-
Filesize
1.3MB
MD5d5ee80ad1cc23eeb1b25cde2af60c9c1
SHA1476d6a75a019ed3b2bb866c6f89e2c0970dccf22
SHA2562a51ff41bcd2af80bf83a79b591a3da996bcc33043cb7f0b7b4493bff7a8a688
SHA5128dc1e1fe6e06049357fee74820ad0922524a0755867e51a511bd4c948ea2cd9cabc2d5b65bf4e279c2dd55a759aee7d35d683385ae4a08e0c0b40c5c8a4d93eb