Analysis
-
max time kernel
94s -
max time network
95s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
11/09/2024, 15:28
Behavioral task
behavioral1
Sample
daa6fc9ce47213d49ba91a8b78a80757_JaffaCakes118.dll
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
daa6fc9ce47213d49ba91a8b78a80757_JaffaCakes118.dll
Resource
win10v2004-20240802-en
General
-
Target
daa6fc9ce47213d49ba91a8b78a80757_JaffaCakes118.dll
-
Size
331KB
-
MD5
daa6fc9ce47213d49ba91a8b78a80757
-
SHA1
f59089791f289f0d2ec3b5729ef46827f4fa6d41
-
SHA256
87422011d60613bf2f591057dd05fea2b896d56c5781b1875f1728b471b9d549
-
SHA512
9a716152086a13d1c2e6ad16d35304e9260cec4982b7220d5a6ed41694fbddfa87c050892604141e6e7c4016af0761781e308787d14aa9ff31a80d4d8b270157
-
SSDEEP
6144:cCFNcE5fx1TYK4xkv/BugEm4QrxcTq670nCGQktzJwZkiZalKRDw9:9NcE5fT54xkv/B34Qi240SktzJbipG9
Malware Config
Extracted
remcos
2.7.1 Pro
HOT
boot.awsmppl.com:2266
coolta71.com:2266
coolta1.xzy:2266
coolta2.xzy:2266
coolget1.xzy:2266
coolcc1.xzy:2266
-
audio_folder
MicRecords
-
audio_path
%AppData%
-
audio_record_time
5
-
connect_delay
0
-
connect_interval
1
-
copy_file
remcos.exe
-
copy_folder
remcos
-
delete_file
false
-
hide_file
false
-
hide_keylog_file
false
-
install_flag
false
-
install_path
%AppData%
-
keylog_crypt
false
-
keylog_file
dop.dt
-
keylog_flag
false
-
keylog_folder
coss
-
keylog_path
%AppData%
-
mouse_option
false
-
mutex
hotter-O8I6NR
-
screenshot_crypt
false
-
screenshot_flag
false
-
screenshot_folder
Screenshots
-
screenshot_path
%AppData%
-
screenshot_time
10
-
startup_value
remcos
-
take_screenshot_option
false
-
take_screenshot_time
5
-
take_screenshot_title
wikipedia;solitaire;
Signatures
-
Abuse Elevation Control Mechanism: Bypass User Account Control 1 TTPs 1 IoCs
UAC Bypass Attempt via SilentCleanup Task.
pid Process 1552 schtasks.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1194130065-3471212556-1656947724-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Mvnb = "C:\\Users\\Admin\\AppData\\Local\\bnvM.url" rundll32.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 4420 4476 WerFault.exe 91 -
System Location Discovery: System Language Discovery 1 TTPs 9 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Notepad.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ieinstal.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe -
Modifies registry key 1 TTPs 3 IoCs
pid Process 1004 reg.exe 4952 reg.exe 2072 reg.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 4476 ieinstal.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2168 wrote to memory of 2576 2168 rundll32.exe 83 PID 2168 wrote to memory of 2576 2168 rundll32.exe 83 PID 2168 wrote to memory of 2576 2168 rundll32.exe 83 PID 2576 wrote to memory of 2228 2576 rundll32.exe 84 PID 2576 wrote to memory of 2228 2576 rundll32.exe 84 PID 2576 wrote to memory of 2228 2576 rundll32.exe 84 PID 2576 wrote to memory of 2228 2576 rundll32.exe 84 PID 2576 wrote to memory of 2228 2576 rundll32.exe 84 PID 2576 wrote to memory of 2228 2576 rundll32.exe 84 PID 2576 wrote to memory of 2228 2576 rundll32.exe 84 PID 2576 wrote to memory of 2228 2576 rundll32.exe 84 PID 2576 wrote to memory of 2228 2576 rundll32.exe 84 PID 2576 wrote to memory of 2228 2576 rundll32.exe 84 PID 2576 wrote to memory of 2228 2576 rundll32.exe 84 PID 2576 wrote to memory of 2228 2576 rundll32.exe 84 PID 2576 wrote to memory of 2228 2576 rundll32.exe 84 PID 2576 wrote to memory of 2228 2576 rundll32.exe 84 PID 2576 wrote to memory of 2228 2576 rundll32.exe 84 PID 2576 wrote to memory of 2228 2576 rundll32.exe 84 PID 2576 wrote to memory of 2228 2576 rundll32.exe 84 PID 2576 wrote to memory of 2228 2576 rundll32.exe 84 PID 2576 wrote to memory of 2228 2576 rundll32.exe 84 PID 2576 wrote to memory of 2228 2576 rundll32.exe 84 PID 2576 wrote to memory of 2228 2576 rundll32.exe 84 PID 2576 wrote to memory of 2228 2576 rundll32.exe 84 PID 2576 wrote to memory of 2228 2576 rundll32.exe 84 PID 2576 wrote to memory of 2228 2576 rundll32.exe 84 PID 2576 wrote to memory of 2228 2576 rundll32.exe 84 PID 2576 wrote to memory of 2228 2576 rundll32.exe 84 PID 2576 wrote to memory of 2228 2576 rundll32.exe 84 PID 2576 wrote to memory of 2228 2576 rundll32.exe 84 PID 2576 wrote to memory of 2228 2576 rundll32.exe 84 PID 2576 wrote to memory of 2228 2576 rundll32.exe 84 PID 2576 wrote to memory of 2228 2576 rundll32.exe 84 PID 2576 wrote to memory of 2228 2576 rundll32.exe 84 PID 2576 wrote to memory of 2228 2576 rundll32.exe 84 PID 2576 wrote to memory of 2228 2576 rundll32.exe 84 PID 2576 wrote to memory of 2228 2576 rundll32.exe 84 PID 2576 wrote to memory of 2228 2576 rundll32.exe 84 PID 2576 wrote to memory of 2228 2576 rundll32.exe 84 PID 2576 wrote to memory of 2228 2576 rundll32.exe 84 PID 2576 wrote to memory of 2228 2576 rundll32.exe 84 PID 2576 wrote to memory of 2228 2576 rundll32.exe 84 PID 2576 wrote to memory of 2228 2576 rundll32.exe 84 PID 2576 wrote to memory of 2228 2576 rundll32.exe 84 PID 2576 wrote to memory of 2228 2576 rundll32.exe 84 PID 2576 wrote to memory of 2228 2576 rundll32.exe 84 PID 2576 wrote to memory of 2228 2576 rundll32.exe 84 PID 2576 wrote to memory of 2228 2576 rundll32.exe 84 PID 2576 wrote to memory of 2228 2576 rundll32.exe 84 PID 2576 wrote to memory of 2228 2576 rundll32.exe 84 PID 2576 wrote to memory of 2228 2576 rundll32.exe 84 PID 2576 wrote to memory of 2228 2576 rundll32.exe 84 PID 2576 wrote to memory of 2228 2576 rundll32.exe 84 PID 2576 wrote to memory of 2228 2576 rundll32.exe 84 PID 2576 wrote to memory of 2228 2576 rundll32.exe 84 PID 2576 wrote to memory of 2228 2576 rundll32.exe 84 PID 2576 wrote to memory of 2228 2576 rundll32.exe 84 PID 2576 wrote to memory of 2228 2576 rundll32.exe 84 PID 2576 wrote to memory of 2228 2576 rundll32.exe 84 PID 2576 wrote to memory of 2228 2576 rundll32.exe 84 PID 2576 wrote to memory of 2228 2576 rundll32.exe 84 PID 2576 wrote to memory of 2228 2576 rundll32.exe 84 PID 2576 wrote to memory of 2228 2576 rundll32.exe 84
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\daa6fc9ce47213d49ba91a8b78a80757_JaffaCakes118.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:2168 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\daa6fc9ce47213d49ba91a8b78a80757_JaffaCakes118.dll,#12⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2576 -
C:\Windows\SysWOW64\Notepad.exe"C:\Windows\System32\Notepad.exe"3⤵
- System Location Discovery: System Language Discovery
PID:2228 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Public\Natso.bat4⤵
- System Location Discovery: System Language Discovery
PID:1648 -
C:\Windows\SysWOW64\reg.exereg delete hkcu\Environment /v windir /f5⤵
- System Location Discovery: System Language Discovery
- Modifies registry key
PID:4952
-
-
C:\Windows\SysWOW64\reg.exereg add hkcu\Environment /v windir /d "cmd /c start /min C:\Users\Public\x.bat reg delete hkcu\Environment /v windir /f && REM "5⤵
- System Location Discovery: System Language Discovery
- Modifies registry key
PID:2072
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /Run /TN \Microsoft\Windows\DiskCleanup\SilentCleanup /I5⤵
- Abuse Elevation Control Mechanism: Bypass User Account Control
- System Location Discovery: System Language Discovery
PID:1552
-
-
C:\Windows\SysWOW64\reg.exereg delete hkcu\Environment /v windir /f5⤵
- System Location Discovery: System Language Discovery
- Modifies registry key
PID:1004
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Public\Natso.bat4⤵
- System Location Discovery: System Language Discovery
PID:3204
-
-
-
C:\Program Files (x86)\internet explorer\ieinstal.exe"C:\Program Files (x86)\internet explorer\ieinstal.exe"3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:4476 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4476 -s 1524⤵
- Program crash
PID:4420
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 420 -p 4476 -ip 44761⤵PID:944
Network
MITRE ATT&CK Enterprise v15
Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
283B
MD55cc1682955fd9f5800a8f1530c9a4334
SHA1e09b6a4d729f2f4760ee42520ec30c3192c85548
SHA2565562cc607d2f698327efacc4a21bd079bb14a99b03e7a01b3c67f8440e341cb3
SHA51280767263aad44c739236161d4338d5dd8b0b58613f22cd173c3e88ebf143220ee56bbf93ace69a07d3c2f00daff0adbaa8461a1d53d12699725395c931c43cb6