Analysis
-
max time kernel
148s -
max time network
146s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
15-09-2024 15:27
Static task
static1
Behavioral task
behavioral1
Sample
e2ccfaf4d44c36b5654174b3f341a2f9_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
e2ccfaf4d44c36b5654174b3f341a2f9_JaffaCakes118.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral3
Sample
$PLUGINSDIR/System.dll
Resource
win7-20240903-en
Behavioral task
behavioral4
Sample
$PLUGINSDIR/System.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral5
Sample
hjfeu2x8wxnb82.dll
Resource
win7-20240708-en
Behavioral task
behavioral6
Sample
hjfeu2x8wxnb82.dll
Resource
win10v2004-20240802-en
General
-
Target
e2ccfaf4d44c36b5654174b3f341a2f9_JaffaCakes118.exe
-
Size
234KB
-
MD5
e2ccfaf4d44c36b5654174b3f341a2f9
-
SHA1
163ad4b931cf150d72b4408322f710d59fff96de
-
SHA256
cc17e0a75ce1d2770db5ab70177b9ffa3665d7c46290a9c61deef05e41fb48f2
-
SHA512
8b291eea1e2458ac3c6c5a97ceeb7184a672496da75f758249e6ac7f0533612610f286bfd203ea667017b880ca79fa58c392b4e62bed8ada4c0b14831c392fe9
-
SSDEEP
3072:SBkfJpRXATwMdFCcv6k3bpcmH0IvkHEq8bvgjSZiU/2MeQMMoc4EDJgTR7T9AD1s:SqjIprpvLoa532Goc42JERY1U8acYt
Malware Config
Extracted
remcos
2.7.2 Pro
grace and mercy logs
103.153.77.83:4348
-
audio_folder
MicRecords
-
audio_path
%AppData%
-
audio_record_time
5
-
connect_delay
0
-
connect_interval
1
-
copy_file
Execel.exe
-
copy_folder
Execel
-
delete_file
false
-
hide_file
false
-
hide_keylog_file
false
-
install_flag
false
-
install_path
%AppData%
-
keylog_crypt
false
-
keylog_file
logs.dat
-
keylog_flag
false
-
keylog_folder
Execel
-
keylog_path
%AppData%
-
mouse_option
false
-
mutex
Execel-X7W93K
-
screenshot_crypt
false
-
screenshot_flag
false
-
screenshot_folder
Screenshots
-
screenshot_path
%AppData%
-
screenshot_time
10
-
startup_value
Execel
-
take_screenshot_option
false
-
take_screenshot_time
5
-
take_screenshot_title
wikipedia;solitaire;
Signatures
-
Loads dropped DLL 2 IoCs
pid Process 2656 e2ccfaf4d44c36b5654174b3f341a2f9_JaffaCakes118.exe 2656 e2ccfaf4d44c36b5654174b3f341a2f9_JaffaCakes118.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2656 set thread context of 2788 2656 e2ccfaf4d44c36b5654174b3f341a2f9_JaffaCakes118.exe 30 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language e2ccfaf4d44c36b5654174b3f341a2f9_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language e2ccfaf4d44c36b5654174b3f341a2f9_JaffaCakes118.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 2656 e2ccfaf4d44c36b5654174b3f341a2f9_JaffaCakes118.exe 2656 e2ccfaf4d44c36b5654174b3f341a2f9_JaffaCakes118.exe 2656 e2ccfaf4d44c36b5654174b3f341a2f9_JaffaCakes118.exe 2656 e2ccfaf4d44c36b5654174b3f341a2f9_JaffaCakes118.exe -
Suspicious behavior: MapViewOfSection 1 IoCs
pid Process 2656 e2ccfaf4d44c36b5654174b3f341a2f9_JaffaCakes118.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2788 e2ccfaf4d44c36b5654174b3f341a2f9_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 5 IoCs
description pid Process procid_target PID 2656 wrote to memory of 2788 2656 e2ccfaf4d44c36b5654174b3f341a2f9_JaffaCakes118.exe 30 PID 2656 wrote to memory of 2788 2656 e2ccfaf4d44c36b5654174b3f341a2f9_JaffaCakes118.exe 30 PID 2656 wrote to memory of 2788 2656 e2ccfaf4d44c36b5654174b3f341a2f9_JaffaCakes118.exe 30 PID 2656 wrote to memory of 2788 2656 e2ccfaf4d44c36b5654174b3f341a2f9_JaffaCakes118.exe 30 PID 2656 wrote to memory of 2788 2656 e2ccfaf4d44c36b5654174b3f341a2f9_JaffaCakes118.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\e2ccfaf4d44c36b5654174b3f341a2f9_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\e2ccfaf4d44c36b5654174b3f341a2f9_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:2656 -
C:\Users\Admin\AppData\Local\Temp\e2ccfaf4d44c36b5654174b3f341a2f9_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\e2ccfaf4d44c36b5654174b3f341a2f9_JaffaCakes118.exe"2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2788
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
74B
MD599727fdaba9c4fd1db81d85eeb4c442d
SHA1887bf26a9a5b17f92505139796c9648043def6d2
SHA256a7312f8ea3b43f7ccc2502779a25ec4a10636dbafb921c310e8930520e7ddd40
SHA512794d7560d3c288d835defe9fc2986476f7f00d5e51a56c4e3ae831cbbaa46cdda70f4f08ce2d7f3593741362f9cdc1ca29f07b94222f8c191a5d2936a63126aa
-
Filesize
16KB
MD5c5aeacd25be37723c7ffaab31ad6d639
SHA1f5364bdbb0b85f15b61db6ddfea44d904481df46
SHA2565b46289cb721008f2125b81abbe28be5ce09c9aafdbb19139b6f77ce921c0bc8
SHA5123dc1b6d8b86674297d872efbbd9c3295a39d8ec9bf082982aea94de658d917e4b63ad762b8e1a738d29d06875625363fa02329a3cb5d48d9f40ba100145b98fe
-
Filesize
11KB
MD5fccff8cb7a1067e23fd2e2b63971a8e1
SHA130e2a9e137c1223a78a0f7b0bf96a1c361976d91
SHA2566fcea34c8666b06368379c6c402b5321202c11b00889401c743fb96c516c679e
SHA512f4335e84e6f8d70e462a22f1c93d2998673a7616c868177cac3e8784a3be1d7d0bb96f2583fa0ed82f4f2b6b8f5d9b33521c279a42e055d80a94b4f3f1791e0c