General
-
Target
e6f613141f103596ab5347f23d816ab3_JaffaCakes118
-
Size
478KB
-
Sample
240917-q527jswglk
-
MD5
e6f613141f103596ab5347f23d816ab3
-
SHA1
44a27e3b48a644d67b184c755a4038708a3bda02
-
SHA256
a16aadc16fa7b3e1d90470f3780e9b4e71a0eab9862a92cf0fa9de1a20076576
-
SHA512
e3e168946b74b0e273e8459e23ad16cee648b6c9c5c832541b6eef699c9a22fb5575acc971dc01397b167a798338ef6fa56aea4523ad08473bc6c184ec634bd0
-
SSDEEP
6144:jkadKG+Emf0341hM72QsbZ6eU1pY/k4XonOf3Qc5H0:jkNEmf03uhMRst6erwOfd5U
Static task
static1
Behavioral task
behavioral1
Sample
e6f613141f103596ab5347f23d816ab3_JaffaCakes118.ps1
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
e6f613141f103596ab5347f23d816ab3_JaffaCakes118.ps1
Resource
win10v2004-20240802-en
Malware Config
Extracted
remcos
ZEUS
top.multigamingjo.waw.pl:3090
-
audio_folder
MicRecords
-
audio_path
%AppData%
-
audio_record_time
5
-
connect_delay
0
-
connect_interval
1
-
copy_file
remcos.exe
-
copy_folder
remcos
-
delete_file
false
-
hide_file
false
-
hide_keylog_file
false
-
install_flag
false
-
install_path
%AppData%
-
keylog_crypt
false
-
keylog_file
logs.dat
-
keylog_flag
false
-
keylog_folder
remcos
-
keylog_path
%AppData%
-
mouse_option
false
-
mutex
ZEUS-0LFWTS
-
screenshot_crypt
false
-
screenshot_flag
false
-
screenshot_folder
Screenshots
-
screenshot_path
%AppData%
-
screenshot_time
10
-
startup_value
remcos
-
take_screenshot_option
false
-
take_screenshot_time
5
-
take_screenshot_title
wikipedia;solitaire;
Extracted
remcos
2.4.7 Pro
ZEUS
top.multigamingjo.waw.pl:3090
-
audio_folder
MicRecords
-
audio_path
%AppData%
-
audio_record_time
5
-
connect_delay
0
-
connect_interval
1
-
copy_file
remcos.exe
-
copy_folder
remcos
-
delete_file
false
-
hide_file
false
-
hide_keylog_file
false
-
install_flag
false
-
install_path
%AppData%
-
keylog_crypt
false
-
keylog_file
logs.dat
-
keylog_flag
false
-
keylog_folder
remcos
-
keylog_path
%AppData%
-
mouse_option
false
-
mutex
ZEUS-0LFWTS
-
screenshot_crypt
false
-
screenshot_flag
false
-
screenshot_folder
Screenshots
-
screenshot_path
%AppData%
-
screenshot_time
10
-
startup_value
remcos
-
take_screenshot_option
false
-
take_screenshot_time
5
-
take_screenshot_title
wikipedia;solitaire;
Targets
-
-
Target
e6f613141f103596ab5347f23d816ab3_JaffaCakes118
-
Size
478KB
-
MD5
e6f613141f103596ab5347f23d816ab3
-
SHA1
44a27e3b48a644d67b184c755a4038708a3bda02
-
SHA256
a16aadc16fa7b3e1d90470f3780e9b4e71a0eab9862a92cf0fa9de1a20076576
-
SHA512
e3e168946b74b0e273e8459e23ad16cee648b6c9c5c832541b6eef699c9a22fb5575acc971dc01397b167a798338ef6fa56aea4523ad08473bc6c184ec634bd0
-
SSDEEP
6144:jkadKG+Emf0341hM72QsbZ6eU1pY/k4XonOf3Qc5H0:jkNEmf03uhMRst6erwOfd5U
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Defense Evasion
Modify Registry
1Subvert Trust Controls
1SIP and Trust Provider Hijacking
1