Analysis
-
max time kernel
92s -
max time network
133s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
17-09-2024 13:51
Static task
static1
Behavioral task
behavioral1
Sample
e6f613141f103596ab5347f23d816ab3_JaffaCakes118.ps1
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
e6f613141f103596ab5347f23d816ab3_JaffaCakes118.ps1
Resource
win10v2004-20240802-en
General
-
Target
e6f613141f103596ab5347f23d816ab3_JaffaCakes118.ps1
-
Size
478KB
-
MD5
e6f613141f103596ab5347f23d816ab3
-
SHA1
44a27e3b48a644d67b184c755a4038708a3bda02
-
SHA256
a16aadc16fa7b3e1d90470f3780e9b4e71a0eab9862a92cf0fa9de1a20076576
-
SHA512
e3e168946b74b0e273e8459e23ad16cee648b6c9c5c832541b6eef699c9a22fb5575acc971dc01397b167a798338ef6fa56aea4523ad08473bc6c184ec634bd0
-
SSDEEP
6144:jkadKG+Emf0341hM72QsbZ6eU1pY/k4XonOf3Qc5H0:jkNEmf03uhMRst6erwOfd5U
Malware Config
Extracted
remcos
2.4.7 Pro
ZEUS
top.multigamingjo.waw.pl:3090
-
audio_folder
MicRecords
-
audio_path
%AppData%
-
audio_record_time
5
-
connect_delay
0
-
connect_interval
1
-
copy_file
remcos.exe
-
copy_folder
remcos
-
delete_file
false
-
hide_file
false
-
hide_keylog_file
false
-
install_flag
false
-
install_path
%AppData%
-
keylog_crypt
false
-
keylog_file
logs.dat
-
keylog_flag
false
-
keylog_folder
remcos
-
keylog_path
%AppData%
-
mouse_option
false
-
mutex
ZEUS-0LFWTS
-
screenshot_crypt
false
-
screenshot_flag
false
-
screenshot_folder
Screenshots
-
screenshot_path
%AppData%
-
screenshot_time
10
-
startup_value
remcos
-
take_screenshot_option
false
-
take_screenshot_time
5
-
take_screenshot_title
wikipedia;solitaire;
Signatures
-
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-355097885-2402257403-2971294179-1000\Control Panel\International\Geo\Nation gdy.exe Key value queried \REGISTRY\USER\S-1-5-21-355097885-2402257403-2971294179-1000\Control Panel\International\Geo\Nation outext.exe -
Executes dropped EXE 3 IoCs
pid Process 5012 gdy.exe 3724 outext.exe 2036 outext.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-355097885-2402257403-2971294179-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\outext = "C:\\Users\\Admin\\AppData\\Local\\outext.exe -boot" outext.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 3724 set thread context of 2036 3724 outext.exe 104 -
Subvert Trust Controls: Mark-of-the-Web Bypass 1 TTPs 2 IoCs
When files are downloaded from the Internet, they are tagged with a hidden NTFS Alternate Data Stream (ADS) named Zone.Identifier with a specific value known as the MOTW.
description ioc Process File created C:\Users\Public\gdy.exe:Zone.Identifier cmd.exe File opened for modification C:\Users\Admin\AppData\Local\outext.exe:Zone.Identifier cmd.exe -
pid Process 4944 powershell.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
pid pid_target Process procid_target 2428 2036 WerFault.exe 104 -
System Location Discovery: System Language Discovery 1 TTPs 6 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language outext.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language gdy.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
NTFS ADS 3 IoCs
description ioc Process File created C:\Users\Public\gdy.exe:Zone.Identifier cmd.exe File created C:\Users\Admin\AppData\Local\outext.exe\:Zone.Identifier:$DATA cmd.exe File opened for modification C:\Users\Admin\AppData\Local\outext.exe:Zone.Identifier cmd.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 4944 powershell.exe 4944 powershell.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 4944 powershell.exe Token: SeDebugPrivilege 5012 gdy.exe Token: SeDebugPrivilege 3724 outext.exe -
Suspicious use of WriteProcessMemory 28 IoCs
description pid Process procid_target PID 4944 wrote to memory of 5012 4944 powershell.exe 85 PID 4944 wrote to memory of 5012 4944 powershell.exe 85 PID 4944 wrote to memory of 5012 4944 powershell.exe 85 PID 5012 wrote to memory of 3460 5012 gdy.exe 93 PID 5012 wrote to memory of 3460 5012 gdy.exe 93 PID 5012 wrote to memory of 3460 5012 gdy.exe 93 PID 5012 wrote to memory of 3920 5012 gdy.exe 96 PID 5012 wrote to memory of 3920 5012 gdy.exe 96 PID 5012 wrote to memory of 3920 5012 gdy.exe 96 PID 5012 wrote to memory of 3024 5012 gdy.exe 99 PID 5012 wrote to memory of 3024 5012 gdy.exe 99 PID 5012 wrote to memory of 3024 5012 gdy.exe 99 PID 3024 wrote to memory of 3724 3024 cmd.exe 101 PID 3024 wrote to memory of 3724 3024 cmd.exe 101 PID 3024 wrote to memory of 3724 3024 cmd.exe 101 PID 3724 wrote to memory of 1216 3724 outext.exe 102 PID 3724 wrote to memory of 1216 3724 outext.exe 102 PID 3724 wrote to memory of 1216 3724 outext.exe 102 PID 3724 wrote to memory of 2036 3724 outext.exe 104 PID 3724 wrote to memory of 2036 3724 outext.exe 104 PID 3724 wrote to memory of 2036 3724 outext.exe 104 PID 3724 wrote to memory of 2036 3724 outext.exe 104 PID 3724 wrote to memory of 2036 3724 outext.exe 104 PID 3724 wrote to memory of 2036 3724 outext.exe 104 PID 3724 wrote to memory of 2036 3724 outext.exe 104 PID 3724 wrote to memory of 2036 3724 outext.exe 104 PID 3724 wrote to memory of 2036 3724 outext.exe 104 PID 3724 wrote to memory of 2036 3724 outext.exe 104
Processes
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell.exe -ExecutionPolicy bypass -File C:\Users\Admin\AppData\Local\Temp\e6f613141f103596ab5347f23d816ab3_JaffaCakes118.ps11⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4944 -
C:\Users\Public\gdy.exe"C:\Users\Public\gdy.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:5012 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C type nul > "C:\Users\Public\gdy.exe:Zone.Identifier"3⤵
- Subvert Trust Controls: Mark-of-the-Web Bypass
- System Location Discovery: System Language Discovery
- NTFS ADS
PID:3460
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c copy "C:\Users\Public\gdy.exe" "C:\Users\Admin\AppData\Local\outext.exe"3⤵
- System Location Discovery: System Language Discovery
- NTFS ADS
PID:3920
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c, "C:\Users\Admin\AppData\Local\outext.exe"3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3024 -
C:\Users\Admin\AppData\Local\outext.exe"C:\Users\Admin\AppData\Local\outext.exe"4⤵
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3724 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C type nul > "C:\Users\Admin\AppData\Local\outext.exe:Zone.Identifier"5⤵
- Subvert Trust Controls: Mark-of-the-Web Bypass
- System Location Discovery: System Language Discovery
- NTFS ADS
PID:1216
-
-
C:\Users\Admin\AppData\Local\outext.exeC:\Users\Admin\AppData\Local\outext.exe5⤵
- Executes dropped EXE
PID:2036 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2036 -s 5046⤵
- Program crash
PID:2428
-
-
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 404 -p 2036 -ip 20361⤵PID:4904
Network
MITRE ATT&CK Enterprise v15
Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Defense Evasion
Modify Registry
1Subvert Trust Controls
1SIP and Trust Provider Hijacking
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
342KB
MD5807924d305c39afe400a361e77f8c46e
SHA11f47e813a3a09dcccb9dc7880a38e507361bb3ea
SHA2563191348a4fe34b9380c79b4d030ab921e54eff9c4d6599bc0fae45a4068416cb
SHA512a6262d42d7ea68ef0b83bc0b52cfbc4b810dc09c5b6628b2194997ec23b26912627dd605c3ef870659fd404ac274ebec95b6b008a2f038566ca04947b331ccbb