Analysis
-
max time kernel
148s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
19-09-2024 03:52
Static task
static1
Behavioral task
behavioral1
Sample
ea88f63b1c26c1aefd1804ee475478ab_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
ea88f63b1c26c1aefd1804ee475478ab_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
ea88f63b1c26c1aefd1804ee475478ab_JaffaCakes118.exe
-
Size
453KB
-
MD5
ea88f63b1c26c1aefd1804ee475478ab
-
SHA1
526c70868c0fb9d11065d2f75f98e2c523907c92
-
SHA256
7ad56c2211cf19c5e6cf7a25846eb21a67c59baa55644d3cd1a097cf4d734750
-
SHA512
08df2bba1ce203baee82b5ca97a110d2d57597e8f3e2ec61c9a710e70a3752e11a9570e700716d3bb9facdf606a868871016c61ab6d5b4e04d79bcd0329e3bd3
-
SSDEEP
12288:/xd8PIcO+kOmZ2xd8PIcO+kOmZ9QVBQTBK8Yuv7J+:PMk+kbUMk+kbqVBSw8PJ+
Malware Config
Extracted
remcos
2.4.3 Pro
Rich-Fam1
rich-fam1.strangled.net:6628
-
audio_folder
MicRecords
-
audio_path
%AppData%
-
audio_record_time
5
-
connect_delay
0
-
connect_interval
3
-
copy_file
remcos.exe
-
copy_folder
remcos
-
delete_file
false
-
hide_file
false
-
hide_keylog_file
true
-
install_flag
false
-
install_path
%AppData%
-
keylog_crypt
true
-
keylog_file
logs.dat
-
keylog_flag
false
-
keylog_folder
winlogs
-
keylog_path
%AppData%
-
mouse_option
false
-
mutex
iuytfdcuytf-OV62Q3
-
screenshot_crypt
false
-
screenshot_flag
false
-
screenshot_folder
Screenshots
-
screenshot_path
%AppData%
-
screenshot_time
10
-
startup_value
remcos
-
take_screenshot_option
false
-
take_screenshot_time
5
Signatures
-
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-945322488-2060912225-3527527000-1000\Control Panel\International\Geo\Nation ea88f63b1c26c1aefd1804ee475478ab_JaffaCakes118.exe Key value queried \REGISTRY\USER\S-1-5-21-945322488-2060912225-3527527000-1000\Control Panel\International\Geo\Nation audiodgc.exe -
Drops startup file 6 IoCs
description ioc Process File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\audiodgc.exe cmd.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\audiodgc.exe\:Zone.Identifier:$DATA cmd.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\audiodgc.exe:Zone.Identifier cmd.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\audiodgc.exe:Zone.Identifier cmd.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\audiodgc.lnk audiodgc.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\audiodgc.exe cmd.exe -
Executes dropped EXE 2 IoCs
pid Process 4460 audiodgc.exe 3520 audiodgc.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 4460 set thread context of 3520 4460 audiodgc.exe 104 -
Subvert Trust Controls: Mark-of-the-Web Bypass 1 TTPs 2 IoCs
When files are downloaded from the Internet, they are tagged with a hidden NTFS Alternate Data Stream (ADS) named Zone.Identifier with a specific value known as the MOTW.
description ioc Process File opened for modification C:\Users\Admin\AppData\Local\Temp\ea88f63b1c26c1aefd1804ee475478ab_JaffaCakes118.exe:Zone.Identifier cmd.exe File created C:\Users\Admin\AppData\Local\Temp\ea88f63b1c26c1aefd1804ee475478ab_JaffaCakes118.exe:Zone.Identifier cmd.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 8 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language audiodgc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ea88f63b1c26c1aefd1804ee475478ab_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
NTFS ADS 2 IoCs
description ioc Process File created C:\Users\Admin\AppData\Local\Temp\ea88f63b1c26c1aefd1804ee475478ab_JaffaCakes118.exe:Zone.Identifier cmd.exe File opened for modification C:\Users\Admin\AppData\Local\Temp\ea88f63b1c26c1aefd1804ee475478ab_JaffaCakes118.exe:Zone.Identifier cmd.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 4760 ea88f63b1c26c1aefd1804ee475478ab_JaffaCakes118.exe Token: SeDebugPrivilege 4460 audiodgc.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 3520 audiodgc.exe -
Suspicious use of WriteProcessMemory 31 IoCs
description pid Process procid_target PID 4760 wrote to memory of 1048 4760 ea88f63b1c26c1aefd1804ee475478ab_JaffaCakes118.exe 89 PID 4760 wrote to memory of 1048 4760 ea88f63b1c26c1aefd1804ee475478ab_JaffaCakes118.exe 89 PID 4760 wrote to memory of 1048 4760 ea88f63b1c26c1aefd1804ee475478ab_JaffaCakes118.exe 89 PID 4760 wrote to memory of 2968 4760 ea88f63b1c26c1aefd1804ee475478ab_JaffaCakes118.exe 91 PID 4760 wrote to memory of 2968 4760 ea88f63b1c26c1aefd1804ee475478ab_JaffaCakes118.exe 91 PID 4760 wrote to memory of 2968 4760 ea88f63b1c26c1aefd1804ee475478ab_JaffaCakes118.exe 91 PID 4760 wrote to memory of 1376 4760 ea88f63b1c26c1aefd1804ee475478ab_JaffaCakes118.exe 93 PID 4760 wrote to memory of 1376 4760 ea88f63b1c26c1aefd1804ee475478ab_JaffaCakes118.exe 93 PID 4760 wrote to memory of 1376 4760 ea88f63b1c26c1aefd1804ee475478ab_JaffaCakes118.exe 93 PID 4760 wrote to memory of 908 4760 ea88f63b1c26c1aefd1804ee475478ab_JaffaCakes118.exe 97 PID 4760 wrote to memory of 908 4760 ea88f63b1c26c1aefd1804ee475478ab_JaffaCakes118.exe 97 PID 4760 wrote to memory of 908 4760 ea88f63b1c26c1aefd1804ee475478ab_JaffaCakes118.exe 97 PID 908 wrote to memory of 4460 908 cmd.exe 99 PID 908 wrote to memory of 4460 908 cmd.exe 99 PID 908 wrote to memory of 4460 908 cmd.exe 99 PID 4460 wrote to memory of 3696 4460 audiodgc.exe 100 PID 4460 wrote to memory of 3696 4460 audiodgc.exe 100 PID 4460 wrote to memory of 3696 4460 audiodgc.exe 100 PID 4460 wrote to memory of 2752 4460 audiodgc.exe 102 PID 4460 wrote to memory of 2752 4460 audiodgc.exe 102 PID 4460 wrote to memory of 2752 4460 audiodgc.exe 102 PID 4460 wrote to memory of 3520 4460 audiodgc.exe 104 PID 4460 wrote to memory of 3520 4460 audiodgc.exe 104 PID 4460 wrote to memory of 3520 4460 audiodgc.exe 104 PID 4460 wrote to memory of 3520 4460 audiodgc.exe 104 PID 4460 wrote to memory of 3520 4460 audiodgc.exe 104 PID 4460 wrote to memory of 3520 4460 audiodgc.exe 104 PID 4460 wrote to memory of 3520 4460 audiodgc.exe 104 PID 4460 wrote to memory of 3520 4460 audiodgc.exe 104 PID 4460 wrote to memory of 3520 4460 audiodgc.exe 104 PID 4460 wrote to memory of 3520 4460 audiodgc.exe 104
Processes
-
C:\Users\Admin\AppData\Local\Temp\ea88f63b1c26c1aefd1804ee475478ab_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\ea88f63b1c26c1aefd1804ee475478ab_JaffaCakes118.exe"1⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4760 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C type nul > "C:\Users\Admin\AppData\Local\Temp\ea88f63b1c26c1aefd1804ee475478ab_JaffaCakes118.exe:Zone.Identifier"2⤵
- Subvert Trust Controls: Mark-of-the-Web Bypass
- System Location Discovery: System Language Discovery
- NTFS ADS
PID:1048
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C type nul > "C:\Users\Admin\AppData\Local\Temp\ea88f63b1c26c1aefd1804ee475478ab_JaffaCakes118.exe:Zone.Identifier"2⤵
- Subvert Trust Controls: Mark-of-the-Web Bypass
- System Location Discovery: System Language Discovery
- NTFS ADS
PID:2968
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c copy "C:\Users\Admin\AppData\Local\Temp\ea88f63b1c26c1aefd1804ee475478ab_JaffaCakes118.exe" "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\audiodgc.exe"2⤵
- Drops startup file
- System Location Discovery: System Language Discovery
PID:1376
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c, "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\audiodgc.exe"2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:908 -
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\audiodgc.exe"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\audiodgc.exe"3⤵
- Checks computer location settings
- Drops startup file
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4460 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C type nul > "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\audiodgc.exe:Zone.Identifier"4⤵
- Drops startup file
- System Location Discovery: System Language Discovery
PID:3696
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C type nul > "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\audiodgc.exe:Zone.Identifier"4⤵
- Drops startup file
- System Location Discovery: System Language Discovery
PID:2752
-
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\audiodgc.exe"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\audiodgc.exe"4⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:3520
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
453KB
MD5ea88f63b1c26c1aefd1804ee475478ab
SHA1526c70868c0fb9d11065d2f75f98e2c523907c92
SHA2567ad56c2211cf19c5e6cf7a25846eb21a67c59baa55644d3cd1a097cf4d734750
SHA51208df2bba1ce203baee82b5ca97a110d2d57597e8f3e2ec61c9a710e70a3752e11a9570e700716d3bb9facdf606a868871016c61ab6d5b4e04d79bcd0329e3bd3
-
Filesize
79B
MD543d1ca59854f8a6f745fd82440615fdf
SHA102dd5a8e9013c30422a22b7a1ba9321e16a6f896
SHA2567bf8db19d62afa67fee30080b43925c321c45f83f8682731c726170e8dfeee64
SHA512e660eae800e133554be734903d55437b8209a03e0f95d26e59d6a31d9a79d2ab597b5e3af85d202b2ee8b049e0cf231f40b57aa6aa6bf463a3c37ef6f06609a7