Analysis
-
max time kernel
139s -
max time network
147s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
19-09-2024 11:19
Static task
static1
Behavioral task
behavioral1
Sample
eb38e581ba2c7d46a2373dc9abc02b3b_JaffaCakes118.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
eb38e581ba2c7d46a2373dc9abc02b3b_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
eb38e581ba2c7d46a2373dc9abc02b3b_JaffaCakes118.exe
-
Size
208KB
-
MD5
eb38e581ba2c7d46a2373dc9abc02b3b
-
SHA1
86d8449307be9bdeea725c56254fde1692b82a30
-
SHA256
326395aaa7878f136cf1b425be58bafc14becbdf9541532abab89d4c6a6ab693
-
SHA512
d09ebf20951ec472b3b68e02f79493049f0f81972327a8d12ee7b7a3c643bb8a5f2ad5377f1f228fda61f38bfffb2c2123ca17095c30ea94c24dbb2cc40ac800
-
SSDEEP
3072:NeVfhA2bkmeXqYVWYxB9dXAICnZy0+C1iX+7vzk5eP6dvT:NIAcheXZkYx/1AICnc0P1DbztPw
Malware Config
Extracted
remcos
2.0.5 Pro
RemoteHost
79.172.242.28:2404
-
audio_folder
audio
-
audio_path
%AppData%
-
audio_record_time
5
-
connect_delay
0
-
connect_interval
5
-
copy_file
xi3s.exe
-
copy_folder
xi3x
-
delete_file
false
-
hide_file
false
-
hide_keylog_file
false
-
install_flag
true
-
install_path
%Temp%
-
keylog_crypt
false
-
keylog_file
logs.dat
-
keylog_flag
false
-
keylog_folder
remcos
-
keylog_path
%AppData%
-
mouse_option
false
-
mutex
Remcos-NL03Y0
-
screenshot_crypt
false
-
screenshot_flag
false
-
screenshot_folder
Screenshots
-
screenshot_path
%AppData%
-
screenshot_time
10
-
startup_value
xi5w
-
take_screenshot_option
false
-
take_screenshot_time
5
Signatures
-
Checks computer location settings 2 TTPs 3 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2170637797-568393320-3232933035-1000\Control Panel\International\Geo\Nation WScript.exe Key value queried \REGISTRY\USER\S-1-5-21-2170637797-568393320-3232933035-1000\Control Panel\International\Geo\Nation eb38e581ba2c7d46a2373dc9abc02b3b_JaffaCakes118.exe Key value queried \REGISTRY\USER\S-1-5-21-2170637797-568393320-3232933035-1000\Control Panel\International\Geo\Nation tmp.exe -
Executes dropped EXE 3 IoCs
pid Process 3484 tmp.exe 840 .exe 1788 xi3s.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2170637797-568393320-3232933035-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\xi5w = "\"C:\\Users\\Admin\\AppData\\Local\\Temp\\xi3x\\xi3s.exe\"" tmp.exe Set value (str) \REGISTRY\USER\S-1-5-21-2170637797-568393320-3232933035-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\xi5w = "\"C:\\Users\\Admin\\AppData\\Local\\Temp\\xi3x\\xi3s.exe\"" xi3s.exe -
Drops desktop.ini file(s) 2 IoCs
description ioc Process File created C:\Windows\assembly\Desktop.ini eb38e581ba2c7d46a2373dc9abc02b3b_JaffaCakes118.exe File opened for modification C:\Windows\assembly\Desktop.ini eb38e581ba2c7d46a2373dc9abc02b3b_JaffaCakes118.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2956 set thread context of 840 2956 eb38e581ba2c7d46a2373dc9abc02b3b_JaffaCakes118.exe 96 -
Drops file in Windows directory 3 IoCs
description ioc Process File opened for modification C:\Windows\assembly eb38e581ba2c7d46a2373dc9abc02b3b_JaffaCakes118.exe File created C:\Windows\assembly\Desktop.ini eb38e581ba2c7d46a2373dc9abc02b3b_JaffaCakes118.exe File opened for modification C:\Windows\assembly\Desktop.ini eb38e581ba2c7d46a2373dc9abc02b3b_JaffaCakes118.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 6 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language .exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WScript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language xi3s.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language eb38e581ba2c7d46a2373dc9abc02b3b_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tmp.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2170637797-568393320-3232933035-1000_Classes\Local Settings tmp.exe -
Suspicious behavior: EnumeratesProcesses 5 IoCs
pid Process 2956 eb38e581ba2c7d46a2373dc9abc02b3b_JaffaCakes118.exe 2956 eb38e581ba2c7d46a2373dc9abc02b3b_JaffaCakes118.exe 2956 eb38e581ba2c7d46a2373dc9abc02b3b_JaffaCakes118.exe 2956 eb38e581ba2c7d46a2373dc9abc02b3b_JaffaCakes118.exe 2956 eb38e581ba2c7d46a2373dc9abc02b3b_JaffaCakes118.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 2956 eb38e581ba2c7d46a2373dc9abc02b3b_JaffaCakes118.exe Token: 33 2956 eb38e581ba2c7d46a2373dc9abc02b3b_JaffaCakes118.exe Token: SeIncBasePriorityPrivilege 2956 eb38e581ba2c7d46a2373dc9abc02b3b_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 21 IoCs
description pid Process procid_target PID 2956 wrote to memory of 3484 2956 eb38e581ba2c7d46a2373dc9abc02b3b_JaffaCakes118.exe 95 PID 2956 wrote to memory of 3484 2956 eb38e581ba2c7d46a2373dc9abc02b3b_JaffaCakes118.exe 95 PID 2956 wrote to memory of 3484 2956 eb38e581ba2c7d46a2373dc9abc02b3b_JaffaCakes118.exe 95 PID 2956 wrote to memory of 840 2956 eb38e581ba2c7d46a2373dc9abc02b3b_JaffaCakes118.exe 96 PID 2956 wrote to memory of 840 2956 eb38e581ba2c7d46a2373dc9abc02b3b_JaffaCakes118.exe 96 PID 2956 wrote to memory of 840 2956 eb38e581ba2c7d46a2373dc9abc02b3b_JaffaCakes118.exe 96 PID 2956 wrote to memory of 840 2956 eb38e581ba2c7d46a2373dc9abc02b3b_JaffaCakes118.exe 96 PID 2956 wrote to memory of 840 2956 eb38e581ba2c7d46a2373dc9abc02b3b_JaffaCakes118.exe 96 PID 2956 wrote to memory of 840 2956 eb38e581ba2c7d46a2373dc9abc02b3b_JaffaCakes118.exe 96 PID 2956 wrote to memory of 840 2956 eb38e581ba2c7d46a2373dc9abc02b3b_JaffaCakes118.exe 96 PID 2956 wrote to memory of 840 2956 eb38e581ba2c7d46a2373dc9abc02b3b_JaffaCakes118.exe 96 PID 2956 wrote to memory of 840 2956 eb38e581ba2c7d46a2373dc9abc02b3b_JaffaCakes118.exe 96 PID 3484 wrote to memory of 2980 3484 tmp.exe 97 PID 3484 wrote to memory of 2980 3484 tmp.exe 97 PID 3484 wrote to memory of 2980 3484 tmp.exe 97 PID 2980 wrote to memory of 2376 2980 WScript.exe 98 PID 2980 wrote to memory of 2376 2980 WScript.exe 98 PID 2980 wrote to memory of 2376 2980 WScript.exe 98 PID 2376 wrote to memory of 1788 2376 cmd.exe 100 PID 2376 wrote to memory of 1788 2376 cmd.exe 100 PID 2376 wrote to memory of 1788 2376 cmd.exe 100
Processes
-
C:\Users\Admin\AppData\Local\Temp\eb38e581ba2c7d46a2373dc9abc02b3b_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\eb38e581ba2c7d46a2373dc9abc02b3b_JaffaCakes118.exe"1⤵
- Checks computer location settings
- Drops desktop.ini file(s)
- Suspicious use of SetThreadContext
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2956 -
C:\Users\Admin\AppData\Local\Temp\tmp.exe"C:\Users\Admin\AppData\Local\Temp\tmp.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:3484 -
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\install.vbs"3⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2980 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\xi3x\xi3s.exe"4⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2376 -
C:\Users\Admin\AppData\Local\Temp\xi3x\xi3s.exeC:\Users\Admin\AppData\Local\Temp\xi3x\xi3s.exe5⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
PID:1788
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\.exe"C:\Users\Admin\AppData\Local\Temp\.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:840
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --field-trial-handle=3808,i,3387628439405076340,17957358341235678872,262144 --variations-seed-version --mojo-platform-channel-handle=1892 /prefetch:81⤵PID:3876
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.6MB
MD51c9ff7df71493896054a91bee0322ebf
SHA138f1c85965d58b910d8e8381b6b1099d5dfcbfe4
SHA256e8b5da3394bbdd7868122ffd88d9d06afe31bd69d656857910d2f820c32d0efa
SHA512aa0def62b663743e6c3c022182b35cff33cb9abf08453d5098f3c5d32b2a8b0cd1cc5de64b93e39680c1d1396fef1fd50b642ca3ea4ba1f6d1078321d96916ab
-
Filesize
416B
MD5453f89e2c8f4e830ac8db7611532f1dd
SHA1d1e4a30ec5fd1067ade5d4a806457829038131ad
SHA256533afaf7f3b5f135c3c9cfa7dc71bba8452949c40ba0d8ffc56daf87fb306936
SHA512840c7af7dc1911f983a3f0005b9b0efa7b63161b62d53b859b29b3d2d313653d88a5e1db687f87fff1e47e233160fc96ed5067b4f11be6ef9f4bdf72c6b145df
-
Filesize
108KB
MD57ead38802bd7c0a3af677214f2ba23db
SHA1f0c204c57146244c7e2cc744214c3deff5a9f4b6
SHA256c75ba3917383a776dee26a215929d242b7896641a4157afa1d7d05913eb473fd
SHA51288c35c02fc21850904f41563611b57f3bd6c39b649fd8017d6fc19135c87a2b288365020a04d2571a64a91772edda9444821301d69d1ba8b4702fb577b98ac69