Analysis
-
max time kernel
149s -
max time network
147s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
26-09-2024 13:57
Static task
static1
Behavioral task
behavioral1
Sample
f884c48291efc94056ebd12a6c452bca_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
f884c48291efc94056ebd12a6c452bca_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
f884c48291efc94056ebd12a6c452bca_JaffaCakes118.exe
-
Size
457KB
-
MD5
f884c48291efc94056ebd12a6c452bca
-
SHA1
6a14e335110ee2df1811467533d03bee4f16b30c
-
SHA256
b6303200103a2850024a8fa44653b37d9eae9d3b5586c85e37fa2396f76e5b45
-
SHA512
b3683b54bf9b0d9722c961b3e154a537cc9e971cac71ffa21efdc1e5a53cfb6dca0f5e374ac03ee23f659cab0ce20e70333d12d937ed1a72f0ab046d9beb28bc
-
SSDEEP
12288:vxd8PIcO+kOmZ2xd8PIcO+kOmZ6PzWDuS0s4aJ1Txm7g:/Mk+kbUMk+kbQiiFaTA
Malware Config
Extracted
remcos
2.4.3 Pro
cashoutRTD 2019
cashout2018.ddnss.de:2018
-
audio_folder
audio
-
audio_path
%AppData%
-
audio_record_time
5
-
connect_delay
0
-
connect_interval
5
-
copy_file
dmw.exe
-
copy_folder
dmw
-
delete_file
false
-
hide_file
false
-
hide_keylog_file
true
-
install_flag
false
-
install_path
%AppData%
-
keylog_crypt
true
-
keylog_file
logs.dat
-
keylog_flag
false
-
keylog_folder
winloga
-
keylog_path
%AppData%
-
mouse_option
false
-
mutex
uytrrtyu-NJTBCR
-
screenshot_crypt
false
-
screenshot_flag
false
-
screenshot_folder
Screenshots
-
screenshot_path
%AppData%
-
screenshot_time
10
-
startup_value
dmw
-
take_screenshot_option
false
-
take_screenshot_time
5
Signatures
-
Drops startup file 6 IoCs
description ioc Process File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\audiodgcg.exe:Zone.Identifier cmd.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\audiodgcg.exe:Zone.Identifier cmd.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\audiodgcg.lnk audiodgcg.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\audiodgcg.exe cmd.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\audiodgcg.exe cmd.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\audiodgcg.exe\:Zone.Identifier:$DATA cmd.exe -
Executes dropped EXE 2 IoCs
pid Process 2980 audiodgcg.exe 2872 audiodgcg.exe -
Loads dropped DLL 3 IoCs
pid Process 2628 cmd.exe 2980 audiodgcg.exe 2980 audiodgcg.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2980 set thread context of 2872 2980 audiodgcg.exe 44 -
Subvert Trust Controls: Mark-of-the-Web Bypass 1 TTPs 2 IoCs
When files are downloaded from the Internet, they are tagged with a hidden NTFS Alternate Data Stream (ADS) named Zone.Identifier with a specific value known as the MOTW.
description ioc Process File created C:\Users\Admin\AppData\Local\Temp\f884c48291efc94056ebd12a6c452bca_JaffaCakes118.exe:Zone.Identifier cmd.exe File opened for modification C:\Users\Admin\AppData\Local\Temp\f884c48291efc94056ebd12a6c452bca_JaffaCakes118.exe:Zone.Identifier cmd.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 9 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language audiodgcg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language f884c48291efc94056ebd12a6c452bca_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language audiodgcg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
NTFS ADS 2 IoCs
description ioc Process File created C:\Users\Admin\AppData\Local\Temp\f884c48291efc94056ebd12a6c452bca_JaffaCakes118.exe:Zone.Identifier cmd.exe File opened for modification C:\Users\Admin\AppData\Local\Temp\f884c48291efc94056ebd12a6c452bca_JaffaCakes118.exe:Zone.Identifier cmd.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 2644 f884c48291efc94056ebd12a6c452bca_JaffaCakes118.exe Token: SeDebugPrivilege 2980 audiodgcg.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2872 audiodgcg.exe -
Suspicious use of WriteProcessMemory 39 IoCs
description pid Process procid_target PID 2644 wrote to memory of 2704 2644 f884c48291efc94056ebd12a6c452bca_JaffaCakes118.exe 30 PID 2644 wrote to memory of 2704 2644 f884c48291efc94056ebd12a6c452bca_JaffaCakes118.exe 30 PID 2644 wrote to memory of 2704 2644 f884c48291efc94056ebd12a6c452bca_JaffaCakes118.exe 30 PID 2644 wrote to memory of 2704 2644 f884c48291efc94056ebd12a6c452bca_JaffaCakes118.exe 30 PID 2644 wrote to memory of 2788 2644 f884c48291efc94056ebd12a6c452bca_JaffaCakes118.exe 32 PID 2644 wrote to memory of 2788 2644 f884c48291efc94056ebd12a6c452bca_JaffaCakes118.exe 32 PID 2644 wrote to memory of 2788 2644 f884c48291efc94056ebd12a6c452bca_JaffaCakes118.exe 32 PID 2644 wrote to memory of 2788 2644 f884c48291efc94056ebd12a6c452bca_JaffaCakes118.exe 32 PID 2644 wrote to memory of 2720 2644 f884c48291efc94056ebd12a6c452bca_JaffaCakes118.exe 34 PID 2644 wrote to memory of 2720 2644 f884c48291efc94056ebd12a6c452bca_JaffaCakes118.exe 34 PID 2644 wrote to memory of 2720 2644 f884c48291efc94056ebd12a6c452bca_JaffaCakes118.exe 34 PID 2644 wrote to memory of 2720 2644 f884c48291efc94056ebd12a6c452bca_JaffaCakes118.exe 34 PID 2644 wrote to memory of 2628 2644 f884c48291efc94056ebd12a6c452bca_JaffaCakes118.exe 36 PID 2644 wrote to memory of 2628 2644 f884c48291efc94056ebd12a6c452bca_JaffaCakes118.exe 36 PID 2644 wrote to memory of 2628 2644 f884c48291efc94056ebd12a6c452bca_JaffaCakes118.exe 36 PID 2644 wrote to memory of 2628 2644 f884c48291efc94056ebd12a6c452bca_JaffaCakes118.exe 36 PID 2628 wrote to memory of 2980 2628 cmd.exe 38 PID 2628 wrote to memory of 2980 2628 cmd.exe 38 PID 2628 wrote to memory of 2980 2628 cmd.exe 38 PID 2628 wrote to memory of 2980 2628 cmd.exe 38 PID 2980 wrote to memory of 2884 2980 audiodgcg.exe 40 PID 2980 wrote to memory of 2884 2980 audiodgcg.exe 40 PID 2980 wrote to memory of 2884 2980 audiodgcg.exe 40 PID 2980 wrote to memory of 2884 2980 audiodgcg.exe 40 PID 2980 wrote to memory of 2840 2980 audiodgcg.exe 42 PID 2980 wrote to memory of 2840 2980 audiodgcg.exe 42 PID 2980 wrote to memory of 2840 2980 audiodgcg.exe 42 PID 2980 wrote to memory of 2840 2980 audiodgcg.exe 42 PID 2980 wrote to memory of 2872 2980 audiodgcg.exe 44 PID 2980 wrote to memory of 2872 2980 audiodgcg.exe 44 PID 2980 wrote to memory of 2872 2980 audiodgcg.exe 44 PID 2980 wrote to memory of 2872 2980 audiodgcg.exe 44 PID 2980 wrote to memory of 2872 2980 audiodgcg.exe 44 PID 2980 wrote to memory of 2872 2980 audiodgcg.exe 44 PID 2980 wrote to memory of 2872 2980 audiodgcg.exe 44 PID 2980 wrote to memory of 2872 2980 audiodgcg.exe 44 PID 2980 wrote to memory of 2872 2980 audiodgcg.exe 44 PID 2980 wrote to memory of 2872 2980 audiodgcg.exe 44 PID 2980 wrote to memory of 2872 2980 audiodgcg.exe 44
Processes
-
C:\Users\Admin\AppData\Local\Temp\f884c48291efc94056ebd12a6c452bca_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\f884c48291efc94056ebd12a6c452bca_JaffaCakes118.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2644 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C type nul > "C:\Users\Admin\AppData\Local\Temp\f884c48291efc94056ebd12a6c452bca_JaffaCakes118.exe:Zone.Identifier"2⤵
- Subvert Trust Controls: Mark-of-the-Web Bypass
- System Location Discovery: System Language Discovery
- NTFS ADS
PID:2704
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C type nul > "C:\Users\Admin\AppData\Local\Temp\f884c48291efc94056ebd12a6c452bca_JaffaCakes118.exe:Zone.Identifier"2⤵
- Subvert Trust Controls: Mark-of-the-Web Bypass
- System Location Discovery: System Language Discovery
- NTFS ADS
PID:2788
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c copy "C:\Users\Admin\AppData\Local\Temp\f884c48291efc94056ebd12a6c452bca_JaffaCakes118.exe" "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\audiodgcg.exe"2⤵
- Drops startup file
- System Location Discovery: System Language Discovery
PID:2720
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c, "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\audiodgcg.exe"2⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2628 -
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\audiodgcg.exe"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\audiodgcg.exe"3⤵
- Drops startup file
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2980 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C type nul > "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\audiodgcg.exe:Zone.Identifier"4⤵
- Drops startup file
- System Location Discovery: System Language Discovery
PID:2884
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C type nul > "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\audiodgcg.exe:Zone.Identifier"4⤵
- Drops startup file
- System Location Discovery: System Language Discovery
PID:2840
-
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\audiodgcg.exe"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\audiodgcg.exe"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2872
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
457KB
MD5f884c48291efc94056ebd12a6c452bca
SHA16a14e335110ee2df1811467533d03bee4f16b30c
SHA256b6303200103a2850024a8fa44653b37d9eae9d3b5586c85e37fa2396f76e5b45
SHA512b3683b54bf9b0d9722c961b3e154a537cc9e971cac71ffa21efdc1e5a53cfb6dca0f5e374ac03ee23f659cab0ce20e70333d12d937ed1a72f0ab046d9beb28bc
-
Filesize
79B
MD59ebb7b28bd86ae12b308d6bedcfc24b3
SHA146f92396cbb42db00f2013b5864806ac942cc435
SHA256b164c52136068b1659f76e58779d8af0a539a37b3ef0005b212b8b471c69bdaf
SHA512db0bf4241e6868c7fa833c163a0ab42c792769717b7850df0b1e2fa3fcbca435bdb898468487c1ee912adcf8f4b70f9934885cf0958d804554a7740f8de0120e