Analysis
-
max time kernel
150s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
20/10/2024, 10:19
Static task
static1
Behavioral task
behavioral1
Sample
61b928e535a28ff972fd74486aca34ef_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
61b928e535a28ff972fd74486aca34ef_JaffaCakes118.exe
Resource
win10v2004-20241007-en
General
-
Target
61b928e535a28ff972fd74486aca34ef_JaffaCakes118.exe
-
Size
1.1MB
-
MD5
61b928e535a28ff972fd74486aca34ef
-
SHA1
0520ed8c02184baf4a6a642ccca707d0884e4640
-
SHA256
9ade8e3be001803151f0013e9e36c53ce9b8f7aed9841a8950084e396979b164
-
SHA512
96cc976a2c42aaa041fe41ead33f31c8f0457b35bece898c648adb072427a0157495d8ceb8df6d768e7f0230efd18328462520f61b3545fe92a124ff7d35fffe
-
SSDEEP
12288:1t0Q5JEq/y6INX6LRgU7e9pqmjtirGi4tn/vJgs0wv1+dHNm0+75U7+FmJ:H0kGq/wKgDkmj2GjtnZw5+8
Malware Config
Extracted
remcos
3.1.4 Pro
KASH2
kashbilly2.ddns.net:6060
-
audio_folder
MicRecords
-
audio_path
%AppData%
-
audio_record_time
5
-
connect_delay
0
-
connect_interval
1
-
copy_file
remcos.exe
-
copy_folder
Remcos
-
delete_file
false
-
hide_file
false
-
hide_keylog_file
false
-
install_flag
false
-
install_path
%AppData%
-
keylog_crypt
false
-
keylog_file
logs.dat
-
keylog_flag
false
-
keylog_folder
remcos
-
keylog_path
%AppData%
-
mouse_option
false
-
mutex
Remcos-TJR9T9
-
screenshot_crypt
false
-
screenshot_flag
false
-
screenshot_folder
Screenshots
-
screenshot_path
%AppData%
-
screenshot_time
10
-
startup_value
Remcos
-
take_screenshot_option
false
-
take_screenshot_time
5
-
take_screenshot_title
notepad;solitaire;
Signatures
-
Modifies WinLogon for persistence 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe,C:\\Users\\Admin\\AppData\\Roaming\\MAINPROC.exe," reg.exe -
Checks computer location settings 2 TTPs 3 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Control Panel\International\Geo\Nation smss.exe Key value queried \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Control Panel\International\Geo\Nation 61b928e535a28ff972fd74486aca34ef_JaffaCakes118.exe Key value queried \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Control Panel\International\Geo\Nation MAINPROC.exe -
Executes dropped EXE 4 IoCs
pid Process 3600 MAINPROC.exe 2288 AddInProcess32.exe 3564 smss.exe 5052 smss.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 3600 set thread context of 2288 3600 MAINPROC.exe 98 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 6 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language smss.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 61b928e535a28ff972fd74486aca34ef_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MAINPROC.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language smss.exe -
Suspicious behavior: EnumeratesProcesses 37 IoCs
pid Process 384 61b928e535a28ff972fd74486aca34ef_JaffaCakes118.exe 384 61b928e535a28ff972fd74486aca34ef_JaffaCakes118.exe 384 61b928e535a28ff972fd74486aca34ef_JaffaCakes118.exe 384 61b928e535a28ff972fd74486aca34ef_JaffaCakes118.exe 384 61b928e535a28ff972fd74486aca34ef_JaffaCakes118.exe 384 61b928e535a28ff972fd74486aca34ef_JaffaCakes118.exe 384 61b928e535a28ff972fd74486aca34ef_JaffaCakes118.exe 384 61b928e535a28ff972fd74486aca34ef_JaffaCakes118.exe 384 61b928e535a28ff972fd74486aca34ef_JaffaCakes118.exe 384 61b928e535a28ff972fd74486aca34ef_JaffaCakes118.exe 384 61b928e535a28ff972fd74486aca34ef_JaffaCakes118.exe 384 61b928e535a28ff972fd74486aca34ef_JaffaCakes118.exe 384 61b928e535a28ff972fd74486aca34ef_JaffaCakes118.exe 384 61b928e535a28ff972fd74486aca34ef_JaffaCakes118.exe 384 61b928e535a28ff972fd74486aca34ef_JaffaCakes118.exe 384 61b928e535a28ff972fd74486aca34ef_JaffaCakes118.exe 384 61b928e535a28ff972fd74486aca34ef_JaffaCakes118.exe 384 61b928e535a28ff972fd74486aca34ef_JaffaCakes118.exe 384 61b928e535a28ff972fd74486aca34ef_JaffaCakes118.exe 384 61b928e535a28ff972fd74486aca34ef_JaffaCakes118.exe 384 61b928e535a28ff972fd74486aca34ef_JaffaCakes118.exe 384 61b928e535a28ff972fd74486aca34ef_JaffaCakes118.exe 384 61b928e535a28ff972fd74486aca34ef_JaffaCakes118.exe 384 61b928e535a28ff972fd74486aca34ef_JaffaCakes118.exe 384 61b928e535a28ff972fd74486aca34ef_JaffaCakes118.exe 3600 MAINPROC.exe 3600 MAINPROC.exe 3600 MAINPROC.exe 3600 MAINPROC.exe 3564 smss.exe 5052 smss.exe 5052 smss.exe 5052 smss.exe 3600 MAINPROC.exe 3600 MAINPROC.exe 3600 MAINPROC.exe 3600 MAINPROC.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: SeDebugPrivilege 384 61b928e535a28ff972fd74486aca34ef_JaffaCakes118.exe Token: SeDebugPrivilege 3600 MAINPROC.exe Token: SeDebugPrivilege 3564 smss.exe Token: SeDebugPrivilege 5052 smss.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2288 AddInProcess32.exe -
Suspicious use of WriteProcessMemory 27 IoCs
description pid Process procid_target PID 384 wrote to memory of 5000 384 61b928e535a28ff972fd74486aca34ef_JaffaCakes118.exe 91 PID 384 wrote to memory of 5000 384 61b928e535a28ff972fd74486aca34ef_JaffaCakes118.exe 91 PID 384 wrote to memory of 5000 384 61b928e535a28ff972fd74486aca34ef_JaffaCakes118.exe 91 PID 5000 wrote to memory of 1072 5000 cmd.exe 93 PID 5000 wrote to memory of 1072 5000 cmd.exe 93 PID 5000 wrote to memory of 1072 5000 cmd.exe 93 PID 384 wrote to memory of 3600 384 61b928e535a28ff972fd74486aca34ef_JaffaCakes118.exe 97 PID 384 wrote to memory of 3600 384 61b928e535a28ff972fd74486aca34ef_JaffaCakes118.exe 97 PID 384 wrote to memory of 3600 384 61b928e535a28ff972fd74486aca34ef_JaffaCakes118.exe 97 PID 3600 wrote to memory of 2288 3600 MAINPROC.exe 98 PID 3600 wrote to memory of 2288 3600 MAINPROC.exe 98 PID 3600 wrote to memory of 2288 3600 MAINPROC.exe 98 PID 3600 wrote to memory of 2288 3600 MAINPROC.exe 98 PID 3600 wrote to memory of 2288 3600 MAINPROC.exe 98 PID 3600 wrote to memory of 2288 3600 MAINPROC.exe 98 PID 3600 wrote to memory of 2288 3600 MAINPROC.exe 98 PID 3600 wrote to memory of 2288 3600 MAINPROC.exe 98 PID 3600 wrote to memory of 2288 3600 MAINPROC.exe 98 PID 3600 wrote to memory of 2288 3600 MAINPROC.exe 98 PID 3600 wrote to memory of 2288 3600 MAINPROC.exe 98 PID 3600 wrote to memory of 2288 3600 MAINPROC.exe 98 PID 3600 wrote to memory of 3564 3600 MAINPROC.exe 99 PID 3600 wrote to memory of 3564 3600 MAINPROC.exe 99 PID 3600 wrote to memory of 3564 3600 MAINPROC.exe 99 PID 3564 wrote to memory of 5052 3564 smss.exe 100 PID 3564 wrote to memory of 5052 3564 smss.exe 100 PID 3564 wrote to memory of 5052 3564 smss.exe 100
Processes
-
C:\Users\Admin\AppData\Local\Temp\61b928e535a28ff972fd74486aca34ef_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\61b928e535a28ff972fd74486aca34ef_JaffaCakes118.exe"1⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:384 -
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c REG ADD "HKCU\Software\Microsoft\Windows NT\CurrentVersion\Winlogon" /f /v "Shell" /t REG_SZ /d "explorer.exe,C:\Users\Admin\AppData\Roaming\MAINPROC.exe,"2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:5000 -
C:\Windows\SysWOW64\reg.exeREG ADD "HKCU\Software\Microsoft\Windows NT\CurrentVersion\Winlogon" /f /v "Shell" /t REG_SZ /d "explorer.exe,C:\Users\Admin\AppData\Roaming\MAINPROC.exe,"3⤵
- Modifies WinLogon for persistence
- System Location Discovery: System Language Discovery
PID:1072
-
-
-
C:\Users\Admin\AppData\Roaming\MAINPROC.exe"C:\Users\Admin\AppData\Roaming\MAINPROC.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3600 -
C:\Users\Admin\AppData\Local\Temp\AddInProcess32.exe"C:\Users\Admin\AppData\Local\Temp\AddInProcess32.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2288
-
-
C:\Users\Admin\AppData\Local\Temp\smss.exe"C:\Users\Admin\AppData\Local\Temp\smss.exe"3⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3564 -
C:\Users\Admin\AppData\Local\Temp\smss.exe"C:\Users\Admin\AppData\Local\Temp\smss.exe"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:5052
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
42KB
MD59827ff3cdf4b83f9c86354606736ca9c
SHA1e73d73f42bb2a310f03eb1bcbb22be2b8eb7c723
SHA256c1cf3dc8fa1c7fc00f88e07ad539979b3706ca8d69223cffd1d58bc8f521f63a
SHA5128261828d55f3b5134c0aeb98311c04e20c5395d4347251746f3be0fb854f36cc7e118713cd00c9867537e6e47d5e71f2b2384fc00c67f0ae1b285b8310321579
-
Filesize
76KB
MD50e362e7005823d0bec3719b902ed6d62
SHA1590d860b909804349e0cdc2f1662b37bd62f7463
SHA2562d0dc6216f613ac7551a7e70a798c22aee8eb9819428b1357e2b8c73bef905ad
SHA512518991b68496b3f8545e418cf9b345e0791e09cc20d177b8aa47e0aba447aa55383c64f5bdaca39f2b061a5d08c16f2ad484af8a9f238ca23ab081618fba3ad3
-
Filesize
54B
MD5d6d801c4a1cb4f884bca7450779fe89b
SHA1edb993f2f0363acf3325b7d1c7bf3399e04292f5
SHA2562b87a9f7f6bfaaaf59e201f5a25a603a1d8ce3b1abb89dddf3124f2e004e5561
SHA5129cf360e2dd63509912463210288cd844f7bedb7741cbd15a648ba779db9535a31c81742ee473515d3f4729c573861ffac5b0395d2892f3adfbef298f729d15bf
-
Filesize
57B
MD52db944b5ebb7a381ffb264fee36ce0b8
SHA1b3521e6e6b15df1111c0e356fa7c47d3a4246aef
SHA25661bc6e6984b8b8a2d9994952f1cc6041cb4cb7dd82da05fca36992fd3943622c
SHA512ccb66564ab64affad0a954e4e73a54c0af81efcef66560299fcb71b23dbf23b2dea56dbdd03435345fa99ce1018c5618cbf0490775d561c4ee583422c996e628
-
Filesize
1.1MB
MD561b928e535a28ff972fd74486aca34ef
SHA10520ed8c02184baf4a6a642ccca707d0884e4640
SHA2569ade8e3be001803151f0013e9e36c53ce9b8f7aed9841a8950084e396979b164
SHA51296cc976a2c42aaa041fe41ead33f31c8f0457b35bece898c648adb072427a0157495d8ceb8df6d768e7f0230efd18328462520f61b3545fe92a124ff7d35fffe
-
Filesize
148B
MD52ba2f162221ce5730266ce40742ad94f
SHA18b012c9257796ddd87fa8c65f58800a60c4e6408
SHA256a9b9378b303fde1fb559b10befe51b62e9f934600832e1ba74c572464baa340a
SHA512e9e983a3d68c2b45518960c31f68ca8ba1d6da0fc183159d58f6bce0c4029e56c147cedb840c56f1fba2952bf9dac26403cf62157459c4d3dc5e3d54ad57948a