Analysis

  • max time kernel
    150s
  • max time network
    149s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    20/10/2024, 10:19

General

  • Target

    61b928e535a28ff972fd74486aca34ef_JaffaCakes118.exe

  • Size

    1.1MB

  • MD5

    61b928e535a28ff972fd74486aca34ef

  • SHA1

    0520ed8c02184baf4a6a642ccca707d0884e4640

  • SHA256

    9ade8e3be001803151f0013e9e36c53ce9b8f7aed9841a8950084e396979b164

  • SHA512

    96cc976a2c42aaa041fe41ead33f31c8f0457b35bece898c648adb072427a0157495d8ceb8df6d768e7f0230efd18328462520f61b3545fe92a124ff7d35fffe

  • SSDEEP

    12288:1t0Q5JEq/y6INX6LRgU7e9pqmjtirGi4tn/vJgs0wv1+dHNm0+75U7+FmJ:H0kGq/wKgDkmj2GjtnZw5+8

Malware Config

Extracted

Family

remcos

Version

3.1.4 Pro

Botnet

KASH2

C2

kashbilly2.ddns.net:6060

Attributes
  • audio_folder

    MicRecords

  • audio_path

    %AppData%

  • audio_record_time

    5

  • connect_delay

    0

  • connect_interval

    1

  • copy_file

    remcos.exe

  • copy_folder

    Remcos

  • delete_file

    false

  • hide_file

    false

  • hide_keylog_file

    false

  • install_flag

    false

  • install_path

    %AppData%

  • keylog_crypt

    false

  • keylog_file

    logs.dat

  • keylog_flag

    false

  • keylog_folder

    remcos

  • keylog_path

    %AppData%

  • mouse_option

    false

  • mutex

    Remcos-TJR9T9

  • screenshot_crypt

    false

  • screenshot_flag

    false

  • screenshot_folder

    Screenshots

  • screenshot_path

    %AppData%

  • screenshot_time

    10

  • startup_value

    Remcos

  • take_screenshot_option

    false

  • take_screenshot_time

    5

  • take_screenshot_title

    notepad;solitaire;

Signatures

  • Modifies WinLogon for persistence 2 TTPs 1 IoCs
  • Remcos

    Remcos is a closed-source remote control and surveillance software.

  • Checks computer location settings 2 TTPs 3 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 4 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 6 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 37 IoCs
  • Suspicious use of AdjustPrivilegeToken 4 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 27 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\61b928e535a28ff972fd74486aca34ef_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\61b928e535a28ff972fd74486aca34ef_JaffaCakes118.exe"
    1⤵
    • Checks computer location settings
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:384
    • C:\Windows\SysWOW64\cmd.exe
      "cmd.exe" /c REG ADD "HKCU\Software\Microsoft\Windows NT\CurrentVersion\Winlogon" /f /v "Shell" /t REG_SZ /d "explorer.exe,C:\Users\Admin\AppData\Roaming\MAINPROC.exe,"
      2⤵
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:5000
      • C:\Windows\SysWOW64\reg.exe
        REG ADD "HKCU\Software\Microsoft\Windows NT\CurrentVersion\Winlogon" /f /v "Shell" /t REG_SZ /d "explorer.exe,C:\Users\Admin\AppData\Roaming\MAINPROC.exe,"
        3⤵
        • Modifies WinLogon for persistence
        • System Location Discovery: System Language Discovery
        PID:1072
    • C:\Users\Admin\AppData\Roaming\MAINPROC.exe
      "C:\Users\Admin\AppData\Roaming\MAINPROC.exe"
      2⤵
      • Checks computer location settings
      • Executes dropped EXE
      • Suspicious use of SetThreadContext
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:3600
      • C:\Users\Admin\AppData\Local\Temp\AddInProcess32.exe
        "C:\Users\Admin\AppData\Local\Temp\AddInProcess32.exe"
        3⤵
        • Executes dropped EXE
        • Suspicious use of SetWindowsHookEx
        PID:2288
      • C:\Users\Admin\AppData\Local\Temp\smss.exe
        "C:\Users\Admin\AppData\Local\Temp\smss.exe"
        3⤵
        • Checks computer location settings
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:3564
        • C:\Users\Admin\AppData\Local\Temp\smss.exe
          "C:\Users\Admin\AppData\Local\Temp\smss.exe"
          4⤵
          • Executes dropped EXE
          • System Location Discovery: System Language Discovery
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:5052

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\AddInProcess32.exe

    Filesize

    42KB

    MD5

    9827ff3cdf4b83f9c86354606736ca9c

    SHA1

    e73d73f42bb2a310f03eb1bcbb22be2b8eb7c723

    SHA256

    c1cf3dc8fa1c7fc00f88e07ad539979b3706ca8d69223cffd1d58bc8f521f63a

    SHA512

    8261828d55f3b5134c0aeb98311c04e20c5395d4347251746f3be0fb854f36cc7e118713cd00c9867537e6e47d5e71f2b2384fc00c67f0ae1b285b8310321579

  • C:\Users\Admin\AppData\Local\Temp\smss.exe

    Filesize

    76KB

    MD5

    0e362e7005823d0bec3719b902ed6d62

    SHA1

    590d860b909804349e0cdc2f1662b37bd62f7463

    SHA256

    2d0dc6216f613ac7551a7e70a798c22aee8eb9819428b1357e2b8c73bef905ad

    SHA512

    518991b68496b3f8545e418cf9b345e0791e09cc20d177b8aa47e0aba447aa55383c64f5bdaca39f2b061a5d08c16f2ad484af8a9f238ca23ab081618fba3ad3

  • C:\Users\Admin\AppData\Local\Temp\smss.txt

    Filesize

    54B

    MD5

    d6d801c4a1cb4f884bca7450779fe89b

    SHA1

    edb993f2f0363acf3325b7d1c7bf3399e04292f5

    SHA256

    2b87a9f7f6bfaaaf59e201f5a25a603a1d8ce3b1abb89dddf3124f2e004e5561

    SHA512

    9cf360e2dd63509912463210288cd844f7bedb7741cbd15a648ba779db9535a31c81742ee473515d3f4729c573861ffac5b0395d2892f3adfbef298f729d15bf

  • C:\Users\Admin\AppData\Local\Temp\smss.txt

    Filesize

    57B

    MD5

    2db944b5ebb7a381ffb264fee36ce0b8

    SHA1

    b3521e6e6b15df1111c0e356fa7c47d3a4246aef

    SHA256

    61bc6e6984b8b8a2d9994952f1cc6041cb4cb7dd82da05fca36992fd3943622c

    SHA512

    ccb66564ab64affad0a954e4e73a54c0af81efcef66560299fcb71b23dbf23b2dea56dbdd03435345fa99ce1018c5618cbf0490775d561c4ee583422c996e628

  • C:\Users\Admin\AppData\Roaming\MAINPROC.exe

    Filesize

    1.1MB

    MD5

    61b928e535a28ff972fd74486aca34ef

    SHA1

    0520ed8c02184baf4a6a642ccca707d0884e4640

    SHA256

    9ade8e3be001803151f0013e9e36c53ce9b8f7aed9841a8950084e396979b164

    SHA512

    96cc976a2c42aaa041fe41ead33f31c8f0457b35bece898c648adb072427a0157495d8ceb8df6d768e7f0230efd18328462520f61b3545fe92a124ff7d35fffe

  • C:\Users\Admin\AppData\Roaming\remcos\logs.dat

    Filesize

    148B

    MD5

    2ba2f162221ce5730266ce40742ad94f

    SHA1

    8b012c9257796ddd87fa8c65f58800a60c4e6408

    SHA256

    a9b9378b303fde1fb559b10befe51b62e9f934600832e1ba74c572464baa340a

    SHA512

    e9e983a3d68c2b45518960c31f68ca8ba1d6da0fc183159d58f6bce0c4029e56c147cedb840c56f1fba2952bf9dac26403cf62157459c4d3dc5e3d54ad57948a

  • memory/384-9-0x000000007522E000-0x000000007522F000-memory.dmp

    Filesize

    4KB

  • memory/384-7-0x0000000075220000-0x00000000759D0000-memory.dmp

    Filesize

    7.7MB

  • memory/384-6-0x0000000005D30000-0x0000000005D68000-memory.dmp

    Filesize

    224KB

  • memory/384-11-0x0000000075220000-0x00000000759D0000-memory.dmp

    Filesize

    7.7MB

  • memory/384-12-0x0000000075220000-0x00000000759D0000-memory.dmp

    Filesize

    7.7MB

  • memory/384-5-0x0000000006090000-0x0000000006634000-memory.dmp

    Filesize

    5.6MB

  • memory/384-24-0x0000000075220000-0x00000000759D0000-memory.dmp

    Filesize

    7.7MB

  • memory/384-4-0x0000000005A40000-0x0000000005AD2000-memory.dmp

    Filesize

    584KB

  • memory/384-3-0x0000000075220000-0x00000000759D0000-memory.dmp

    Filesize

    7.7MB

  • memory/384-2-0x0000000004C10000-0x0000000004CAC000-memory.dmp

    Filesize

    624KB

  • memory/384-1-0x00000000001A0000-0x00000000002C8000-memory.dmp

    Filesize

    1.2MB

  • memory/384-0-0x000000007522E000-0x000000007522F000-memory.dmp

    Filesize

    4KB

  • memory/2288-41-0x0000000000400000-0x0000000000478000-memory.dmp

    Filesize

    480KB

  • memory/2288-43-0x0000000000400000-0x0000000000478000-memory.dmp

    Filesize

    480KB

  • memory/2288-65-0x0000000000400000-0x0000000000478000-memory.dmp

    Filesize

    480KB

  • memory/2288-36-0x0000000000400000-0x0000000000478000-memory.dmp

    Filesize

    480KB

  • memory/2288-37-0x0000000000400000-0x0000000000478000-memory.dmp

    Filesize

    480KB

  • memory/2288-38-0x0000000000400000-0x0000000000478000-memory.dmp

    Filesize

    480KB

  • memory/2288-32-0x0000000000400000-0x0000000000478000-memory.dmp

    Filesize

    480KB

  • memory/3564-55-0x0000000000850000-0x000000000086A000-memory.dmp

    Filesize

    104KB

  • memory/3600-42-0x0000000075220000-0x00000000759D0000-memory.dmp

    Filesize

    7.7MB

  • memory/3600-44-0x0000000075220000-0x00000000759D0000-memory.dmp

    Filesize

    7.7MB

  • memory/3600-28-0x0000000002F70000-0x0000000002F84000-memory.dmp

    Filesize

    80KB

  • memory/3600-29-0x0000000006430000-0x0000000006436000-memory.dmp

    Filesize

    24KB

  • memory/3600-27-0x0000000075220000-0x00000000759D0000-memory.dmp

    Filesize

    7.7MB

  • memory/3600-26-0x0000000075220000-0x00000000759D0000-memory.dmp

    Filesize

    7.7MB

  • memory/3600-31-0x0000000075220000-0x00000000759D0000-memory.dmp

    Filesize

    7.7MB

  • memory/3600-25-0x0000000075220000-0x00000000759D0000-memory.dmp

    Filesize

    7.7MB