Analysis
-
max time kernel
150s -
max time network
155s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
29-11-2024 04:11
Static task
static1
Behavioral task
behavioral1
Sample
aed15864de8fa3038422fd6aea3439a0_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
aed15864de8fa3038422fd6aea3439a0_JaffaCakes118.exe
Resource
win10v2004-20241007-en
General
-
Target
aed15864de8fa3038422fd6aea3439a0_JaffaCakes118.exe
-
Size
131KB
-
MD5
aed15864de8fa3038422fd6aea3439a0
-
SHA1
389b1ac75d0f3506437299532e120a89950b2845
-
SHA256
5e586f9a00dbb0c1a83e309dc03851ec8b44d79c1503a09f704cceed436aa568
-
SHA512
1cb3471d71b2a40e4143e0eafeccf9f13f71084510a7cc4804d236c86db7ce12a72852c217dd9e70c445f6873183d8786eaea98fc83a9f99544e799d6b263c0d
-
SSDEEP
1536:ITHiPBX4nDzMyRXGHrc9YRHqbTypgpmb5Q+ZReSdhk/J+YLgD3mrxb53cSuYQjKP:xPd4n/M+WLcilrpgGH/GwY87mVmIXf
Malware Config
Extracted
remcos
1.7 Pro
Host
systemcontrol.ddns.net:45000
systemcontrol2.ddns.net:45000
-
audio_folder
audio
-
audio_path
%AppData%
-
audio_record_time
5
-
connect_delay
0
-
connect_interval
5
-
copy_file
OfficeUpgrade.exe
-
copy_folder
OfficeUpgrade
-
delete_file
false
-
hide_file
true
-
hide_keylog_file
true
-
install_flag
false
-
install_path
%AppData%
-
keylog_crypt
true
-
keylog_file
Upgrader.dat
-
keylog_flag
false
-
keylog_folder
Upgrader
-
keylog_path
%AppData%
-
mouse_option
false
-
mutex
req_khauflaoyr
-
screenshot_crypt
false
-
screenshot_flag
false
-
screenshot_folder
Screens
-
screenshot_path
%AppData%
-
screenshot_time
1
-
startup_value
OfficeUpgrade
-
take_screenshot_option
false
-
take_screenshot_time
5
Signatures
-
Remcos family
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Control Panel\International\Geo\Nation aed15864de8fa3038422fd6aea3439a0_JaffaCakes118.exe -
Executes dropped EXE 2 IoCs
pid Process 4744 wn2ra4ohzdr.exe 3680 wn2ra4ohzdr.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\raj4dkhhiap = "C:\\Users\\Admin\\AppData\\Roaming\\raj4dkhhiap\\wn2ra4ohzdr.exe" aed15864de8fa3038422fd6aea3439a0_JaffaCakes118.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 4744 set thread context of 3680 4744 wn2ra4ohzdr.exe 90 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language aed15864de8fa3038422fd6aea3439a0_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wn2ra4ohzdr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wn2ra4ohzdr.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 3680 wn2ra4ohzdr.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 3888 wrote to memory of 4744 3888 aed15864de8fa3038422fd6aea3439a0_JaffaCakes118.exe 89 PID 3888 wrote to memory of 4744 3888 aed15864de8fa3038422fd6aea3439a0_JaffaCakes118.exe 89 PID 3888 wrote to memory of 4744 3888 aed15864de8fa3038422fd6aea3439a0_JaffaCakes118.exe 89 PID 4744 wrote to memory of 3680 4744 wn2ra4ohzdr.exe 90 PID 4744 wrote to memory of 3680 4744 wn2ra4ohzdr.exe 90 PID 4744 wrote to memory of 3680 4744 wn2ra4ohzdr.exe 90 PID 4744 wrote to memory of 3680 4744 wn2ra4ohzdr.exe 90 PID 4744 wrote to memory of 3680 4744 wn2ra4ohzdr.exe 90 PID 4744 wrote to memory of 3680 4744 wn2ra4ohzdr.exe 90 PID 4744 wrote to memory of 3680 4744 wn2ra4ohzdr.exe 90 PID 4744 wrote to memory of 3680 4744 wn2ra4ohzdr.exe 90 PID 4744 wrote to memory of 3680 4744 wn2ra4ohzdr.exe 90
Processes
-
C:\Users\Admin\AppData\Local\Temp\aed15864de8fa3038422fd6aea3439a0_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\aed15864de8fa3038422fd6aea3439a0_JaffaCakes118.exe"1⤵
- Checks computer location settings
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3888 -
C:\Users\Admin\AppData\Roaming\raj4dkhhiap\wn2ra4ohzdr.exe"C:\Users\Admin\AppData\Roaming\raj4dkhhiap\wn2ra4ohzdr.exe"2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4744 -
C:\Users\Admin\AppData\Roaming\raj4dkhhiap\wn2ra4ohzdr.exe"C:\Users\Admin\AppData\Roaming\raj4dkhhiap\wn2ra4ohzdr.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:3680
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
131KB
MD5e8eb9dd36f4c8c0c006c83c77c2d9262
SHA1bbed1891b6630a20f9c920f133dec0a62bf29385
SHA2568913e91dbebd61948f80b009d2610df73cbe0e9d51a9812f9a79de03a02da054
SHA5120d8e59adfefb4b475cccb611769cbe8c9c34bf80ddadcdc0186130aac0aa4c007e83266210a743c1f65f71c0ca6ec08d7565e2c509e53e4629f348b1ebcdeae4