General
-
Target
cc729b8c1f1d7f050ca51d488f2572e2_JaffaCakes118
-
Size
224KB
-
Sample
241206-l9e6csslex
-
MD5
cc729b8c1f1d7f050ca51d488f2572e2
-
SHA1
82b30570a2d787ffa79834f55e97127c2f1f08af
-
SHA256
fbc7ea811a9cc4d78986918a1c07a6c6fc9f4be6e5ea4952ad76fb7b23c752af
-
SHA512
ca09a774d0cc0225aadbba1919411c56fe52f083a62bddab07e891b9231566ea342a8fb13623afafe8141f782485d62f310506f5e07267c2a6033382ea29d5ec
-
SSDEEP
6144:lnOBWg8BRGHbLegPMEGSu7YG/vXYiMWt5CAVJbc15:yp8BRsbWELGo7w1VW15
Behavioral task
behavioral1
Sample
cc729b8c1f1d7f050ca51d488f2572e2_JaffaCakes118.exe
Resource
win7-20241023-en
Behavioral task
behavioral2
Sample
cc729b8c1f1d7f050ca51d488f2572e2_JaffaCakes118.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
remcos
3.1.1 Pro
RemoteHost
192.168.8.104:2405
-
audio_folder
MicRecords
-
audio_path
%AppData%
-
audio_record_time
5
-
connect_delay
0
-
connect_interval
1
-
copy_file
svchost.exe
-
copy_folder
Svchost
-
delete_file
false
-
hide_file
true
-
hide_keylog_file
true
-
install_flag
true
-
install_path
%AppData%
-
keylog_crypt
true
-
keylog_file
logs.dat
-
keylog_flag
false
-
keylog_folder
JRE
-
keylog_path
%AppData%
-
mouse_option
false
-
mutex
Remcos-HYK6L3
-
screenshot_crypt
true
-
screenshot_flag
true
-
screenshot_folder
Screenshots
-
screenshot_path
%AppData%
-
screenshot_time
10
-
startup_value
Remcos
-
take_screenshot_option
false
-
take_screenshot_time
5
-
take_screenshot_title
wikipedia;solitaire;
Extracted
remcos
RemoteHost
192.168.8.104:2405
-
audio_folder
MicRecords
-
audio_path
%AppData%
-
audio_record_time
5
-
connect_delay
0
-
connect_interval
1
-
copy_file
svchost.exe
-
copy_folder
Svchost
-
delete_file
false
-
hide_file
true
-
hide_keylog_file
true
-
install_flag
true
-
install_path
%AppData%
-
keylog_crypt
true
-
keylog_file
logs.dat
-
keylog_flag
false
-
keylog_folder
JRE
-
keylog_path
%AppData%
-
mouse_option
false
-
mutex
Remcos-HYK6L3
-
screenshot_crypt
true
-
screenshot_flag
true
-
screenshot_folder
Screenshots
-
screenshot_path
%AppData%
-
screenshot_time
10
-
startup_value
Remcos
-
take_screenshot_option
false
-
take_screenshot_time
5
-
take_screenshot_title
wikipedia;solitaire;
Targets
-
-
Target
cc729b8c1f1d7f050ca51d488f2572e2_JaffaCakes118
-
Size
224KB
-
MD5
cc729b8c1f1d7f050ca51d488f2572e2
-
SHA1
82b30570a2d787ffa79834f55e97127c2f1f08af
-
SHA256
fbc7ea811a9cc4d78986918a1c07a6c6fc9f4be6e5ea4952ad76fb7b23c752af
-
SHA512
ca09a774d0cc0225aadbba1919411c56fe52f083a62bddab07e891b9231566ea342a8fb13623afafe8141f782485d62f310506f5e07267c2a6033382ea29d5ec
-
SSDEEP
6144:lnOBWg8BRGHbLegPMEGSu7YG/vXYiMWt5CAVJbc15:yp8BRsbWELGo7w1VW15
-
Remcos family
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
1Disable or Modify Tools
1Modify Registry
3