Analysis
-
max time kernel
147s -
max time network
145s -
platform
windows7_x64 -
resource
win7-20241023-en -
resource tags
arch:x64arch:x86image:win7-20241023-enlocale:en-usos:windows7-x64system -
submitted
06-12-2024 19:53
Static task
static1
Behavioral task
behavioral1
Sample
cebd70129181b2d00175a09425028661_JaffaCakes118.exe
Resource
win7-20241023-en
Behavioral task
behavioral2
Sample
cebd70129181b2d00175a09425028661_JaffaCakes118.exe
Resource
win10v2004-20241007-en
General
-
Target
cebd70129181b2d00175a09425028661_JaffaCakes118.exe
-
Size
313KB
-
MD5
cebd70129181b2d00175a09425028661
-
SHA1
6412c81a57eb3e491d140cbb10b507b8f5086421
-
SHA256
b0e0893c4a07b3a6c42c33988741f24c283be68927f79e0388e30d91eed7e2c2
-
SHA512
c9bea381d1f87ff4715acaccbe75cbb834374b00324699f0eff6c76a019f2f933efb780fdd7efac48b30a47514ae910798c3f85013cd038692ef78d5007d647b
-
SSDEEP
6144:KN4z5x2rNAo0eQ2sCTQ6UGSeywoFaVt4Co5pZRtW2JrMNk:jz5Aqo0eQOTQ6N0nQt4j/ZO2Jrkk
Malware Config
Extracted
remcos
2.7.1 Pro
Server
resener.duckdns.org:3202
-
audio_folder
MicRecords
-
audio_path
%AppData%
-
audio_record_time
5
-
connect_delay
0
-
connect_interval
1
-
copy_file
chrome.exe
-
copy_folder
Chrome
-
delete_file
false
-
hide_file
true
-
hide_keylog_file
false
-
install_flag
true
-
install_path
%AppData%
-
keylog_crypt
false
-
keylog_file
logs.dat
-
keylog_flag
false
-
keylog_folder
Chrome
-
keylog_path
%AppData%
-
mouse_option
false
-
mutex
TgFthajaf3mUgRdEsgZ5-NNN84S
-
screenshot_crypt
false
-
screenshot_flag
false
-
screenshot_folder
Screenshots
-
screenshot_path
%AppData%
-
screenshot_time
10
-
startup_value
Chrome
-
take_screenshot_option
false
-
take_screenshot_time
5
-
take_screenshot_title
wikipedia;solitaire;
Signatures
-
Remcos family
-
Executes dropped EXE 1 IoCs
pid Process 2820 chrome.exe -
Loads dropped DLL 2 IoCs
pid Process 2416 cmd.exe 2416 cmd.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Windows\CurrentVersion\Run\Chrome = "\"C:\\Users\\Admin\\AppData\\Roaming\\Chrome\\chrome.exe\"" cebd70129181b2d00175a09425028661_JaffaCakes118.exe Set value (str) \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Windows\CurrentVersion\Run\Chrome = "\"C:\\Users\\Admin\\AppData\\Roaming\\Chrome\\chrome.exe\"" chrome.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language chrome.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cebd70129181b2d00175a09425028661_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WScript.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2820 chrome.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 2372 wrote to memory of 2608 2372 cebd70129181b2d00175a09425028661_JaffaCakes118.exe 30 PID 2372 wrote to memory of 2608 2372 cebd70129181b2d00175a09425028661_JaffaCakes118.exe 30 PID 2372 wrote to memory of 2608 2372 cebd70129181b2d00175a09425028661_JaffaCakes118.exe 30 PID 2372 wrote to memory of 2608 2372 cebd70129181b2d00175a09425028661_JaffaCakes118.exe 30 PID 2608 wrote to memory of 2416 2608 WScript.exe 31 PID 2608 wrote to memory of 2416 2608 WScript.exe 31 PID 2608 wrote to memory of 2416 2608 WScript.exe 31 PID 2608 wrote to memory of 2416 2608 WScript.exe 31 PID 2416 wrote to memory of 2820 2416 cmd.exe 33 PID 2416 wrote to memory of 2820 2416 cmd.exe 33 PID 2416 wrote to memory of 2820 2416 cmd.exe 33 PID 2416 wrote to memory of 2820 2416 cmd.exe 33
Processes
-
C:\Users\Admin\AppData\Local\Temp\cebd70129181b2d00175a09425028661_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\cebd70129181b2d00175a09425028661_JaffaCakes118.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2372 -
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\install.vbs"2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2608 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c "C:\Users\Admin\AppData\Roaming\Chrome\chrome.exe"3⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2416 -
C:\Users\Admin\AppData\Roaming\Chrome\chrome.exeC:\Users\Admin\AppData\Roaming\Chrome\chrome.exe4⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2820
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
418B
MD5fb3ccc6eb57452ab438c3d24d3a981d9
SHA1272e3387aa7f7664d25dab9038cc223378a8e23f
SHA2563dcd37f4d61b497d1145c1361ccd09dff5e9af2829f322b0b3231505fd8fa6db
SHA5127c079b262a3e1ab9202f4874dbcbc5de2eff0932c8cd1b9f2bc7283dd4c11ee528c849b3f3130bd3bd64d9af2b0b666c03fd173aabdb5b8a835d74623f7315a9
-
Filesize
313KB
MD5cebd70129181b2d00175a09425028661
SHA16412c81a57eb3e491d140cbb10b507b8f5086421
SHA256b0e0893c4a07b3a6c42c33988741f24c283be68927f79e0388e30d91eed7e2c2
SHA512c9bea381d1f87ff4715acaccbe75cbb834374b00324699f0eff6c76a019f2f933efb780fdd7efac48b30a47514ae910798c3f85013cd038692ef78d5007d647b
-
Filesize
74B
MD5afa6cb9d0d62a1ae6f34b122ff0b6061
SHA14bf6fe23729bc0f5ffb42133071f00ba42b53595
SHA256b2b945a5234d6a48596b8e803a799efe47b70d652729c99e267aa297e4beec4d
SHA512d51567e26828823738401380b75987d511502a4c1f64a3b56994d7cf71e977faf1b99e767546292887f89e146ec83ef31427da14a3b353ce809505d2e65530b5