Analysis
-
max time kernel
149s -
max time network
130s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
23-12-2024 20:31
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_b584bd384f721c35557bf7acc7bb9c789d74804da8b8dbb3fd7c39586571cb1c.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
JaffaCakes118_b584bd384f721c35557bf7acc7bb9c789d74804da8b8dbb3fd7c39586571cb1c.exe
Resource
win10v2004-20241007-en
General
-
Target
JaffaCakes118_b584bd384f721c35557bf7acc7bb9c789d74804da8b8dbb3fd7c39586571cb1c.exe
-
Size
562KB
-
MD5
f34a430619e5668615cb3ada04be4216
-
SHA1
9c1113c380db483ceb5efc712e7179cace0fefe3
-
SHA256
b584bd384f721c35557bf7acc7bb9c789d74804da8b8dbb3fd7c39586571cb1c
-
SHA512
18218a0537eec400cd414b00fcdbc21c7edd8ac39139407fac4f872fec7309da391ec69249d947d9a92e8410e3d0477c57a029a9b3ae771eaeeaa80dd445592c
-
SSDEEP
12288:FEIS3A/ps/uSaSXO9bZMEp+CGE8eGaOko2vaR:FZS3AVj9np+CSey2va
Malware Config
Extracted
remcos
2.7.2 Pro
NEWYEAR
cato.fingusti.club:6609
-
audio_folder
MicRecords
-
audio_path
%AppData%
-
audio_record_time
5
-
connect_delay
0
-
connect_interval
1
-
copy_file
remcos.exe
-
copy_folder
Remcos
-
delete_file
false
-
hide_file
false
-
hide_keylog_file
false
-
install_flag
false
-
install_path
%AppData%
-
keylog_crypt
false
-
keylog_file
logs.dat
-
keylog_flag
false
-
keylog_folder
remcos
-
keylog_path
%AppData%
-
mouse_option
false
-
mutex
Remcos-VHEUO4
-
screenshot_crypt
false
-
screenshot_flag
false
-
screenshot_folder
Screenshots
-
screenshot_path
%AppData%
-
screenshot_time
10
-
startup_value
Remcos
-
take_screenshot_option
false
-
take_screenshot_time
5
-
take_screenshot_title
wikipedia;solitaire;
Signatures
-
Remcos family
-
Executes dropped EXE 2 IoCs
pid Process 2332 Startup.exe 1964 Startup.exe -
Loads dropped DLL 1 IoCs
pid Process 3048 JaffaCakes118_b584bd384f721c35557bf7acc7bb9c789d74804da8b8dbb3fd7c39586571cb1c.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Windows\CurrentVersion\Run\up = "C:\\Program Files (x86)\\Startup.exe" reg.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2332 set thread context of 1964 2332 Startup.exe 34 -
Drops file in Program Files directory 2 IoCs
description ioc Process File opened for modification C:\Program Files (x86)\Startup.exe JaffaCakes118_b584bd384f721c35557bf7acc7bb9c789d74804da8b8dbb3fd7c39586571cb1c.exe File created C:\Program Files (x86)\Startup.exe JaffaCakes118_b584bd384f721c35557bf7acc7bb9c789d74804da8b8dbb3fd7c39586571cb1c.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Startup.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_b584bd384f721c35557bf7acc7bb9c789d74804da8b8dbb3fd7c39586571cb1c.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Suspicious behavior: EnumeratesProcesses 7 IoCs
pid Process 3048 JaffaCakes118_b584bd384f721c35557bf7acc7bb9c789d74804da8b8dbb3fd7c39586571cb1c.exe 3048 JaffaCakes118_b584bd384f721c35557bf7acc7bb9c789d74804da8b8dbb3fd7c39586571cb1c.exe 3048 JaffaCakes118_b584bd384f721c35557bf7acc7bb9c789d74804da8b8dbb3fd7c39586571cb1c.exe 3048 JaffaCakes118_b584bd384f721c35557bf7acc7bb9c789d74804da8b8dbb3fd7c39586571cb1c.exe 3048 JaffaCakes118_b584bd384f721c35557bf7acc7bb9c789d74804da8b8dbb3fd7c39586571cb1c.exe 2332 Startup.exe 2332 Startup.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 3048 JaffaCakes118_b584bd384f721c35557bf7acc7bb9c789d74804da8b8dbb3fd7c39586571cb1c.exe Token: SeDebugPrivilege 2332 Startup.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 1964 Startup.exe -
Suspicious use of WriteProcessMemory 23 IoCs
description pid Process procid_target PID 3048 wrote to memory of 2752 3048 JaffaCakes118_b584bd384f721c35557bf7acc7bb9c789d74804da8b8dbb3fd7c39586571cb1c.exe 30 PID 3048 wrote to memory of 2752 3048 JaffaCakes118_b584bd384f721c35557bf7acc7bb9c789d74804da8b8dbb3fd7c39586571cb1c.exe 30 PID 3048 wrote to memory of 2752 3048 JaffaCakes118_b584bd384f721c35557bf7acc7bb9c789d74804da8b8dbb3fd7c39586571cb1c.exe 30 PID 3048 wrote to memory of 2752 3048 JaffaCakes118_b584bd384f721c35557bf7acc7bb9c789d74804da8b8dbb3fd7c39586571cb1c.exe 30 PID 2752 wrote to memory of 2708 2752 cmd.exe 32 PID 2752 wrote to memory of 2708 2752 cmd.exe 32 PID 2752 wrote to memory of 2708 2752 cmd.exe 32 PID 2752 wrote to memory of 2708 2752 cmd.exe 32 PID 3048 wrote to memory of 2332 3048 JaffaCakes118_b584bd384f721c35557bf7acc7bb9c789d74804da8b8dbb3fd7c39586571cb1c.exe 33 PID 3048 wrote to memory of 2332 3048 JaffaCakes118_b584bd384f721c35557bf7acc7bb9c789d74804da8b8dbb3fd7c39586571cb1c.exe 33 PID 3048 wrote to memory of 2332 3048 JaffaCakes118_b584bd384f721c35557bf7acc7bb9c789d74804da8b8dbb3fd7c39586571cb1c.exe 33 PID 3048 wrote to memory of 2332 3048 JaffaCakes118_b584bd384f721c35557bf7acc7bb9c789d74804da8b8dbb3fd7c39586571cb1c.exe 33 PID 2332 wrote to memory of 1964 2332 Startup.exe 34 PID 2332 wrote to memory of 1964 2332 Startup.exe 34 PID 2332 wrote to memory of 1964 2332 Startup.exe 34 PID 2332 wrote to memory of 1964 2332 Startup.exe 34 PID 2332 wrote to memory of 1964 2332 Startup.exe 34 PID 2332 wrote to memory of 1964 2332 Startup.exe 34 PID 2332 wrote to memory of 1964 2332 Startup.exe 34 PID 2332 wrote to memory of 1964 2332 Startup.exe 34 PID 2332 wrote to memory of 1964 2332 Startup.exe 34 PID 2332 wrote to memory of 1964 2332 Startup.exe 34 PID 2332 wrote to memory of 1964 2332 Startup.exe 34
Processes
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_b584bd384f721c35557bf7acc7bb9c789d74804da8b8dbb3fd7c39586571cb1c.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_b584bd384f721c35557bf7acc7bb9c789d74804da8b8dbb3fd7c39586571cb1c.exe"1⤵
- Loads dropped DLL
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3048 -
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c REG ADD "HKCU\Software\Microsoft\Windows\CurrentVersion\Run" /f /v "up" /t REG_SZ /d "C:\Program Files (x86)\Startup.exe"2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2752 -
C:\Windows\SysWOW64\reg.exeREG ADD "HKCU\Software\Microsoft\Windows\CurrentVersion\Run" /f /v "up" /t REG_SZ /d "C:\Program Files (x86)\Startup.exe"3⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
PID:2708
-
-
-
C:\Program Files (x86)\Startup.exe"C:\Program Files (x86)\Startup.exe"2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2332 -
C:\Program Files (x86)\Startup.exe"C:\Program Files (x86)\Startup.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1964
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
74B
MD5adcbd1fe700c548d9bbc3da6a477f370
SHA1c3ea34df358ccab3b0f192c74d4d5114fcf376dc
SHA2561cfdec6d4711dcd4b744b4454d9a66b03e19d664f900cfb86a01d711393af7e3
SHA512348697e0401e945546b8a481a1dbf2d3303022890aa4b89e2fc930aa92aabf624439d67366fac9388da887a5afdf454f1c991b2a34a189b8e90a9f30ef1b5485
-
Filesize
562KB
MD5f34a430619e5668615cb3ada04be4216
SHA19c1113c380db483ceb5efc712e7179cace0fefe3
SHA256b584bd384f721c35557bf7acc7bb9c789d74804da8b8dbb3fd7c39586571cb1c
SHA51218218a0537eec400cd414b00fcdbc21c7edd8ac39139407fac4f872fec7309da391ec69249d947d9a92e8410e3d0477c57a029a9b3ae771eaeeaa80dd445592c