Analysis
-
max time kernel
149s -
max time network
137s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
24-12-2024 22:51
Behavioral task
behavioral1
Sample
JaffaCakes118_d412692f582acd9abf0771e44b9a6915956b4633777078d3d488be6db7802203.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
JaffaCakes118_d412692f582acd9abf0771e44b9a6915956b4633777078d3d488be6db7802203.exe
Resource
win10v2004-20241007-en
General
-
Target
JaffaCakes118_d412692f582acd9abf0771e44b9a6915956b4633777078d3d488be6db7802203.exe
-
Size
124KB
-
MD5
e65c841c1e60c9f7884786817d48ef80
-
SHA1
1d3a9707565dc33054b33756d3f91c5d0866d290
-
SHA256
d412692f582acd9abf0771e44b9a6915956b4633777078d3d488be6db7802203
-
SHA512
8f3d5f8d6b760e6370ecb9a0cdc3479196b3547f7ecd5c950202d3986ff306657e838e8e3595168c518a0fb371b4ecccc98cb22cfb7686f027749a7e97870d4f
-
SSDEEP
3072:m1h1qaSs6IF9OK4b80S2Van4Va1cpcQjed5OzqhUaa:ih1qn3IF9Obbj/a1cpcQjeHOzqhUa
Malware Config
Extracted
remcos
2.5.0 Pro
DEvfaHost
194.5.99.218:2060
10.99.218.6:2060
10.99.218.6:2404
-
audio_folder
MicRecords
-
audio_path
%AppData%
-
audio_record_time
5
-
connect_delay
10
-
connect_interval
10
-
copy_file
InstallCalc.exe
-
copy_folder
InstallCalc
-
delete_file
true
-
hide_file
false
-
hide_keylog_file
true
-
install_flag
true
-
install_path
%WinDir%\System32
-
keylog_crypt
true
-
keylog_file
logs.dat
-
keylog_flag
false
-
keylog_folder
InstallCalc
-
keylog_path
%WinDir%\System32
-
mouse_option
false
-
mutex
InstallCalc-WY4IX6
-
screenshot_crypt
false
-
screenshot_flag
false
-
screenshot_folder
Screenshots
-
screenshot_path
%AppData%
-
screenshot_time
10
-
startup_value
InstallCalc
-
take_screenshot_option
false
-
take_screenshot_time
5
-
take_screenshot_title
wikipedia;solitaire;
Signatures
-
Modifies WinLogon for persistence 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Userinit = "C:\\WINDOWS\\system32\\userinit.exe, \"C:\\Windows\\SysWOW64\\InstallCalc\\InstallCalc.exe\"" JaffaCakes118_d412692f582acd9abf0771e44b9a6915956b4633777078d3d488be6db7802203.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Userinit = "C:\\WINDOWS\\system32\\userinit.exe, \"C:\\Windows\\SysWOW64\\InstallCalc\\InstallCalc.exe\"" InstallCalc.exe -
Remcos family
-
Deletes itself 1 IoCs
pid Process 2712 WScript.exe -
Executes dropped EXE 1 IoCs
pid Process 2744 InstallCalc.exe -
Loads dropped DLL 4 IoCs
pid Process 2780 cmd.exe 2744 InstallCalc.exe 2744 InstallCalc.exe 2744 InstallCalc.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Windows\CurrentVersion\Run\InstallCalc = "\"C:\\Windows\\SysWOW64\\InstallCalc\\InstallCalc.exe\"" JaffaCakes118_d412692f582acd9abf0771e44b9a6915956b4633777078d3d488be6db7802203.exe Set value (str) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Windows\CurrentVersion\Run\InstallCalc = "\"C:\\Windows\\SysWOW64\\InstallCalc\\InstallCalc.exe\"" InstallCalc.exe -
Modifies WinLogon 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\ JaffaCakes118_d412692f582acd9abf0771e44b9a6915956b4633777078d3d488be6db7802203.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\ InstallCalc.exe -
Drops file in System32 directory 4 IoCs
description ioc Process File created C:\Windows\SysWOW64\InstallCalc\InstallCalc.exe JaffaCakes118_d412692f582acd9abf0771e44b9a6915956b4633777078d3d488be6db7802203.exe File opened for modification C:\Windows\SysWOW64\InstallCalc\InstallCalc.exe JaffaCakes118_d412692f582acd9abf0771e44b9a6915956b4633777078d3d488be6db7802203.exe File opened for modification C:\Windows\SysWOW64\InstallCalc\logs.dat InstallCalc.exe File created C:\Windows\SysWOW64\InstallCalc\logs.dat InstallCalc.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WScript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language InstallCalc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_d412692f582acd9abf0771e44b9a6915956b4633777078d3d488be6db7802203.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2744 InstallCalc.exe -
Suspicious use of WriteProcessMemory 15 IoCs
description pid Process procid_target PID 2704 wrote to memory of 2712 2704 JaffaCakes118_d412692f582acd9abf0771e44b9a6915956b4633777078d3d488be6db7802203.exe 30 PID 2704 wrote to memory of 2712 2704 JaffaCakes118_d412692f582acd9abf0771e44b9a6915956b4633777078d3d488be6db7802203.exe 30 PID 2704 wrote to memory of 2712 2704 JaffaCakes118_d412692f582acd9abf0771e44b9a6915956b4633777078d3d488be6db7802203.exe 30 PID 2704 wrote to memory of 2712 2704 JaffaCakes118_d412692f582acd9abf0771e44b9a6915956b4633777078d3d488be6db7802203.exe 30 PID 2712 wrote to memory of 2780 2712 WScript.exe 31 PID 2712 wrote to memory of 2780 2712 WScript.exe 31 PID 2712 wrote to memory of 2780 2712 WScript.exe 31 PID 2712 wrote to memory of 2780 2712 WScript.exe 31 PID 2780 wrote to memory of 2744 2780 cmd.exe 33 PID 2780 wrote to memory of 2744 2780 cmd.exe 33 PID 2780 wrote to memory of 2744 2780 cmd.exe 33 PID 2780 wrote to memory of 2744 2780 cmd.exe 33 PID 2780 wrote to memory of 2744 2780 cmd.exe 33 PID 2780 wrote to memory of 2744 2780 cmd.exe 33 PID 2780 wrote to memory of 2744 2780 cmd.exe 33
Processes
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_d412692f582acd9abf0771e44b9a6915956b4633777078d3d488be6db7802203.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_d412692f582acd9abf0771e44b9a6915956b4633777078d3d488be6db7802203.exe"1⤵
- Modifies WinLogon for persistence
- Adds Run key to start application
- Modifies WinLogon
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2704 -
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\install.vbs"2⤵
- Deletes itself
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2712 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c "C:\Windows\SysWOW64\InstallCalc\InstallCalc.exe"3⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2780 -
C:\Windows\SysWOW64\InstallCalc\InstallCalc.exeC:\Windows\SysWOW64\InstallCalc\InstallCalc.exe4⤵
- Modifies WinLogon for persistence
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Modifies WinLogon
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2744
-
-
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
3Registry Run Keys / Startup Folder
1Winlogon Helper DLL
2Privilege Escalation
Boot or Logon Autostart Execution
3Registry Run Keys / Startup Folder
1Winlogon Helper DLL
2Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
684B
MD5ef39eec033f6ca0a2c2b508daf6f495c
SHA1c092e1e2fca05fecec0283b11cd2ff13df971e27
SHA2567f5fc3a01b8e6bc111a357225b2d5918b79871603a86020cc91a331b25eb9192
SHA512fc61b804c540e756235cb9a81bfd6fb2dad1aba8ac1c5d71ab028cb24d18352327071841f7cd1169e4b63e3bd8f6430626b020b246fb0d0e1f4b21a495aa7488
-
Filesize
124KB
MD5e65c841c1e60c9f7884786817d48ef80
SHA11d3a9707565dc33054b33756d3f91c5d0866d290
SHA256d412692f582acd9abf0771e44b9a6915956b4633777078d3d488be6db7802203
SHA5128f3d5f8d6b760e6370ecb9a0cdc3479196b3547f7ecd5c950202d3986ff306657e838e8e3595168c518a0fb371b4ecccc98cb22cfb7686f027749a7e97870d4f