Analysis
-
max time kernel
149s -
max time network
146s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
24-12-2024 22:51
Behavioral task
behavioral1
Sample
JaffaCakes118_d412692f582acd9abf0771e44b9a6915956b4633777078d3d488be6db7802203.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
JaffaCakes118_d412692f582acd9abf0771e44b9a6915956b4633777078d3d488be6db7802203.exe
Resource
win10v2004-20241007-en
General
-
Target
JaffaCakes118_d412692f582acd9abf0771e44b9a6915956b4633777078d3d488be6db7802203.exe
-
Size
124KB
-
MD5
e65c841c1e60c9f7884786817d48ef80
-
SHA1
1d3a9707565dc33054b33756d3f91c5d0866d290
-
SHA256
d412692f582acd9abf0771e44b9a6915956b4633777078d3d488be6db7802203
-
SHA512
8f3d5f8d6b760e6370ecb9a0cdc3479196b3547f7ecd5c950202d3986ff306657e838e8e3595168c518a0fb371b4ecccc98cb22cfb7686f027749a7e97870d4f
-
SSDEEP
3072:m1h1qaSs6IF9OK4b80S2Van4Va1cpcQjed5OzqhUaa:ih1qn3IF9Obbj/a1cpcQjeHOzqhUa
Malware Config
Extracted
remcos
2.5.0 Pro
DEvfaHost
194.5.99.218:2060
10.99.218.6:2060
10.99.218.6:2404
-
audio_folder
MicRecords
-
audio_path
%AppData%
-
audio_record_time
5
-
connect_delay
10
-
connect_interval
10
-
copy_file
InstallCalc.exe
-
copy_folder
InstallCalc
-
delete_file
true
-
hide_file
false
-
hide_keylog_file
true
-
install_flag
true
-
install_path
%WinDir%\System32
-
keylog_crypt
true
-
keylog_file
logs.dat
-
keylog_flag
false
-
keylog_folder
InstallCalc
-
keylog_path
%WinDir%\System32
-
mouse_option
false
-
mutex
InstallCalc-WY4IX6
-
screenshot_crypt
false
-
screenshot_flag
false
-
screenshot_folder
Screenshots
-
screenshot_path
%AppData%
-
screenshot_time
10
-
startup_value
InstallCalc
-
take_screenshot_option
false
-
take_screenshot_time
5
-
take_screenshot_title
wikipedia;solitaire;
Signatures
-
Modifies WinLogon for persistence 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Userinit = "C:\\WINDOWS\\system32\\userinit.exe, \"C:\\Windows\\SysWOW64\\InstallCalc\\InstallCalc.exe\"" JaffaCakes118_d412692f582acd9abf0771e44b9a6915956b4633777078d3d488be6db7802203.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Userinit = "C:\\WINDOWS\\system32\\userinit.exe, \"C:\\Windows\\SysWOW64\\InstallCalc\\InstallCalc.exe\"" InstallCalc.exe -
Remcos family
-
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Control Panel\International\Geo\Nation JaffaCakes118_d412692f582acd9abf0771e44b9a6915956b4633777078d3d488be6db7802203.exe Key value queried \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Control Panel\International\Geo\Nation WScript.exe -
Deletes itself 1 IoCs
pid Process 4212 WScript.exe -
Executes dropped EXE 1 IoCs
pid Process 3652 InstallCalc.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\InstallCalc = "\"C:\\Windows\\SysWOW64\\InstallCalc\\InstallCalc.exe\"" JaffaCakes118_d412692f582acd9abf0771e44b9a6915956b4633777078d3d488be6db7802203.exe Set value (str) \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\InstallCalc = "\"C:\\Windows\\SysWOW64\\InstallCalc\\InstallCalc.exe\"" InstallCalc.exe -
Modifies WinLogon 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\ InstallCalc.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\ JaffaCakes118_d412692f582acd9abf0771e44b9a6915956b4633777078d3d488be6db7802203.exe -
Drops file in System32 directory 4 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\InstallCalc\InstallCalc.exe JaffaCakes118_d412692f582acd9abf0771e44b9a6915956b4633777078d3d488be6db7802203.exe File opened for modification C:\Windows\SysWOW64\InstallCalc\logs.dat InstallCalc.exe File created C:\Windows\SysWOW64\InstallCalc\logs.dat InstallCalc.exe File created C:\Windows\SysWOW64\InstallCalc\InstallCalc.exe JaffaCakes118_d412692f582acd9abf0771e44b9a6915956b4633777078d3d488be6db7802203.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_d412692f582acd9abf0771e44b9a6915956b4633777078d3d488be6db7802203.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WScript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language InstallCalc.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000_Classes\Local Settings JaffaCakes118_d412692f582acd9abf0771e44b9a6915956b4633777078d3d488be6db7802203.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 3652 InstallCalc.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 4760 wrote to memory of 4212 4760 JaffaCakes118_d412692f582acd9abf0771e44b9a6915956b4633777078d3d488be6db7802203.exe 82 PID 4760 wrote to memory of 4212 4760 JaffaCakes118_d412692f582acd9abf0771e44b9a6915956b4633777078d3d488be6db7802203.exe 82 PID 4760 wrote to memory of 4212 4760 JaffaCakes118_d412692f582acd9abf0771e44b9a6915956b4633777078d3d488be6db7802203.exe 82 PID 4212 wrote to memory of 2544 4212 WScript.exe 83 PID 4212 wrote to memory of 2544 4212 WScript.exe 83 PID 4212 wrote to memory of 2544 4212 WScript.exe 83 PID 2544 wrote to memory of 3652 2544 cmd.exe 85 PID 2544 wrote to memory of 3652 2544 cmd.exe 85 PID 2544 wrote to memory of 3652 2544 cmd.exe 85
Processes
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_d412692f582acd9abf0771e44b9a6915956b4633777078d3d488be6db7802203.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_d412692f582acd9abf0771e44b9a6915956b4633777078d3d488be6db7802203.exe"1⤵
- Modifies WinLogon for persistence
- Checks computer location settings
- Adds Run key to start application
- Modifies WinLogon
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:4760 -
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\install.vbs"2⤵
- Checks computer location settings
- Deletes itself
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4212 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c "C:\Windows\SysWOW64\InstallCalc\InstallCalc.exe"3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2544 -
C:\Windows\SysWOW64\InstallCalc\InstallCalc.exeC:\Windows\SysWOW64\InstallCalc\InstallCalc.exe4⤵
- Modifies WinLogon for persistence
- Executes dropped EXE
- Adds Run key to start application
- Modifies WinLogon
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:3652
-
-
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
3Registry Run Keys / Startup Folder
1Winlogon Helper DLL
2Privilege Escalation
Boot or Logon Autostart Execution
3Registry Run Keys / Startup Folder
1Winlogon Helper DLL
2Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
684B
MD5ef39eec033f6ca0a2c2b508daf6f495c
SHA1c092e1e2fca05fecec0283b11cd2ff13df971e27
SHA2567f5fc3a01b8e6bc111a357225b2d5918b79871603a86020cc91a331b25eb9192
SHA512fc61b804c540e756235cb9a81bfd6fb2dad1aba8ac1c5d71ab028cb24d18352327071841f7cd1169e4b63e3bd8f6430626b020b246fb0d0e1f4b21a495aa7488
-
Filesize
124KB
MD5e65c841c1e60c9f7884786817d48ef80
SHA11d3a9707565dc33054b33756d3f91c5d0866d290
SHA256d412692f582acd9abf0771e44b9a6915956b4633777078d3d488be6db7802203
SHA5128f3d5f8d6b760e6370ecb9a0cdc3479196b3547f7ecd5c950202d3986ff306657e838e8e3595168c518a0fb371b4ecccc98cb22cfb7686f027749a7e97870d4f