Analysis
-
max time kernel
151s -
max time network
154s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
24-12-2024 23:37
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_e5c85966816a4d1bf0b624712095bce065d7ba277ca7126e8e2d8951222baf4e.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
JaffaCakes118_e5c85966816a4d1bf0b624712095bce065d7ba277ca7126e8e2d8951222baf4e.exe
Resource
win10v2004-20241007-en
General
-
Target
JaffaCakes118_e5c85966816a4d1bf0b624712095bce065d7ba277ca7126e8e2d8951222baf4e.exe
-
Size
300.0MB
-
MD5
c4c2beda15179f6664a458f36d2c290d
-
SHA1
3ce80b1ac6a5cf4f3cb3c127223a161023e0be59
-
SHA256
e5c85966816a4d1bf0b624712095bce065d7ba277ca7126e8e2d8951222baf4e
-
SHA512
c91ee4c2a462090362bb7cd27c6c3b1db4423b6fd5761fe4f16885a5858ad8936d264fbb12ca9a24cb8ddd15c4df1779c0461ce73d2b0dde814aae08aaefe863
-
SSDEEP
12288:7rThwUxpprVUKi0LVUDdz71Cmv0gLpsmT4Rhni6ivmZ:jh1prTi0odz7AWeo4RhMvU
Malware Config
Extracted
remcos
COMRADE MARCH-21
comaand-marc-21.duckdns.org:30288
-
audio_folder
MicRecords
-
audio_path
%AppData%
-
audio_record_time
5
-
connect_delay
0
-
connect_interval
1
-
copy_file
remcos.exe
-
copy_folder
Remcos
-
delete_file
false
-
hide_file
false
-
hide_keylog_file
false
-
install_flag
false
-
install_path
%AppData%
-
keylog_crypt
false
-
keylog_file
logs.dat
-
keylog_flag
false
-
keylog_folder
sms-audio
-
keylog_path
%AppData%
-
mouse_option
false
-
mutex
Snappy1yld7-2Q760T
-
screenshot_crypt
false
-
screenshot_flag
false
-
screenshot_folder
Screenshots
-
screenshot_path
%AppData%
-
screenshot_time
10
-
startup_value
Remcos
-
take_screenshot_option
false
-
take_screenshot_time
5
-
take_screenshot_title
notepad;solitaire;
Signatures
-
Remcos family
-
Executes dropped EXE 2 IoCs
pid Process 2276 zoomint.exe 2664 zoomint.exe -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 2880 set thread context of 2728 2880 JaffaCakes118_e5c85966816a4d1bf0b624712095bce065d7ba277ca7126e8e2d8951222baf4e.exe 36 PID 2276 set thread context of 1856 2276 zoomint.exe 43 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 11 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RegAsm.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RegAsm.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_e5c85966816a4d1bf0b624712095bce065d7ba277ca7126e8e2d8951222baf4e.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language zoomint.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language zoomint.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 2 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2664 schtasks.exe 1952 schtasks.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2728 RegAsm.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2880 wrote to memory of 2680 2880 JaffaCakes118_e5c85966816a4d1bf0b624712095bce065d7ba277ca7126e8e2d8951222baf4e.exe 31 PID 2880 wrote to memory of 2680 2880 JaffaCakes118_e5c85966816a4d1bf0b624712095bce065d7ba277ca7126e8e2d8951222baf4e.exe 31 PID 2880 wrote to memory of 2680 2880 JaffaCakes118_e5c85966816a4d1bf0b624712095bce065d7ba277ca7126e8e2d8951222baf4e.exe 31 PID 2880 wrote to memory of 2680 2880 JaffaCakes118_e5c85966816a4d1bf0b624712095bce065d7ba277ca7126e8e2d8951222baf4e.exe 31 PID 2880 wrote to memory of 2708 2880 JaffaCakes118_e5c85966816a4d1bf0b624712095bce065d7ba277ca7126e8e2d8951222baf4e.exe 33 PID 2880 wrote to memory of 2708 2880 JaffaCakes118_e5c85966816a4d1bf0b624712095bce065d7ba277ca7126e8e2d8951222baf4e.exe 33 PID 2880 wrote to memory of 2708 2880 JaffaCakes118_e5c85966816a4d1bf0b624712095bce065d7ba277ca7126e8e2d8951222baf4e.exe 33 PID 2880 wrote to memory of 2708 2880 JaffaCakes118_e5c85966816a4d1bf0b624712095bce065d7ba277ca7126e8e2d8951222baf4e.exe 33 PID 2680 wrote to memory of 2664 2680 cmd.exe 35 PID 2680 wrote to memory of 2664 2680 cmd.exe 35 PID 2680 wrote to memory of 2664 2680 cmd.exe 35 PID 2680 wrote to memory of 2664 2680 cmd.exe 35 PID 2880 wrote to memory of 2728 2880 JaffaCakes118_e5c85966816a4d1bf0b624712095bce065d7ba277ca7126e8e2d8951222baf4e.exe 36 PID 2880 wrote to memory of 2728 2880 JaffaCakes118_e5c85966816a4d1bf0b624712095bce065d7ba277ca7126e8e2d8951222baf4e.exe 36 PID 2880 wrote to memory of 2728 2880 JaffaCakes118_e5c85966816a4d1bf0b624712095bce065d7ba277ca7126e8e2d8951222baf4e.exe 36 PID 2880 wrote to memory of 2728 2880 JaffaCakes118_e5c85966816a4d1bf0b624712095bce065d7ba277ca7126e8e2d8951222baf4e.exe 36 PID 2880 wrote to memory of 2728 2880 JaffaCakes118_e5c85966816a4d1bf0b624712095bce065d7ba277ca7126e8e2d8951222baf4e.exe 36 PID 2880 wrote to memory of 2728 2880 JaffaCakes118_e5c85966816a4d1bf0b624712095bce065d7ba277ca7126e8e2d8951222baf4e.exe 36 PID 2880 wrote to memory of 2728 2880 JaffaCakes118_e5c85966816a4d1bf0b624712095bce065d7ba277ca7126e8e2d8951222baf4e.exe 36 PID 2880 wrote to memory of 2728 2880 JaffaCakes118_e5c85966816a4d1bf0b624712095bce065d7ba277ca7126e8e2d8951222baf4e.exe 36 PID 2880 wrote to memory of 2728 2880 JaffaCakes118_e5c85966816a4d1bf0b624712095bce065d7ba277ca7126e8e2d8951222baf4e.exe 36 PID 2880 wrote to memory of 2728 2880 JaffaCakes118_e5c85966816a4d1bf0b624712095bce065d7ba277ca7126e8e2d8951222baf4e.exe 36 PID 2880 wrote to memory of 2728 2880 JaffaCakes118_e5c85966816a4d1bf0b624712095bce065d7ba277ca7126e8e2d8951222baf4e.exe 36 PID 2880 wrote to memory of 2728 2880 JaffaCakes118_e5c85966816a4d1bf0b624712095bce065d7ba277ca7126e8e2d8951222baf4e.exe 36 PID 2880 wrote to memory of 2728 2880 JaffaCakes118_e5c85966816a4d1bf0b624712095bce065d7ba277ca7126e8e2d8951222baf4e.exe 36 PID 2880 wrote to memory of 2728 2880 JaffaCakes118_e5c85966816a4d1bf0b624712095bce065d7ba277ca7126e8e2d8951222baf4e.exe 36 PID 2880 wrote to memory of 2728 2880 JaffaCakes118_e5c85966816a4d1bf0b624712095bce065d7ba277ca7126e8e2d8951222baf4e.exe 36 PID 2880 wrote to memory of 2728 2880 JaffaCakes118_e5c85966816a4d1bf0b624712095bce065d7ba277ca7126e8e2d8951222baf4e.exe 36 PID 2216 wrote to memory of 2276 2216 taskeng.exe 38 PID 2216 wrote to memory of 2276 2216 taskeng.exe 38 PID 2216 wrote to memory of 2276 2216 taskeng.exe 38 PID 2216 wrote to memory of 2276 2216 taskeng.exe 38 PID 2276 wrote to memory of 1624 2276 zoomint.exe 39 PID 2276 wrote to memory of 1624 2276 zoomint.exe 39 PID 2276 wrote to memory of 1624 2276 zoomint.exe 39 PID 2276 wrote to memory of 1624 2276 zoomint.exe 39 PID 2276 wrote to memory of 1708 2276 zoomint.exe 40 PID 2276 wrote to memory of 1708 2276 zoomint.exe 40 PID 2276 wrote to memory of 1708 2276 zoomint.exe 40 PID 2276 wrote to memory of 1708 2276 zoomint.exe 40 PID 2276 wrote to memory of 1856 2276 zoomint.exe 43 PID 2276 wrote to memory of 1856 2276 zoomint.exe 43 PID 2276 wrote to memory of 1856 2276 zoomint.exe 43 PID 2276 wrote to memory of 1856 2276 zoomint.exe 43 PID 2276 wrote to memory of 1856 2276 zoomint.exe 43 PID 2276 wrote to memory of 1856 2276 zoomint.exe 43 PID 2276 wrote to memory of 1856 2276 zoomint.exe 43 PID 1624 wrote to memory of 1952 1624 cmd.exe 44 PID 1624 wrote to memory of 1952 1624 cmd.exe 44 PID 1624 wrote to memory of 1952 1624 cmd.exe 44 PID 1624 wrote to memory of 1952 1624 cmd.exe 44 PID 2276 wrote to memory of 1856 2276 zoomint.exe 43 PID 2276 wrote to memory of 1856 2276 zoomint.exe 43 PID 2276 wrote to memory of 1856 2276 zoomint.exe 43 PID 2276 wrote to memory of 1856 2276 zoomint.exe 43 PID 2276 wrote to memory of 1856 2276 zoomint.exe 43 PID 2276 wrote to memory of 1856 2276 zoomint.exe 43 PID 2276 wrote to memory of 1856 2276 zoomint.exe 43 PID 2276 wrote to memory of 1856 2276 zoomint.exe 43 PID 2276 wrote to memory of 1856 2276 zoomint.exe 43 PID 2216 wrote to memory of 2664 2216 taskeng.exe 45 PID 2216 wrote to memory of 2664 2216 taskeng.exe 45 PID 2216 wrote to memory of 2664 2216 taskeng.exe 45 PID 2216 wrote to memory of 2664 2216 taskeng.exe 45
Processes
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_e5c85966816a4d1bf0b624712095bce065d7ba277ca7126e8e2d8951222baf4e.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_e5c85966816a4d1bf0b624712095bce065d7ba277ca7126e8e2d8951222baf4e.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2880 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C schtasks /create /sc minute /mo 1 /tn "Nadnasia" /tr "'C:\Users\Admin\AppData\Roaming\zoomint.exe'" /f2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2680 -
C:\Windows\SysWOW64\schtasks.exeschtasks /create /sc minute /mo 1 /tn "Nadnasia" /tr "'C:\Users\Admin\AppData\Roaming\zoomint.exe'" /f3⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:2664
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C copy "C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_e5c85966816a4d1bf0b624712095bce065d7ba277ca7126e8e2d8951222baf4e.exe" "C:\Users\Admin\AppData\Roaming\zoomint.exe"2⤵
- System Location Discovery: System Language Discovery
PID:2708
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2728
-
-
C:\Windows\system32\taskeng.exetaskeng.exe {2DA57D46-6C2C-4145-9527-FFDF3D083CC9} S-1-5-21-2039016743-699959520-214465309-1000:PIDEURYY\Admin:Interactive:[1]1⤵
- Suspicious use of WriteProcessMemory
PID:2216 -
C:\Users\Admin\AppData\Roaming\zoomint.exeC:\Users\Admin\AppData\Roaming\zoomint.exe2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2276 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C schtasks /create /sc minute /mo 1 /tn "Nadnasia" /tr "'C:\Users\Admin\AppData\Roaming\zoomint.exe'" /f3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1624 -
C:\Windows\SysWOW64\schtasks.exeschtasks /create /sc minute /mo 1 /tn "Nadnasia" /tr "'C:\Users\Admin\AppData\Roaming\zoomint.exe'" /f4⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:1952
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C copy "C:\Users\Admin\AppData\Roaming\zoomint.exe" "C:\Users\Admin\AppData\Roaming\zoomint.exe"3⤵
- System Location Discovery: System Language Discovery
PID:1708
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"3⤵
- System Location Discovery: System Language Discovery
PID:1856
-
-
-
C:\Users\Admin\AppData\Roaming\zoomint.exeC:\Users\Admin\AppData\Roaming\zoomint.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2664
-