Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
26-12-2024 22:13
Behavioral task
behavioral1
Sample
JaffaCakes118_88b5e8bf2561c9e5843c182357079e8f65a51f0de66f11e2e8f489789f822d12.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
JaffaCakes118_88b5e8bf2561c9e5843c182357079e8f65a51f0de66f11e2e8f489789f822d12.exe
Resource
win10v2004-20241007-en
General
-
Target
JaffaCakes118_88b5e8bf2561c9e5843c182357079e8f65a51f0de66f11e2e8f489789f822d12.exe
-
Size
124KB
-
MD5
8b62975c6ddaa41bae24ce12cede46c5
-
SHA1
fb182a7d0975fe1509ff69caa0f21a2574bb6258
-
SHA256
88b5e8bf2561c9e5843c182357079e8f65a51f0de66f11e2e8f489789f822d12
-
SHA512
e980d7784fac9a5d16ee84930cbc12aa524d774c2bbcd11e2ede8fa5a52232cc98652df842e770c585bc225401c52512e34c1482a8437357e6e224391db5d1ac
-
SSDEEP
3072:mlh1qaSs6IF9OK4b80S2Van4Va1cpcQjed5OzqhUra:Ch1qn3IF9Obbj/a1cpcQjeHOzqhUr
Malware Config
Extracted
remcos
2.5.0 Pro
RemoteHost
91.193.75.145:1604
-
audio_folder
MicRecords
-
audio_path
%AppData%
-
audio_record_time
5
-
connect_delay
0
-
connect_interval
1
-
copy_file
firefox1.exe
-
copy_folder
firefox
-
delete_file
true
-
hide_file
false
-
hide_keylog_file
false
-
install_flag
true
-
install_path
%AppData%
-
keylog_crypt
false
-
keylog_file
logs9.dat
-
keylog_flag
false
-
keylog_folder
remcos
-
keylog_path
%AppData%
-
mouse_option
false
-
mutex
Remcos-IVNP1E
-
screenshot_crypt
false
-
screenshot_flag
false
-
screenshot_folder
Screenshots
-
screenshot_path
%AppData%
-
screenshot_time
10
-
startup_value
firefox
-
take_screenshot_option
false
-
take_screenshot_time
5
-
take_screenshot_title
wikipedia;solitaire;
Signatures
-
Modifies WinLogon for persistence 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Userinit = "C:\\WINDOWS\\system32\\userinit.exe, \"C:\\Users\\Admin\\AppData\\Roaming\\firefox\\firefox1.exe\"" JaffaCakes118_88b5e8bf2561c9e5843c182357079e8f65a51f0de66f11e2e8f489789f822d12.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Userinit = "C:\\WINDOWS\\system32\\userinit.exe, \"C:\\Users\\Admin\\AppData\\Roaming\\firefox\\firefox1.exe\"" firefox1.exe -
Remcos family
-
Deletes itself 1 IoCs
pid Process 2352 WScript.exe -
Executes dropped EXE 1 IoCs
pid Process 2636 firefox1.exe -
Loads dropped DLL 2 IoCs
pid Process 2252 cmd.exe 2252 cmd.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Windows\CurrentVersion\Run\firefox = "\"C:\\Users\\Admin\\AppData\\Roaming\\firefox\\firefox1.exe\"" JaffaCakes118_88b5e8bf2561c9e5843c182357079e8f65a51f0de66f11e2e8f489789f822d12.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Windows\CurrentVersion\Run\firefox = "\"C:\\Users\\Admin\\AppData\\Roaming\\firefox\\firefox1.exe\"" firefox1.exe -
Modifies WinLogon 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\ JaffaCakes118_88b5e8bf2561c9e5843c182357079e8f65a51f0de66f11e2e8f489789f822d12.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\ firefox1.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_88b5e8bf2561c9e5843c182357079e8f65a51f0de66f11e2e8f489789f822d12.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WScript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language firefox1.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2636 firefox1.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 856 wrote to memory of 2352 856 JaffaCakes118_88b5e8bf2561c9e5843c182357079e8f65a51f0de66f11e2e8f489789f822d12.exe 31 PID 856 wrote to memory of 2352 856 JaffaCakes118_88b5e8bf2561c9e5843c182357079e8f65a51f0de66f11e2e8f489789f822d12.exe 31 PID 856 wrote to memory of 2352 856 JaffaCakes118_88b5e8bf2561c9e5843c182357079e8f65a51f0de66f11e2e8f489789f822d12.exe 31 PID 856 wrote to memory of 2352 856 JaffaCakes118_88b5e8bf2561c9e5843c182357079e8f65a51f0de66f11e2e8f489789f822d12.exe 31 PID 2352 wrote to memory of 2252 2352 WScript.exe 32 PID 2352 wrote to memory of 2252 2352 WScript.exe 32 PID 2352 wrote to memory of 2252 2352 WScript.exe 32 PID 2352 wrote to memory of 2252 2352 WScript.exe 32 PID 2252 wrote to memory of 2636 2252 cmd.exe 34 PID 2252 wrote to memory of 2636 2252 cmd.exe 34 PID 2252 wrote to memory of 2636 2252 cmd.exe 34 PID 2252 wrote to memory of 2636 2252 cmd.exe 34
Processes
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_88b5e8bf2561c9e5843c182357079e8f65a51f0de66f11e2e8f489789f822d12.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_88b5e8bf2561c9e5843c182357079e8f65a51f0de66f11e2e8f489789f822d12.exe"1⤵
- Modifies WinLogon for persistence
- Adds Run key to start application
- Modifies WinLogon
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:856 -
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\install.vbs"2⤵
- Deletes itself
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2352 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c "C:\Users\Admin\AppData\Roaming\firefox\firefox1.exe"3⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2252 -
C:\Users\Admin\AppData\Roaming\firefox\firefox1.exeC:\Users\Admin\AppData\Roaming\firefox\firefox1.exe4⤵
- Modifies WinLogon for persistence
- Executes dropped EXE
- Adds Run key to start application
- Modifies WinLogon
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2636
-
-
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
3Registry Run Keys / Startup Folder
1Winlogon Helper DLL
2Privilege Escalation
Boot or Logon Autostart Execution
3Registry Run Keys / Startup Folder
1Winlogon Helper DLL
2Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
692B
MD5a86b6d7e80c9b3568ea72832ff512e8a
SHA19956983e499222955b86255747034251f4e63ed5
SHA2561bce219a4bfa0ba3a2564a8e0b0dd3a176429d3f536119e2aa8264a2365925b8
SHA51299a445ec335844ccc0d2c2a47d56f6bc4c7b2e0368adff62c34233f08e31e881726f1e4c300b4e7c4cde9a3ba81e1cf9f973c580a1b0f9beae5af00fa3e0e1e5
-
Filesize
74B
MD5cd0fa20d07b89344ec85e2a6ef1446a7
SHA1400ec45b3b99dcbc9a8186aff03e532be24fa27d
SHA256f47c3eedef22de7cb942800ff578a17e1f25cff2ce63a61366306080aba5dad7
SHA512c53216cbaf2a0d64118f1d98f289586796ffdf58cc03be6870d862d2dc55552cc3a301e7fc01dfbd3358ad41bfb0042aa252b7b191425c04d1be4f217b95e352
-
Filesize
124KB
MD58b62975c6ddaa41bae24ce12cede46c5
SHA1fb182a7d0975fe1509ff69caa0f21a2574bb6258
SHA25688b5e8bf2561c9e5843c182357079e8f65a51f0de66f11e2e8f489789f822d12
SHA512e980d7784fac9a5d16ee84930cbc12aa524d774c2bbcd11e2ede8fa5a52232cc98652df842e770c585bc225401c52512e34c1482a8437357e6e224391db5d1ac