Behavioral task
behavioral1
Sample
e3cc72844b670b0d7bf02cc4502235f3714ae0dfbc824348d923522d9593438f.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
e3cc72844b670b0d7bf02cc4502235f3714ae0dfbc824348d923522d9593438f.exe
Resource
win10v2004-20241007-en
General
-
Target
JaffaCakes118_ff7516b18c451b948407a993513ebc4910b3ef374f2de2f6ed34a7b593df0beb
-
Size
240KB
-
MD5
4388ddedfa8818ccffe9655b8c023d4f
-
SHA1
5c12b466e2c4070686bbcb02cc6e1ba9028d116e
-
SHA256
ff7516b18c451b948407a993513ebc4910b3ef374f2de2f6ed34a7b593df0beb
-
SHA512
ad855c711c892a2fc7cb5364f5aa2963a2d6737982ed2e141c2ca5e12ce44b75c6bae582ad7d7d5b968e3fbd7383ee5a07d780b3fe1f0f7ea9a51f3418dc6652
-
SSDEEP
6144:BVV1yt6/Wq5u6fMvc6TGVxH0P9kOLZqARwZCMLmFjEC:BVV1ytg7Ivq49lLrRwXyl
Malware Config
Extracted
remcos
3.3.2 Light
RemoteHost
127.0.0.1:2404
-
audio_folder
MicRecords
-
audio_path
%AppData%
-
audio_record_time
5
-
connect_delay
0
-
connect_interval
1
-
copy_file
remcos.exe
-
copy_folder
Remcos
-
delete_file
false
-
hide_file
false
-
hide_keylog_file
false
-
install_flag
false
-
install_path
%AppData%
-
keylog_crypt
false
-
keylog_file
logs.dat
-
keylog_flag
false
-
keylog_folder
remcos
-
keylog_path
%AppData%
-
mouse_option
false
-
mutex
Remcos-N28M4A
-
screenshot_crypt
false
-
screenshot_flag
false
-
screenshot_folder
Screenshots
-
screenshot_path
%AppData%
-
screenshot_time
10
-
startup_value
Remcos
-
take_screenshot_option
false
-
take_screenshot_time
5
-
take_screenshot_title
notepad;solitaire;
Signatures
-
Remcos family
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource unpack001/e3cc72844b670b0d7bf02cc4502235f3714ae0dfbc824348d923522d9593438f
Files
-
JaffaCakes118_ff7516b18c451b948407a993513ebc4910b3ef374f2de2f6ed34a7b593df0beb.zip
Password: infected
-
e3cc72844b670b0d7bf02cc4502235f3714ae0dfbc824348d923522d9593438f.exe windows:5 windows x86 arch:x86
2c65ba54d1bf038eee7780f795a41629
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetProcAddress
VirtualProtect
SetLastError
VirtualFree
VirtualAlloc
GetNativeSystemInfo
HeapAlloc
GetProcessHeap
FreeLibrary
IsBadReadPtr
GetCurrentProcess
GetSystemDirectoryA
GlobalAlloc
GlobalLock
GetCurrentProcessId
GetTickCount
GlobalUnlock
LocalAlloc
GlobalFree
MulDiv
SizeofResource
GetLongPathNameW
RemoveDirectoryW
FindResourceA
OpenProcess
LockResource
LoadResource
LocalFree
GetFileSize
FormatMessageA
GetModuleFileNameA
lstrcpynA
AllocConsole
QueryPerformanceFrequency
QueryPerformanceCounter
Process32FirstW
LeaveCriticalSection
InitializeCriticalSection
DeleteCriticalSection
HeapSize
WriteConsoleW
SetStdHandle
SetEnvironmentVariableW
SetEnvironmentVariableA
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetCommandLineW
GetCommandLineA
GetOEMCP
IsValidCodePage
FindFirstFileExA
ReadConsoleW
EnumSystemLocalesW
GetUserDefaultLCID
IsValidLocale
GetConsoleMode
GetConsoleCP
FlushFileBuffers
GetFileType
HeapReAlloc
GetACP
GetStdHandle
GetModuleHandleExW
MoveFileExW
RtlUnwind
LoadLibraryA
Process32NextW
CreateToolhelp32Snapshot
GetLocaleInfoA
GetModuleHandleA
CreateMutexA
ExitProcess
SetFileAttributesW
DeleteFileA
GetModuleFileNameW
GetLastError
ExpandEnvironmentStringsA
FindNextFileA
FindFirstFileA
FindClose
WaitForSingleObject
MoveFileW
SetFilePointerEx
GetLogicalDriveStringsA
DeleteFileW
GetFileAttributesW
CreateFileW
lstrlenA
GetDriveTypeA
FindNextFileW
GetFileSizeEx
FindFirstFileW
CreateDirectoryW
CreateProcessA
Sleep
PeekNamedPipe
CreatePipe
TerminateProcess
WriteFile
ReadFile
HeapFree
HeapCreate
CreateEventA
GetLocalTime
CreateThread
CloseHandle
SetEvent
CreateEventW
EnterCriticalSection
RaiseException
LoadLibraryExW
GetCPInfo
GetStringTypeW
GetLocaleInfoW
LCMapStringW
CompareStringW
TlsFree
TlsSetValue
TlsGetValue
TlsAlloc
InitializeCriticalSectionAndSpinCount
MultiByteToWideChar
DecodePointer
EncodePointer
WideCharToMultiByte
InitializeSListHead
GetSystemTimeAsFileTime
GetCurrentThreadId
GetStartupInfoW
SetUnhandledExceptionFilter
UnhandledExceptionFilter
IsDebuggerPresent
IsProcessorFeaturePresent
GetModuleHandleW
WaitForSingleObjectEx
ResetEvent
SetEndOfFile
user32
GetWindowTextW
SetForegroundWindow
SetClipboardData
GetClipboardData
EnumWindows
ExitWindowsEx
EmptyClipboard
CloseClipboard
IsWindowVisible
CloseWindow
GetWindowThreadProcessId
SendInput
mouse_event
GetMessageA
GetSystemMetrics
GetIconInfo
SystemParametersInfoW
GetForegroundWindow
GetCursorPos
RegisterClassExA
AppendMenuA
CreatePopupMenu
DefWindowProcA
CreateWindowExA
DispatchMessageA
TranslateMessage
DrawIcon
MessageBoxW
OpenClipboard
ShowWindow
SetWindowTextW
TrackPopupMenu
gdi32
SelectObject
CreateCompatibleDC
StretchBlt
GetDIBits
DeleteDC
DeleteObject
CreateDCA
GetObjectA
CreateCompatibleBitmap
advapi32
RegOpenKeyExW
CryptAcquireContextA
CryptGenRandom
CryptReleaseContext
GetUserNameW
RegEnumKeyExA
QueryServiceStatus
CloseServiceHandle
OpenSCManagerW
OpenSCManagerA
ControlService
StartServiceW
QueryServiceConfigW
ChangeServiceConfigW
OpenServiceW
EnumServicesStatusW
AdjustTokenPrivileges
LookupPrivilegeValueA
OpenProcessToken
RegCreateKeyA
RegCloseKey
RegQueryInfoKeyW
RegQueryValueExA
RegCreateKeyExW
RegEnumKeyExW
RegSetValueExW
RegSetValueExA
RegOpenKeyExA
RegCreateKeyW
RegDeleteValueW
RegEnumValueW
RegQueryValueExW
RegDeleteKeyA
shell32
ShellExecuteW
ShellExecuteExA
Shell_NotifyIconA
ExtractIconA
shlwapi
StrToIntA
PathFileExistsW
PathFileExistsA
winmm
PlaySoundW
mciSendStringA
mciSendStringW
ws2_32
gethostbyname
WSASetLastError
WSAGetLastError
recv
connect
socket
send
WSAStartup
closesocket
htons
htonl
getservbyname
inet_ntoa
ntohs
getservbyport
gethostbyaddr
inet_addr
urlmon
URLOpenBlockingStreamW
URLDownloadToFileW
gdiplus
GdipAlloc
GdipSaveImageToStream
GdiplusStartup
GdipGetImageEncoders
GdipCloneImage
GdipLoadImageFromStream
GdipDisposeImage
GdipFree
GdipGetImageEncodersSize
Sections
.text Size: 294KB - Virtual size: 293KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 88KB - Virtual size: 88KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 3KB - Virtual size: 14KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.tls Size: 512B - Virtual size: 9B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.gfids Size: 1024B - Virtual size: 560B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 19KB - Virtual size: 18KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 12KB - Virtual size: 12KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ