Overview
overview
10Static
static
3JaffaCakes...5f.exe
windows7-x64
10JaffaCakes...5f.exe
windows10-2004-x64
10$APPDATA/c...60.dll
windows7-x64
1$APPDATA/c...60.dll
windows10-2004-x64
1$APPDATA/c...at.dll
windows7-x64
3$APPDATA/c...at.dll
windows10-2004-x64
3$APPDATA/t...60.dll
windows7-x64
1$APPDATA/t...60.dll
windows10-2004-x64
1$APPDATA/t...lc.exe
windows7-x64
3$APPDATA/t...lc.exe
windows10-2004-x64
3$TEMP/GuestRummy.dll
windows7-x64
3$TEMP/GuestRummy.dll
windows10-2004-x64
3$TEMP/_net...mp.dll
windows7-x64
1$TEMP/_net...mp.dll
windows10-2004-x64
1$TEMP/logo...60.dll
windows7-x64
1$TEMP/logo...60.dll
windows10-2004-x64
1$TEMP/logo...ui.dll
windows7-x64
1$TEMP/logo...ui.dll
windows10-2004-x64
1Analysis
-
max time kernel
148s -
max time network
146s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
30-12-2024 18:44
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_38dda5e4059a39cb4d766f65d84e8e02a7189bf50803c719af45403a1ee3c35f.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
JaffaCakes118_38dda5e4059a39cb4d766f65d84e8e02a7189bf50803c719af45403a1ee3c35f.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
$APPDATA/closed/state/msie/76.opends60.dll
Resource
win7-20240903-en
Behavioral task
behavioral4
Sample
$APPDATA/closed/state/msie/76.opends60.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral5
Sample
$APPDATA/closed/state/msie/custsat.dll
Resource
win7-20240903-en
Behavioral task
behavioral6
Sample
$APPDATA/closed/state/msie/custsat.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral7
Sample
$APPDATA/typo3_src/poc/media_center/63.opends60.dll
Resource
win7-20240903-en
Behavioral task
behavioral8
Sample
$APPDATA/typo3_src/poc/media_center/63.opends60.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral9
Sample
$APPDATA/typo3_src/poc/media_center/PermCalc.exe
Resource
win7-20240903-en
Behavioral task
behavioral10
Sample
$APPDATA/typo3_src/poc/media_center/PermCalc.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral11
Sample
$TEMP/GuestRummy.dll
Resource
win7-20241010-en
Behavioral task
behavioral12
Sample
$TEMP/GuestRummy.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral13
Sample
$TEMP/_net/admin.cgi/msddslmp.dll
Resource
win7-20240708-en
Behavioral task
behavioral14
Sample
$TEMP/_net/admin.cgi/msddslmp.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral15
Sample
$TEMP/logout/studio/59.opends60.dll
Resource
win7-20240903-en
Behavioral task
behavioral16
Sample
$TEMP/logout/studio/59.opends60.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral17
Sample
$TEMP/logout/studio/rcxditui.dll
Resource
win7-20240903-en
Behavioral task
behavioral18
Sample
$TEMP/logout/studio/rcxditui.dll
Resource
win10v2004-20241007-en
General
-
Target
JaffaCakes118_38dda5e4059a39cb4d766f65d84e8e02a7189bf50803c719af45403a1ee3c35f.exe
-
Size
959KB
-
MD5
3af10feddd3a827a7c7725fab1b97745
-
SHA1
c34daf7dea4deb87305cb2a7d3147da38f77091b
-
SHA256
38dda5e4059a39cb4d766f65d84e8e02a7189bf50803c719af45403a1ee3c35f
-
SHA512
c616ae06060fbfff228f294fb690fbb20af2f1230d592e1a3a020b084034d637cb7393c823d05e10c2eacabd06ab3ca4746953c4a77649693894b0d522396611
-
SSDEEP
24576:8HmHBVbcOmTnszrGeTMFTgm227Zaz5r2pXFWyEL:2QI9yrGIMFTI2JLq
Malware Config
Extracted
remcos
2.5.1 Pro
zzzzzzzzzzzzZZZZZZZZZZZZNUEVAMENTE
dominoduck2095.duckdns.org:9597
-
audio_folder
MicRecords
-
audio_path
%AppData%
-
audio_record_time
5
-
connect_delay
0
-
connect_interval
1
-
copy_file
Chrome.exe
-
copy_folder
Chrome
-
delete_file
false
-
hide_file
false
-
hide_keylog_file
false
-
install_flag
false
-
install_path
%AppData%
-
keylog_crypt
false
-
keylog_file
logs.dat
-
keylog_flag
false
-
keylog_folder
system
-
keylog_path
%AppData%
-
mouse_option
false
-
mutex
Remcos-NUTDL6
-
screenshot_crypt
false
-
screenshot_flag
false
-
screenshot_folder
Screenshots
-
screenshot_path
%AppData%
-
screenshot_time
10
-
startup_value
remcos
-
take_screenshot_option
false
-
take_screenshot_time
5
-
take_screenshot_title
wikipedia;solitaire;
Signatures
-
Remcos family
-
Blocklisted process makes network request 6 IoCs
flow pid Process 3 2512 cmd.exe 6 2512 cmd.exe 7 2512 cmd.exe 9 2512 cmd.exe 10 2512 cmd.exe 11 2512 cmd.exe -
Loads dropped DLL 1 IoCs
pid Process 2752 rundll32.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\Windows\Tasks\esentutl.job cmd.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_38dda5e4059a39cb4d766f65d84e8e02a7189bf50803c719af45403a1ee3c35f.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2752 rundll32.exe 2752 rundll32.exe -
Suspicious behavior: MapViewOfSection 2 IoCs
pid Process 2752 rundll32.exe 2752 rundll32.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2512 cmd.exe -
Suspicious use of WriteProcessMemory 57 IoCs
description pid Process procid_target PID 2200 wrote to memory of 2752 2200 JaffaCakes118_38dda5e4059a39cb4d766f65d84e8e02a7189bf50803c719af45403a1ee3c35f.exe 30 PID 2200 wrote to memory of 2752 2200 JaffaCakes118_38dda5e4059a39cb4d766f65d84e8e02a7189bf50803c719af45403a1ee3c35f.exe 30 PID 2200 wrote to memory of 2752 2200 JaffaCakes118_38dda5e4059a39cb4d766f65d84e8e02a7189bf50803c719af45403a1ee3c35f.exe 30 PID 2200 wrote to memory of 2752 2200 JaffaCakes118_38dda5e4059a39cb4d766f65d84e8e02a7189bf50803c719af45403a1ee3c35f.exe 30 PID 2200 wrote to memory of 2752 2200 JaffaCakes118_38dda5e4059a39cb4d766f65d84e8e02a7189bf50803c719af45403a1ee3c35f.exe 30 PID 2200 wrote to memory of 2752 2200 JaffaCakes118_38dda5e4059a39cb4d766f65d84e8e02a7189bf50803c719af45403a1ee3c35f.exe 30 PID 2200 wrote to memory of 2752 2200 JaffaCakes118_38dda5e4059a39cb4d766f65d84e8e02a7189bf50803c719af45403a1ee3c35f.exe 30 PID 2752 wrote to memory of 2792 2752 rundll32.exe 31 PID 2752 wrote to memory of 2792 2752 rundll32.exe 31 PID 2752 wrote to memory of 2792 2752 rundll32.exe 31 PID 2752 wrote to memory of 2792 2752 rundll32.exe 31 PID 2752 wrote to memory of 2792 2752 rundll32.exe 31 PID 2752 wrote to memory of 2792 2752 rundll32.exe 31 PID 2752 wrote to memory of 2792 2752 rundll32.exe 31 PID 2752 wrote to memory of 2792 2752 rundll32.exe 31 PID 2752 wrote to memory of 2792 2752 rundll32.exe 31 PID 2752 wrote to memory of 2792 2752 rundll32.exe 31 PID 2752 wrote to memory of 2512 2752 rundll32.exe 32 PID 2752 wrote to memory of 2512 2752 rundll32.exe 32 PID 2752 wrote to memory of 2512 2752 rundll32.exe 32 PID 2752 wrote to memory of 2512 2752 rundll32.exe 32 PID 2752 wrote to memory of 2512 2752 rundll32.exe 32 PID 2752 wrote to memory of 2512 2752 rundll32.exe 32 PID 2752 wrote to memory of 2512 2752 rundll32.exe 32 PID 2752 wrote to memory of 2512 2752 rundll32.exe 32 PID 2752 wrote to memory of 2512 2752 rundll32.exe 32 PID 2752 wrote to memory of 2512 2752 rundll32.exe 32 PID 2752 wrote to memory of 2512 2752 rundll32.exe 32 PID 2752 wrote to memory of 2512 2752 rundll32.exe 32 PID 2752 wrote to memory of 2512 2752 rundll32.exe 32 PID 2752 wrote to memory of 2512 2752 rundll32.exe 32 PID 2752 wrote to memory of 2512 2752 rundll32.exe 32 PID 2752 wrote to memory of 2512 2752 rundll32.exe 32 PID 2752 wrote to memory of 2512 2752 rundll32.exe 32 PID 2752 wrote to memory of 2512 2752 rundll32.exe 32 PID 2752 wrote to memory of 2512 2752 rundll32.exe 32 PID 2752 wrote to memory of 2512 2752 rundll32.exe 32 PID 2752 wrote to memory of 2512 2752 rundll32.exe 32 PID 2752 wrote to memory of 2512 2752 rundll32.exe 32 PID 2752 wrote to memory of 2512 2752 rundll32.exe 32 PID 2752 wrote to memory of 2512 2752 rundll32.exe 32 PID 2752 wrote to memory of 2512 2752 rundll32.exe 32 PID 2752 wrote to memory of 2512 2752 rundll32.exe 32 PID 2752 wrote to memory of 2512 2752 rundll32.exe 32 PID 2752 wrote to memory of 2512 2752 rundll32.exe 32 PID 2752 wrote to memory of 2512 2752 rundll32.exe 32 PID 2752 wrote to memory of 2512 2752 rundll32.exe 32 PID 2752 wrote to memory of 2512 2752 rundll32.exe 32 PID 2752 wrote to memory of 2512 2752 rundll32.exe 32 PID 2752 wrote to memory of 2512 2752 rundll32.exe 32 PID 2752 wrote to memory of 2512 2752 rundll32.exe 32 PID 2752 wrote to memory of 2512 2752 rundll32.exe 32 PID 2752 wrote to memory of 2512 2752 rundll32.exe 32 PID 2752 wrote to memory of 2512 2752 rundll32.exe 32 PID 2752 wrote to memory of 2512 2752 rundll32.exe 32 PID 2752 wrote to memory of 2512 2752 rundll32.exe 32 PID 2752 wrote to memory of 2512 2752 rundll32.exe 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_38dda5e4059a39cb4d766f65d84e8e02a7189bf50803c719af45403a1ee3c35f.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_38dda5e4059a39cb4d766f65d84e8e02a7189bf50803c719af45403a1ee3c35f.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2200 -
C:\Windows\SysWOW64\rundll32.exeC:\Windows\system32\rundll32.exe GuestRummy,Michelle2⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:2752 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe"3⤵PID:2792
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe"3⤵
- Blocklisted process makes network request
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2512
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
19KB
MD5fc2b4128dbe4d1885b5f3297b8d77e3d
SHA1239043c06a87fd038f242a240d64996acd7de8b9
SHA25695965a6f6a610d3cd68ab6f2eabdb2fb23c29db258761ea8b547c754fe11ce4e
SHA512a477136f2ebf89257197d86cd35b050e7fd0ad8cce97f3d532ac9749ddb9e4dfc9bce365543ab812b80a182f10f631bddb322bb9a89e745cb75a7116e2061f84
-
Filesize
858KB
MD5d939d6020b0253004cf75fe77ec938be
SHA14e01426b8d1e95d95de93ffbce6d17ad9f68a3d5
SHA2566a245cf81218561625e171252d8f66d712aa9c7f3181540a0d2eb7d50d1c2b86
SHA512c7ad2cca81c67804e46ebfda9170f3a3a63e1487b4143fbdb1ea56b439f7b809ab6b82bb4cd3ba16152326cdd6445f0254f055dfbfe5f6d55c9bb781b931ab40
-
Filesize
74B
MD5efad3e672bd64f471f7c643c3c1374a3
SHA16c81277e486caa2655d146cf7f45daf5e77e69b4
SHA25684eb9bf38942d6fde885a1d13342ccee616d7d91d09fcea2541df555d84449e4
SHA512bba23c7115ed4fe8e2052ad9499a1531021bea02aa01df88ef34faa07da60f7f7f8a10bedcd24349de675b2ffd5ce38666000172b1c6db4cb55cf42b5c6770dd