Overview
overview
10Static
static
3JaffaCakes...5f.exe
windows7-x64
10JaffaCakes...5f.exe
windows10-2004-x64
10$APPDATA/c...60.dll
windows7-x64
1$APPDATA/c...60.dll
windows10-2004-x64
1$APPDATA/c...at.dll
windows7-x64
3$APPDATA/c...at.dll
windows10-2004-x64
3$APPDATA/t...60.dll
windows7-x64
1$APPDATA/t...60.dll
windows10-2004-x64
1$APPDATA/t...lc.exe
windows7-x64
3$APPDATA/t...lc.exe
windows10-2004-x64
3$TEMP/GuestRummy.dll
windows7-x64
3$TEMP/GuestRummy.dll
windows10-2004-x64
3$TEMP/_net...mp.dll
windows7-x64
1$TEMP/_net...mp.dll
windows10-2004-x64
1$TEMP/logo...60.dll
windows7-x64
1$TEMP/logo...60.dll
windows10-2004-x64
1$TEMP/logo...ui.dll
windows7-x64
1$TEMP/logo...ui.dll
windows10-2004-x64
1Analysis
-
max time kernel
149s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
30-12-2024 18:44
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_38dda5e4059a39cb4d766f65d84e8e02a7189bf50803c719af45403a1ee3c35f.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
JaffaCakes118_38dda5e4059a39cb4d766f65d84e8e02a7189bf50803c719af45403a1ee3c35f.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
$APPDATA/closed/state/msie/76.opends60.dll
Resource
win7-20240903-en
Behavioral task
behavioral4
Sample
$APPDATA/closed/state/msie/76.opends60.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral5
Sample
$APPDATA/closed/state/msie/custsat.dll
Resource
win7-20240903-en
Behavioral task
behavioral6
Sample
$APPDATA/closed/state/msie/custsat.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral7
Sample
$APPDATA/typo3_src/poc/media_center/63.opends60.dll
Resource
win7-20240903-en
Behavioral task
behavioral8
Sample
$APPDATA/typo3_src/poc/media_center/63.opends60.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral9
Sample
$APPDATA/typo3_src/poc/media_center/PermCalc.exe
Resource
win7-20240903-en
Behavioral task
behavioral10
Sample
$APPDATA/typo3_src/poc/media_center/PermCalc.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral11
Sample
$TEMP/GuestRummy.dll
Resource
win7-20241010-en
Behavioral task
behavioral12
Sample
$TEMP/GuestRummy.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral13
Sample
$TEMP/_net/admin.cgi/msddslmp.dll
Resource
win7-20240708-en
Behavioral task
behavioral14
Sample
$TEMP/_net/admin.cgi/msddslmp.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral15
Sample
$TEMP/logout/studio/59.opends60.dll
Resource
win7-20240903-en
Behavioral task
behavioral16
Sample
$TEMP/logout/studio/59.opends60.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral17
Sample
$TEMP/logout/studio/rcxditui.dll
Resource
win7-20240903-en
Behavioral task
behavioral18
Sample
$TEMP/logout/studio/rcxditui.dll
Resource
win10v2004-20241007-en
General
-
Target
JaffaCakes118_38dda5e4059a39cb4d766f65d84e8e02a7189bf50803c719af45403a1ee3c35f.exe
-
Size
959KB
-
MD5
3af10feddd3a827a7c7725fab1b97745
-
SHA1
c34daf7dea4deb87305cb2a7d3147da38f77091b
-
SHA256
38dda5e4059a39cb4d766f65d84e8e02a7189bf50803c719af45403a1ee3c35f
-
SHA512
c616ae06060fbfff228f294fb690fbb20af2f1230d592e1a3a020b084034d637cb7393c823d05e10c2eacabd06ab3ca4746953c4a77649693894b0d522396611
-
SSDEEP
24576:8HmHBVbcOmTnszrGeTMFTgm227Zaz5r2pXFWyEL:2QI9yrGIMFTI2JLq
Malware Config
Extracted
remcos
2.5.1 Pro
zzzzzzzzzzzzZZZZZZZZZZZZNUEVAMENTE
dominoduck2095.duckdns.org:9597
-
audio_folder
MicRecords
-
audio_path
%AppData%
-
audio_record_time
5
-
connect_delay
0
-
connect_interval
1
-
copy_file
Chrome.exe
-
copy_folder
Chrome
-
delete_file
false
-
hide_file
false
-
hide_keylog_file
false
-
install_flag
false
-
install_path
%AppData%
-
keylog_crypt
false
-
keylog_file
logs.dat
-
keylog_flag
false
-
keylog_folder
system
-
keylog_path
%AppData%
-
mouse_option
false
-
mutex
Remcos-NUTDL6
-
screenshot_crypt
false
-
screenshot_flag
false
-
screenshot_folder
Screenshots
-
screenshot_path
%AppData%
-
screenshot_time
10
-
startup_value
remcos
-
take_screenshot_option
false
-
take_screenshot_time
5
-
take_screenshot_title
wikipedia;solitaire;
Signatures
-
Remcos family
-
Blocklisted process makes network request 6 IoCs
flow pid Process 40 3908 cmd.exe 41 3908 cmd.exe 45 3908 cmd.exe 51 3908 cmd.exe 52 3908 cmd.exe 53 3908 cmd.exe -
Loads dropped DLL 1 IoCs
pid Process 4112 rundll32.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\Windows\Tasks\esentutl.job cmd.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_38dda5e4059a39cb4d766f65d84e8e02a7189bf50803c719af45403a1ee3c35f.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 4112 rundll32.exe 4112 rundll32.exe -
Suspicious behavior: MapViewOfSection 2 IoCs
pid Process 4112 rundll32.exe 4112 rundll32.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 3908 cmd.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2420 wrote to memory of 4112 2420 JaffaCakes118_38dda5e4059a39cb4d766f65d84e8e02a7189bf50803c719af45403a1ee3c35f.exe 83 PID 2420 wrote to memory of 4112 2420 JaffaCakes118_38dda5e4059a39cb4d766f65d84e8e02a7189bf50803c719af45403a1ee3c35f.exe 83 PID 2420 wrote to memory of 4112 2420 JaffaCakes118_38dda5e4059a39cb4d766f65d84e8e02a7189bf50803c719af45403a1ee3c35f.exe 83 PID 4112 wrote to memory of 1444 4112 rundll32.exe 84 PID 4112 wrote to memory of 1444 4112 rundll32.exe 84 PID 4112 wrote to memory of 1444 4112 rundll32.exe 84 PID 4112 wrote to memory of 1444 4112 rundll32.exe 84 PID 4112 wrote to memory of 1444 4112 rundll32.exe 84 PID 4112 wrote to memory of 1444 4112 rundll32.exe 84 PID 4112 wrote to memory of 1444 4112 rundll32.exe 84 PID 4112 wrote to memory of 1444 4112 rundll32.exe 84 PID 4112 wrote to memory of 1444 4112 rundll32.exe 84 PID 4112 wrote to memory of 3908 4112 rundll32.exe 85 PID 4112 wrote to memory of 3908 4112 rundll32.exe 85 PID 4112 wrote to memory of 3908 4112 rundll32.exe 85 PID 4112 wrote to memory of 3908 4112 rundll32.exe 85 PID 4112 wrote to memory of 3908 4112 rundll32.exe 85 PID 4112 wrote to memory of 3908 4112 rundll32.exe 85 PID 4112 wrote to memory of 3908 4112 rundll32.exe 85 PID 4112 wrote to memory of 3908 4112 rundll32.exe 85 PID 4112 wrote to memory of 3908 4112 rundll32.exe 85 PID 4112 wrote to memory of 3908 4112 rundll32.exe 85 PID 4112 wrote to memory of 3908 4112 rundll32.exe 85 PID 4112 wrote to memory of 3908 4112 rundll32.exe 85 PID 4112 wrote to memory of 3908 4112 rundll32.exe 85 PID 4112 wrote to memory of 3908 4112 rundll32.exe 85 PID 4112 wrote to memory of 3908 4112 rundll32.exe 85 PID 4112 wrote to memory of 3908 4112 rundll32.exe 85 PID 4112 wrote to memory of 3908 4112 rundll32.exe 85 PID 4112 wrote to memory of 3908 4112 rundll32.exe 85 PID 4112 wrote to memory of 3908 4112 rundll32.exe 85 PID 4112 wrote to memory of 3908 4112 rundll32.exe 85 PID 4112 wrote to memory of 3908 4112 rundll32.exe 85 PID 4112 wrote to memory of 3908 4112 rundll32.exe 85 PID 4112 wrote to memory of 3908 4112 rundll32.exe 85 PID 4112 wrote to memory of 3908 4112 rundll32.exe 85 PID 4112 wrote to memory of 3908 4112 rundll32.exe 85 PID 4112 wrote to memory of 3908 4112 rundll32.exe 85 PID 4112 wrote to memory of 3908 4112 rundll32.exe 85 PID 4112 wrote to memory of 3908 4112 rundll32.exe 85 PID 4112 wrote to memory of 3908 4112 rundll32.exe 85 PID 4112 wrote to memory of 3908 4112 rundll32.exe 85 PID 4112 wrote to memory of 3908 4112 rundll32.exe 85 PID 4112 wrote to memory of 3908 4112 rundll32.exe 85 PID 4112 wrote to memory of 3908 4112 rundll32.exe 85 PID 4112 wrote to memory of 3908 4112 rundll32.exe 85 PID 4112 wrote to memory of 3908 4112 rundll32.exe 85 PID 4112 wrote to memory of 3908 4112 rundll32.exe 85 PID 4112 wrote to memory of 3908 4112 rundll32.exe 85 PID 4112 wrote to memory of 3908 4112 rundll32.exe 85 PID 4112 wrote to memory of 3908 4112 rundll32.exe 85 PID 4112 wrote to memory of 3908 4112 rundll32.exe 85 PID 4112 wrote to memory of 3908 4112 rundll32.exe 85 PID 4112 wrote to memory of 3908 4112 rundll32.exe 85 PID 4112 wrote to memory of 3908 4112 rundll32.exe 85 PID 4112 wrote to memory of 3908 4112 rundll32.exe 85 PID 4112 wrote to memory of 3908 4112 rundll32.exe 85 PID 4112 wrote to memory of 3908 4112 rundll32.exe 85 PID 4112 wrote to memory of 3908 4112 rundll32.exe 85 PID 4112 wrote to memory of 3908 4112 rundll32.exe 85 PID 4112 wrote to memory of 3908 4112 rundll32.exe 85 PID 4112 wrote to memory of 3908 4112 rundll32.exe 85 PID 4112 wrote to memory of 3908 4112 rundll32.exe 85 PID 4112 wrote to memory of 3908 4112 rundll32.exe 85
Processes
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_38dda5e4059a39cb4d766f65d84e8e02a7189bf50803c719af45403a1ee3c35f.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_38dda5e4059a39cb4d766f65d84e8e02a7189bf50803c719af45403a1ee3c35f.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2420 -
C:\Windows\SysWOW64\rundll32.exeC:\Windows\system32\rundll32.exe GuestRummy,Michelle2⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:4112 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe"3⤵PID:1444
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe"3⤵
- Blocklisted process makes network request
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:3908
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
19KB
MD5fc2b4128dbe4d1885b5f3297b8d77e3d
SHA1239043c06a87fd038f242a240d64996acd7de8b9
SHA25695965a6f6a610d3cd68ab6f2eabdb2fb23c29db258761ea8b547c754fe11ce4e
SHA512a477136f2ebf89257197d86cd35b050e7fd0ad8cce97f3d532ac9749ddb9e4dfc9bce365543ab812b80a182f10f631bddb322bb9a89e745cb75a7116e2061f84
-
Filesize
858KB
MD5d939d6020b0253004cf75fe77ec938be
SHA14e01426b8d1e95d95de93ffbce6d17ad9f68a3d5
SHA2566a245cf81218561625e171252d8f66d712aa9c7f3181540a0d2eb7d50d1c2b86
SHA512c7ad2cca81c67804e46ebfda9170f3a3a63e1487b4143fbdb1ea56b439f7b809ab6b82bb4cd3ba16152326cdd6445f0254f055dfbfe5f6d55c9bb781b931ab40
-
Filesize
74B
MD5f714b2dbcfea441d3410742ec40526bf
SHA13f7c932f74b81b9bdc43cb92697af42d690e714e
SHA2565e92c1a322a4664f11b7436e4472055315885268363efabdc3edb63082eda7e0
SHA512cbcde42806494cf89670a2decfc8e2a893d1917102f2de50860e38844ea349dde66cb0c41e86b36da27ff7d268877eb2e15eb90ec3a2288eac54068460eca1e8