Analysis
-
max time kernel
150s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
06-01-2025 05:33
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_114ca984bed5235729c17eec5a64fbe1.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
JaffaCakes118_114ca984bed5235729c17eec5a64fbe1.exe
Resource
win10v2004-20241007-en
General
-
Target
JaffaCakes118_114ca984bed5235729c17eec5a64fbe1.exe
-
Size
744KB
-
MD5
114ca984bed5235729c17eec5a64fbe1
-
SHA1
66eff1922a7167868b079da344ff979773081ff2
-
SHA256
63e83b892e02c8d7ae37f28156813ab3257e10c4e8ca10d58d0c18ed5482c72b
-
SHA512
b1a1b9dba3c7d8dde7c79478e1c89bd21e16ada1c4e341aff4274d5dba2a9abbb6345a53fe521c1bf074bbdbdaca7ad07a60ce63b52ead64563eac1eb61f2992
-
SSDEEP
12288:DYBcfZmzZKngr7bec9HFnpzLMI0/Te1PJSWQ7fzSVlQgchASBJu:DYBm04ndwVure1PJPKfmE3NBJ
Malware Config
Extracted
remcos
3.2.1 Pro
Grace_2021
jamaru1444.myftp.biz:2019
-
audio_folder
MicRecords
-
audio_path
%AppData%
-
audio_record_time
5
-
connect_delay
0
-
connect_interval
1
-
copy_file
win32.exe
-
delete_file
false
-
hide_file
true
-
hide_keylog_file
true
-
install_flag
true
-
install_path
%AppData%
-
keylog_crypt
false
-
keylog_file
logs.dat
-
keylog_flag
false
-
keylog_path
%AppData%
-
mouse_option
false
-
mutex
Remcos-NLZOMN
-
screenshot_crypt
false
-
screenshot_flag
false
-
screenshot_folder
Screenshots
-
screenshot_path
%AppData%
-
screenshot_time
10
-
startup_value
win
-
take_screenshot_option
false
-
take_screenshot_time
5
-
take_screenshot_title
wikipedia;solitaire;
Signatures
-
Remcos family
-
Executes dropped EXE 2 IoCs
pid Process 2196 win32.exe 2436 win32.exe -
Loads dropped DLL 1 IoCs
pid Process 2596 cmd.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Windows\CurrentVersion\Run\win = "\"C:\\Users\\Admin\\AppData\\Roaming\\win32.exe\"" win32.exe Set value (str) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Windows\CurrentVersion\Run\win = "\"C:\\Users\\Admin\\AppData\\Roaming\\win32.exe\"" JaffaCakes118_114ca984bed5235729c17eec5a64fbe1.exe -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 352 set thread context of 2660 352 JaffaCakes118_114ca984bed5235729c17eec5a64fbe1.exe 31 PID 2196 set thread context of 2436 2196 win32.exe 36 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 6 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language win32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language win32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_114ca984bed5235729c17eec5a64fbe1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_114ca984bed5235729c17eec5a64fbe1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WScript.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2436 win32.exe -
Suspicious use of WriteProcessMemory 38 IoCs
description pid Process procid_target PID 352 wrote to memory of 2660 352 JaffaCakes118_114ca984bed5235729c17eec5a64fbe1.exe 31 PID 352 wrote to memory of 2660 352 JaffaCakes118_114ca984bed5235729c17eec5a64fbe1.exe 31 PID 352 wrote to memory of 2660 352 JaffaCakes118_114ca984bed5235729c17eec5a64fbe1.exe 31 PID 352 wrote to memory of 2660 352 JaffaCakes118_114ca984bed5235729c17eec5a64fbe1.exe 31 PID 352 wrote to memory of 2660 352 JaffaCakes118_114ca984bed5235729c17eec5a64fbe1.exe 31 PID 352 wrote to memory of 2660 352 JaffaCakes118_114ca984bed5235729c17eec5a64fbe1.exe 31 PID 352 wrote to memory of 2660 352 JaffaCakes118_114ca984bed5235729c17eec5a64fbe1.exe 31 PID 352 wrote to memory of 2660 352 JaffaCakes118_114ca984bed5235729c17eec5a64fbe1.exe 31 PID 352 wrote to memory of 2660 352 JaffaCakes118_114ca984bed5235729c17eec5a64fbe1.exe 31 PID 352 wrote to memory of 2660 352 JaffaCakes118_114ca984bed5235729c17eec5a64fbe1.exe 31 PID 352 wrote to memory of 2660 352 JaffaCakes118_114ca984bed5235729c17eec5a64fbe1.exe 31 PID 352 wrote to memory of 2660 352 JaffaCakes118_114ca984bed5235729c17eec5a64fbe1.exe 31 PID 352 wrote to memory of 2660 352 JaffaCakes118_114ca984bed5235729c17eec5a64fbe1.exe 31 PID 2660 wrote to memory of 1972 2660 JaffaCakes118_114ca984bed5235729c17eec5a64fbe1.exe 32 PID 2660 wrote to memory of 1972 2660 JaffaCakes118_114ca984bed5235729c17eec5a64fbe1.exe 32 PID 2660 wrote to memory of 1972 2660 JaffaCakes118_114ca984bed5235729c17eec5a64fbe1.exe 32 PID 2660 wrote to memory of 1972 2660 JaffaCakes118_114ca984bed5235729c17eec5a64fbe1.exe 32 PID 1972 wrote to memory of 2596 1972 WScript.exe 33 PID 1972 wrote to memory of 2596 1972 WScript.exe 33 PID 1972 wrote to memory of 2596 1972 WScript.exe 33 PID 1972 wrote to memory of 2596 1972 WScript.exe 33 PID 2596 wrote to memory of 2196 2596 cmd.exe 35 PID 2596 wrote to memory of 2196 2596 cmd.exe 35 PID 2596 wrote to memory of 2196 2596 cmd.exe 35 PID 2596 wrote to memory of 2196 2596 cmd.exe 35 PID 2196 wrote to memory of 2436 2196 win32.exe 36 PID 2196 wrote to memory of 2436 2196 win32.exe 36 PID 2196 wrote to memory of 2436 2196 win32.exe 36 PID 2196 wrote to memory of 2436 2196 win32.exe 36 PID 2196 wrote to memory of 2436 2196 win32.exe 36 PID 2196 wrote to memory of 2436 2196 win32.exe 36 PID 2196 wrote to memory of 2436 2196 win32.exe 36 PID 2196 wrote to memory of 2436 2196 win32.exe 36 PID 2196 wrote to memory of 2436 2196 win32.exe 36 PID 2196 wrote to memory of 2436 2196 win32.exe 36 PID 2196 wrote to memory of 2436 2196 win32.exe 36 PID 2196 wrote to memory of 2436 2196 win32.exe 36 PID 2196 wrote to memory of 2436 2196 win32.exe 36
Processes
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_114ca984bed5235729c17eec5a64fbe1.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_114ca984bed5235729c17eec5a64fbe1.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:352 -
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_114ca984bed5235729c17eec5a64fbe1.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_114ca984bed5235729c17eec5a64fbe1.exe"2⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2660 -
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\install.vbs"3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1972 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c "C:\Users\Admin\AppData\Roaming\win32.exe"4⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2596 -
C:\Users\Admin\AppData\Roaming\win32.exeC:\Users\Admin\AppData\Roaming\win32.exe5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2196 -
C:\Users\Admin\AppData\Roaming\win32.exe"C:\Users\Admin\AppData\Roaming\win32.exe"6⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2436
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
402B
MD50023c43bc14320440f81eb67a28e9e99
SHA149ac6fcc2550105a92c6ba7a1194e09bafc00ca3
SHA2565403135310d071b0f43b3b153a3aa636d29d3cf7ccfc2a66550f18e10aa6da21
SHA5125781f081ca10e112af8402de496c87978f06295620a0331f9226bf6f0637da0aacaf952fe1a3e7d1c9dbcfc0a5a578c22267533b7e5fa4a3ba0b6cc5dc3492bf
-
Filesize
148B
MD5d44de91a5b9efff3abcf047ca1194170
SHA15bfc17bf5470ae459be3a265af1611828701a0f8
SHA25673fc8e32d48de26a06f94d0b05d94efe28879b3402e428cc02dce006a29a197c
SHA512712aaca5b7a0336cbe764598e2096872a645ad7db12b18ff294f1e898843da89a0dcb6f5d39fb12de95a6e075ba1528f89476050eeafcf8fb6bd859f28c31656
-
Filesize
744KB
MD5114ca984bed5235729c17eec5a64fbe1
SHA166eff1922a7167868b079da344ff979773081ff2
SHA25663e83b892e02c8d7ae37f28156813ab3257e10c4e8ca10d58d0c18ed5482c72b
SHA512b1a1b9dba3c7d8dde7c79478e1c89bd21e16ada1c4e341aff4274d5dba2a9abbb6345a53fe521c1bf074bbdbdaca7ad07a60ce63b52ead64563eac1eb61f2992