Analysis
-
max time kernel
149s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
06-01-2025 05:33
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_114ca984bed5235729c17eec5a64fbe1.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
JaffaCakes118_114ca984bed5235729c17eec5a64fbe1.exe
Resource
win10v2004-20241007-en
General
-
Target
JaffaCakes118_114ca984bed5235729c17eec5a64fbe1.exe
-
Size
744KB
-
MD5
114ca984bed5235729c17eec5a64fbe1
-
SHA1
66eff1922a7167868b079da344ff979773081ff2
-
SHA256
63e83b892e02c8d7ae37f28156813ab3257e10c4e8ca10d58d0c18ed5482c72b
-
SHA512
b1a1b9dba3c7d8dde7c79478e1c89bd21e16ada1c4e341aff4274d5dba2a9abbb6345a53fe521c1bf074bbdbdaca7ad07a60ce63b52ead64563eac1eb61f2992
-
SSDEEP
12288:DYBcfZmzZKngr7bec9HFnpzLMI0/Te1PJSWQ7fzSVlQgchASBJu:DYBm04ndwVure1PJPKfmE3NBJ
Malware Config
Extracted
remcos
3.2.1 Pro
Grace_2021
jamaru1444.myftp.biz:2019
-
audio_folder
MicRecords
-
audio_path
%AppData%
-
audio_record_time
5
-
connect_delay
0
-
connect_interval
1
-
copy_file
win32.exe
-
delete_file
false
-
hide_file
true
-
hide_keylog_file
true
-
install_flag
true
-
install_path
%AppData%
-
keylog_crypt
false
-
keylog_file
logs.dat
-
keylog_flag
false
-
keylog_path
%AppData%
-
mouse_option
false
-
mutex
Remcos-NLZOMN
-
screenshot_crypt
false
-
screenshot_flag
false
-
screenshot_folder
Screenshots
-
screenshot_path
%AppData%
-
screenshot_time
10
-
startup_value
win
-
take_screenshot_option
false
-
take_screenshot_time
5
-
take_screenshot_title
wikipedia;solitaire;
Signatures
-
Remcos family
-
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Control Panel\International\Geo\Nation JaffaCakes118_114ca984bed5235729c17eec5a64fbe1.exe Key value queried \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Control Panel\International\Geo\Nation WScript.exe -
Executes dropped EXE 2 IoCs
pid Process 1624 win32.exe 2740 win32.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\win = "\"C:\\Users\\Admin\\AppData\\Roaming\\win32.exe\"" win32.exe Set value (str) \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\win = "\"C:\\Users\\Admin\\AppData\\Roaming\\win32.exe\"" JaffaCakes118_114ca984bed5235729c17eec5a64fbe1.exe -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 916 set thread context of 1612 916 JaffaCakes118_114ca984bed5235729c17eec5a64fbe1.exe 91 PID 1624 set thread context of 2740 1624 win32.exe 96 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 6 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language win32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language win32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_114ca984bed5235729c17eec5a64fbe1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_114ca984bed5235729c17eec5a64fbe1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WScript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000_Classes\Local Settings JaffaCakes118_114ca984bed5235729c17eec5a64fbe1.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2740 win32.exe -
Suspicious use of WriteProcessMemory 33 IoCs
description pid Process procid_target PID 916 wrote to memory of 1612 916 JaffaCakes118_114ca984bed5235729c17eec5a64fbe1.exe 91 PID 916 wrote to memory of 1612 916 JaffaCakes118_114ca984bed5235729c17eec5a64fbe1.exe 91 PID 916 wrote to memory of 1612 916 JaffaCakes118_114ca984bed5235729c17eec5a64fbe1.exe 91 PID 916 wrote to memory of 1612 916 JaffaCakes118_114ca984bed5235729c17eec5a64fbe1.exe 91 PID 916 wrote to memory of 1612 916 JaffaCakes118_114ca984bed5235729c17eec5a64fbe1.exe 91 PID 916 wrote to memory of 1612 916 JaffaCakes118_114ca984bed5235729c17eec5a64fbe1.exe 91 PID 916 wrote to memory of 1612 916 JaffaCakes118_114ca984bed5235729c17eec5a64fbe1.exe 91 PID 916 wrote to memory of 1612 916 JaffaCakes118_114ca984bed5235729c17eec5a64fbe1.exe 91 PID 916 wrote to memory of 1612 916 JaffaCakes118_114ca984bed5235729c17eec5a64fbe1.exe 91 PID 916 wrote to memory of 1612 916 JaffaCakes118_114ca984bed5235729c17eec5a64fbe1.exe 91 PID 916 wrote to memory of 1612 916 JaffaCakes118_114ca984bed5235729c17eec5a64fbe1.exe 91 PID 916 wrote to memory of 1612 916 JaffaCakes118_114ca984bed5235729c17eec5a64fbe1.exe 91 PID 1612 wrote to memory of 1584 1612 JaffaCakes118_114ca984bed5235729c17eec5a64fbe1.exe 92 PID 1612 wrote to memory of 1584 1612 JaffaCakes118_114ca984bed5235729c17eec5a64fbe1.exe 92 PID 1612 wrote to memory of 1584 1612 JaffaCakes118_114ca984bed5235729c17eec5a64fbe1.exe 92 PID 1584 wrote to memory of 5052 1584 WScript.exe 93 PID 1584 wrote to memory of 5052 1584 WScript.exe 93 PID 1584 wrote to memory of 5052 1584 WScript.exe 93 PID 5052 wrote to memory of 1624 5052 cmd.exe 95 PID 5052 wrote to memory of 1624 5052 cmd.exe 95 PID 5052 wrote to memory of 1624 5052 cmd.exe 95 PID 1624 wrote to memory of 2740 1624 win32.exe 96 PID 1624 wrote to memory of 2740 1624 win32.exe 96 PID 1624 wrote to memory of 2740 1624 win32.exe 96 PID 1624 wrote to memory of 2740 1624 win32.exe 96 PID 1624 wrote to memory of 2740 1624 win32.exe 96 PID 1624 wrote to memory of 2740 1624 win32.exe 96 PID 1624 wrote to memory of 2740 1624 win32.exe 96 PID 1624 wrote to memory of 2740 1624 win32.exe 96 PID 1624 wrote to memory of 2740 1624 win32.exe 96 PID 1624 wrote to memory of 2740 1624 win32.exe 96 PID 1624 wrote to memory of 2740 1624 win32.exe 96 PID 1624 wrote to memory of 2740 1624 win32.exe 96
Processes
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_114ca984bed5235729c17eec5a64fbe1.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_114ca984bed5235729c17eec5a64fbe1.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:916 -
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_114ca984bed5235729c17eec5a64fbe1.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_114ca984bed5235729c17eec5a64fbe1.exe"2⤵
- Checks computer location settings
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1612 -
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\install.vbs"3⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1584 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c "C:\Users\Admin\AppData\Roaming\win32.exe"4⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:5052 -
C:\Users\Admin\AppData\Roaming\win32.exeC:\Users\Admin\AppData\Roaming\win32.exe5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1624 -
C:\Users\Admin\AppData\Roaming\win32.exe"C:\Users\Admin\AppData\Roaming\win32.exe"6⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2740
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
402B
MD50023c43bc14320440f81eb67a28e9e99
SHA149ac6fcc2550105a92c6ba7a1194e09bafc00ca3
SHA2565403135310d071b0f43b3b153a3aa636d29d3cf7ccfc2a66550f18e10aa6da21
SHA5125781f081ca10e112af8402de496c87978f06295620a0331f9226bf6f0637da0aacaf952fe1a3e7d1c9dbcfc0a5a578c22267533b7e5fa4a3ba0b6cc5dc3492bf
-
Filesize
148B
MD521a79acc9dd83f8222a08229d64f0b34
SHA1ac708a14c24fe235e67007d3e443182cf5f58421
SHA2566770caf7a0d01ddff6250dbd7257090d12c323115b530435538d216648313136
SHA51200c87528a168c0245b6aecc8bb1a24b7f6ccad8007db98ad2e060812b8ab27a8e37b13e4fc46aff4149b258c28fcf91f988f940db664cb7a7bfcf9645ce2a252
-
Filesize
744KB
MD5114ca984bed5235729c17eec5a64fbe1
SHA166eff1922a7167868b079da344ff979773081ff2
SHA25663e83b892e02c8d7ae37f28156813ab3257e10c4e8ca10d58d0c18ed5482c72b
SHA512b1a1b9dba3c7d8dde7c79478e1c89bd21e16ada1c4e341aff4274d5dba2a9abbb6345a53fe521c1bf074bbdbdaca7ad07a60ce63b52ead64563eac1eb61f2992