Analysis
-
max time kernel
149s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
08-01-2025 12:54
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_a0747b376c17728fe2731e9e98d1b017.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
JaffaCakes118_a0747b376c17728fe2731e9e98d1b017.exe
Resource
win10v2004-20241007-en
General
-
Target
JaffaCakes118_a0747b376c17728fe2731e9e98d1b017.exe
-
Size
1.3MB
-
MD5
a0747b376c17728fe2731e9e98d1b017
-
SHA1
7917d0e5d6adfb0690455afdafbe81db00cfc41b
-
SHA256
870130235c0034bb2649c4268bfc3ff87de0fe2cf13d0af41ce0c0f397e5ea50
-
SHA512
58b934b044ce00910e8abf5c12b1bd25aeb9e5cd458740967e5d538ea13f0cb871595658e13da2acbf2dc3e3d94848ccd79cf64dca74b25d9a8c0d4337318585
-
SSDEEP
24576:rAOcZEhGZJLnKjCT+8RrtqrpUu8sR0coTvAiHca6TPY5I7nT1RMwa+NI:tMZU/SrtqrpccOv/HP6c5IzTXM7+NI
Malware Config
Extracted
remcos
3.3.0 Pro
OCTOBER-$$$$
mgc0147.hopto.org:2930
-
audio_folder
MicRecords
-
audio_path
%AppData%
-
audio_record_time
5
-
connect_delay
0
-
connect_interval
1
-
copy_file
remcos.exe
-
copy_folder
Remcos
-
delete_file
false
-
hide_file
false
-
hide_keylog_file
false
-
install_flag
false
-
install_path
%AppData%
-
keylog_crypt
false
-
keylog_file
logs.dat
-
keylog_flag
false
-
keylog_folder
remcos
-
keylog_path
%AppData%
-
mouse_option
false
-
mutex
Remcos-3MPDYA
-
screenshot_crypt
false
-
screenshot_flag
false
-
screenshot_folder
Screenshots
-
screenshot_path
%AppData%
-
screenshot_time
10
-
startup_value
Remcos
-
take_screenshot_option
false
-
take_screenshot_time
5
-
take_screenshot_title
notepad;solitaire;
Signatures
-
Remcos family
-
Executes dropped EXE 2 IoCs
pid Process 2900 bmxbniuglo.pif 2020 RegSvcs.exe -
Loads dropped DLL 5 IoCs
pid Process 2520 JaffaCakes118_a0747b376c17728fe2731e9e98d1b017.exe 2520 JaffaCakes118_a0747b376c17728fe2731e9e98d1b017.exe 2520 JaffaCakes118_a0747b376c17728fe2731e9e98d1b017.exe 2520 JaffaCakes118_a0747b376c17728fe2731e9e98d1b017.exe 2900 bmxbniuglo.pif -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\WindowsUpdate = "c:\\45235440\\BMXBNI~1.PIF c:\\45235440\\JIFVHS~1.TCL" bmxbniuglo.pif -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2900 set thread context of 2020 2900 bmxbniuglo.pif 39 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 9 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mshta.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mshta.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mshta.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mshta.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language bmxbniuglo.pif Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mshta.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mshta.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mshta.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_a0747b376c17728fe2731e9e98d1b017.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 2900 bmxbniuglo.pif -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2020 RegSvcs.exe -
Suspicious use of WriteProcessMemory 41 IoCs
description pid Process procid_target PID 2520 wrote to memory of 2900 2520 JaffaCakes118_a0747b376c17728fe2731e9e98d1b017.exe 30 PID 2520 wrote to memory of 2900 2520 JaffaCakes118_a0747b376c17728fe2731e9e98d1b017.exe 30 PID 2520 wrote to memory of 2900 2520 JaffaCakes118_a0747b376c17728fe2731e9e98d1b017.exe 30 PID 2520 wrote to memory of 2900 2520 JaffaCakes118_a0747b376c17728fe2731e9e98d1b017.exe 30 PID 2900 wrote to memory of 2612 2900 bmxbniuglo.pif 31 PID 2900 wrote to memory of 2612 2900 bmxbniuglo.pif 31 PID 2900 wrote to memory of 2612 2900 bmxbniuglo.pif 31 PID 2900 wrote to memory of 2612 2900 bmxbniuglo.pif 31 PID 2900 wrote to memory of 1532 2900 bmxbniuglo.pif 33 PID 2900 wrote to memory of 1532 2900 bmxbniuglo.pif 33 PID 2900 wrote to memory of 1532 2900 bmxbniuglo.pif 33 PID 2900 wrote to memory of 1532 2900 bmxbniuglo.pif 33 PID 2900 wrote to memory of 1672 2900 bmxbniuglo.pif 34 PID 2900 wrote to memory of 1672 2900 bmxbniuglo.pif 34 PID 2900 wrote to memory of 1672 2900 bmxbniuglo.pif 34 PID 2900 wrote to memory of 1672 2900 bmxbniuglo.pif 34 PID 2900 wrote to memory of 484 2900 bmxbniuglo.pif 35 PID 2900 wrote to memory of 484 2900 bmxbniuglo.pif 35 PID 2900 wrote to memory of 484 2900 bmxbniuglo.pif 35 PID 2900 wrote to memory of 484 2900 bmxbniuglo.pif 35 PID 2900 wrote to memory of 1900 2900 bmxbniuglo.pif 36 PID 2900 wrote to memory of 1900 2900 bmxbniuglo.pif 36 PID 2900 wrote to memory of 1900 2900 bmxbniuglo.pif 36 PID 2900 wrote to memory of 1900 2900 bmxbniuglo.pif 36 PID 2900 wrote to memory of 1980 2900 bmxbniuglo.pif 37 PID 2900 wrote to memory of 1980 2900 bmxbniuglo.pif 37 PID 2900 wrote to memory of 1980 2900 bmxbniuglo.pif 37 PID 2900 wrote to memory of 1980 2900 bmxbniuglo.pif 37 PID 2900 wrote to memory of 2104 2900 bmxbniuglo.pif 38 PID 2900 wrote to memory of 2104 2900 bmxbniuglo.pif 38 PID 2900 wrote to memory of 2104 2900 bmxbniuglo.pif 38 PID 2900 wrote to memory of 2104 2900 bmxbniuglo.pif 38 PID 2900 wrote to memory of 2020 2900 bmxbniuglo.pif 39 PID 2900 wrote to memory of 2020 2900 bmxbniuglo.pif 39 PID 2900 wrote to memory of 2020 2900 bmxbniuglo.pif 39 PID 2900 wrote to memory of 2020 2900 bmxbniuglo.pif 39 PID 2900 wrote to memory of 2020 2900 bmxbniuglo.pif 39 PID 2900 wrote to memory of 2020 2900 bmxbniuglo.pif 39 PID 2900 wrote to memory of 2020 2900 bmxbniuglo.pif 39 PID 2900 wrote to memory of 2020 2900 bmxbniuglo.pif 39 PID 2900 wrote to memory of 2020 2900 bmxbniuglo.pif 39
Processes
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_a0747b376c17728fe2731e9e98d1b017.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_a0747b376c17728fe2731e9e98d1b017.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2520 -
C:\45235440\bmxbniuglo.pif"C:\45235440\bmxbniuglo.pif" jifvhstup.tcl2⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2900 -
C:\Windows\SysWOW64\mshta.exe"C:\Windows\SysWOW64\mshta.exe"3⤵
- System Location Discovery: System Language Discovery
PID:2612
-
-
C:\Windows\SysWOW64\mshta.exe"C:\Windows\SysWOW64\mshta.exe"3⤵
- System Location Discovery: System Language Discovery
PID:1532
-
-
C:\Windows\SysWOW64\mshta.exe"C:\Windows\SysWOW64\mshta.exe"3⤵
- System Location Discovery: System Language Discovery
PID:1672
-
-
C:\Windows\SysWOW64\mshta.exe"C:\Windows\SysWOW64\mshta.exe"3⤵
- System Location Discovery: System Language Discovery
PID:484
-
-
C:\Windows\SysWOW64\mshta.exe"C:\Windows\SysWOW64\mshta.exe"3⤵
- System Location Discovery: System Language Discovery
PID:1900
-
-
C:\Windows\SysWOW64\mshta.exe"C:\Windows\SysWOW64\mshta.exe"3⤵
- System Location Discovery: System Language Discovery
PID:1980
-
-
C:\Windows\SysWOW64\mshta.exe"C:\Windows\SysWOW64\mshta.exe"3⤵
- System Location Discovery: System Language Discovery
PID:2104
-
-
C:\Users\Admin\AppData\Local\Temp\RegSvcs.exe"C:\Users\Admin\AppData\Local\Temp\RegSvcs.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2020
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
56KB
MD58b670b655cf5bdbec4e8bf031a5c303a
SHA1446d41c4e7a03d7e21261b52bc42a499e78697e8
SHA25658ffca8fbe9fe189e29909b12d8306af25dcea9b98af76167905d3f7d27555f1
SHA512d95918f4a5fd2649298b1218d4e62e8339d59eda01a47708c2934bbec6d7f0e16f68a8abc27c178dfe117c73a4e36083d1ca58e106900bde945179b1440fcffc
-
Filesize
919KB
MD503371574057f34d8f0cd8b857234477e
SHA1fabea7c051eb26d402e42be3279c24b51243172e
SHA2561093ea8b90ac829a7ca7058f5e7aafb74012a331090e52c3f2e7229a70895f08
SHA51282b25daf3662746f1d009c2ee2bc1f01715389d5545d883f3c795a8557d5796711f49840fbb5728081fd22203e961a82225f70a75ee7c2d29d1664c68f0f6f54
-
Filesize
148B
MD55a5c5c6588710611f62626cdc787de52
SHA1dab837a43c1087430236c71c22c9e5e18fd2d333
SHA256f8a39d5e64fff35a3938f5bb9edc2c57da349563dc8c70dc9725f4354b4c1085
SHA512b832d2806721863d1f41f11a2b25b68cfda57dc6b3b9f90d63e406f84d23e4fa98c7159bf3d0c959443ef80b7999c3507c90df4413fefbdf9fbcbe8a0b35b7bb
-
Filesize
759KB
MD58e699954f6b5d64683412cc560938507
SHA18ca6708b0f158eacce3ac28b23c23ed42c168c29
SHA256c9a2399cc1ce6f71db9da2f16e6c025bf6cb0f4345b427f21449cf927d627a40
SHA51213035106149c8d336189b4a6bdaf25e10ac0b027baea963b3ec66a815a572426b2e9485258447cf1362802a0f03a2aa257b276057590663161d9d55d5b737b02
-
Filesize
44KB
MD50e06054beb13192588e745ee63a84173
SHA130b7d4d1277bafd04a83779fd566a1f834a8d113
SHA256c5d6d56ded55fbd6c150ee3a0eb2e5671cae83106be2be4d70ce50aa50bab768
SHA512251a112f3f037e62ff67a467389e47a56afb344bc942b17efa9bd2970494718b26bbee9adc3ac35f93ee4d2114aa426b6d0ea4bafad294b6c118a15f1977c215