Analysis
-
max time kernel
150s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
08-01-2025 12:54
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_a0747b376c17728fe2731e9e98d1b017.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
JaffaCakes118_a0747b376c17728fe2731e9e98d1b017.exe
Resource
win10v2004-20241007-en
General
-
Target
JaffaCakes118_a0747b376c17728fe2731e9e98d1b017.exe
-
Size
1.3MB
-
MD5
a0747b376c17728fe2731e9e98d1b017
-
SHA1
7917d0e5d6adfb0690455afdafbe81db00cfc41b
-
SHA256
870130235c0034bb2649c4268bfc3ff87de0fe2cf13d0af41ce0c0f397e5ea50
-
SHA512
58b934b044ce00910e8abf5c12b1bd25aeb9e5cd458740967e5d538ea13f0cb871595658e13da2acbf2dc3e3d94848ccd79cf64dca74b25d9a8c0d4337318585
-
SSDEEP
24576:rAOcZEhGZJLnKjCT+8RrtqrpUu8sR0coTvAiHca6TPY5I7nT1RMwa+NI:tMZU/SrtqrpccOv/HP6c5IzTXM7+NI
Malware Config
Extracted
remcos
OCTOBER-$$$$
mgc0147.hopto.org:2930
-
audio_folder
MicRecords
-
audio_path
%AppData%
-
audio_record_time
5
-
connect_delay
0
-
connect_interval
1
-
copy_file
remcos.exe
-
copy_folder
Remcos
-
delete_file
false
-
hide_file
false
-
hide_keylog_file
false
-
install_flag
false
-
install_path
%AppData%
-
keylog_crypt
false
-
keylog_file
logs.dat
-
keylog_flag
false
-
keylog_folder
remcos
-
keylog_path
%AppData%
-
mouse_option
false
-
mutex
Remcos-3MPDYA
-
screenshot_crypt
false
-
screenshot_flag
false
-
screenshot_folder
Screenshots
-
screenshot_path
%AppData%
-
screenshot_time
10
-
startup_value
Remcos
-
take_screenshot_option
false
-
take_screenshot_time
5
-
take_screenshot_title
notepad;solitaire;
Signatures
-
Remcos family
-
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Control Panel\International\Geo\Nation JaffaCakes118_a0747b376c17728fe2731e9e98d1b017.exe Key value queried \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Control Panel\International\Geo\Nation bmxbniuglo.pif -
Executes dropped EXE 2 IoCs
pid Process 904 bmxbniuglo.pif 4236 RegSvcs.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\WindowsUpdate = "c:\\45235440\\BMXBNI~1.PIF c:\\45235440\\JIFVHS~1.TCL" bmxbniuglo.pif -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 904 set thread context of 4236 904 bmxbniuglo.pif 108 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 10 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mshta.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mshta.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_a0747b376c17728fe2731e9e98d1b017.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language bmxbniuglo.pif Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mshta.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mshta.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mshta.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mshta.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mshta.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RegSvcs.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 904 bmxbniuglo.pif 904 bmxbniuglo.pif -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 4236 RegSvcs.exe -
Suspicious use of WriteProcessMemory 29 IoCs
description pid Process procid_target PID 4680 wrote to memory of 904 4680 JaffaCakes118_a0747b376c17728fe2731e9e98d1b017.exe 83 PID 4680 wrote to memory of 904 4680 JaffaCakes118_a0747b376c17728fe2731e9e98d1b017.exe 83 PID 4680 wrote to memory of 904 4680 JaffaCakes118_a0747b376c17728fe2731e9e98d1b017.exe 83 PID 904 wrote to memory of 1628 904 bmxbniuglo.pif 86 PID 904 wrote to memory of 1628 904 bmxbniuglo.pif 86 PID 904 wrote to memory of 1628 904 bmxbniuglo.pif 86 PID 904 wrote to memory of 4112 904 bmxbniuglo.pif 87 PID 904 wrote to memory of 4112 904 bmxbniuglo.pif 87 PID 904 wrote to memory of 4112 904 bmxbniuglo.pif 87 PID 904 wrote to memory of 4124 904 bmxbniuglo.pif 90 PID 904 wrote to memory of 4124 904 bmxbniuglo.pif 90 PID 904 wrote to memory of 4124 904 bmxbniuglo.pif 90 PID 904 wrote to memory of 344 904 bmxbniuglo.pif 97 PID 904 wrote to memory of 344 904 bmxbniuglo.pif 97 PID 904 wrote to memory of 344 904 bmxbniuglo.pif 97 PID 904 wrote to memory of 3836 904 bmxbniuglo.pif 102 PID 904 wrote to memory of 3836 904 bmxbniuglo.pif 102 PID 904 wrote to memory of 3836 904 bmxbniuglo.pif 102 PID 904 wrote to memory of 3464 904 bmxbniuglo.pif 105 PID 904 wrote to memory of 3464 904 bmxbniuglo.pif 105 PID 904 wrote to memory of 3464 904 bmxbniuglo.pif 105 PID 904 wrote to memory of 2716 904 bmxbniuglo.pif 107 PID 904 wrote to memory of 2716 904 bmxbniuglo.pif 107 PID 904 wrote to memory of 2716 904 bmxbniuglo.pif 107 PID 904 wrote to memory of 4236 904 bmxbniuglo.pif 108 PID 904 wrote to memory of 4236 904 bmxbniuglo.pif 108 PID 904 wrote to memory of 4236 904 bmxbniuglo.pif 108 PID 904 wrote to memory of 4236 904 bmxbniuglo.pif 108 PID 904 wrote to memory of 4236 904 bmxbniuglo.pif 108
Processes
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_a0747b376c17728fe2731e9e98d1b017.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_a0747b376c17728fe2731e9e98d1b017.exe"1⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4680 -
C:\45235440\bmxbniuglo.pif"C:\45235440\bmxbniuglo.pif" jifvhstup.tcl2⤵
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:904 -
C:\Windows\SysWOW64\mshta.exe"C:\Windows\SysWOW64\mshta.exe"3⤵
- System Location Discovery: System Language Discovery
PID:1628
-
-
C:\Windows\SysWOW64\mshta.exe"C:\Windows\SysWOW64\mshta.exe"3⤵
- System Location Discovery: System Language Discovery
PID:4112
-
-
C:\Windows\SysWOW64\mshta.exe"C:\Windows\SysWOW64\mshta.exe"3⤵
- System Location Discovery: System Language Discovery
PID:4124
-
-
C:\Windows\SysWOW64\mshta.exe"C:\Windows\SysWOW64\mshta.exe"3⤵
- System Location Discovery: System Language Discovery
PID:344
-
-
C:\Windows\SysWOW64\mshta.exe"C:\Windows\SysWOW64\mshta.exe"3⤵
- System Location Discovery: System Language Discovery
PID:3836
-
-
C:\Windows\SysWOW64\mshta.exe"C:\Windows\SysWOW64\mshta.exe"3⤵
- System Location Discovery: System Language Discovery
PID:3464
-
-
C:\Windows\SysWOW64\mshta.exe"C:\Windows\SysWOW64\mshta.exe"3⤵
- System Location Discovery: System Language Discovery
PID:2716
-
-
C:\Users\Admin\AppData\Local\Temp\RegSvcs.exe"C:\Users\Admin\AppData\Local\Temp\RegSvcs.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:4236
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
759KB
MD58e699954f6b5d64683412cc560938507
SHA18ca6708b0f158eacce3ac28b23c23ed42c168c29
SHA256c9a2399cc1ce6f71db9da2f16e6c025bf6cb0f4345b427f21449cf927d627a40
SHA51213035106149c8d336189b4a6bdaf25e10ac0b027baea963b3ec66a815a572426b2e9485258447cf1362802a0f03a2aa257b276057590663161d9d55d5b737b02
-
Filesize
56KB
MD58b670b655cf5bdbec4e8bf031a5c303a
SHA1446d41c4e7a03d7e21261b52bc42a499e78697e8
SHA25658ffca8fbe9fe189e29909b12d8306af25dcea9b98af76167905d3f7d27555f1
SHA512d95918f4a5fd2649298b1218d4e62e8339d59eda01a47708c2934bbec6d7f0e16f68a8abc27c178dfe117c73a4e36083d1ca58e106900bde945179b1440fcffc
-
Filesize
919KB
MD503371574057f34d8f0cd8b857234477e
SHA1fabea7c051eb26d402e42be3279c24b51243172e
SHA2561093ea8b90ac829a7ca7058f5e7aafb74012a331090e52c3f2e7229a70895f08
SHA51282b25daf3662746f1d009c2ee2bc1f01715389d5545d883f3c795a8557d5796711f49840fbb5728081fd22203e961a82225f70a75ee7c2d29d1664c68f0f6f54
-
Filesize
44KB
MD59d352bc46709f0cb5ec974633a0c3c94
SHA11969771b2f022f9a86d77ac4d4d239becdf08d07
SHA2562c1eeb7097023c784c2bd040a2005a5070ed6f3a4abf13929377a9e39fab1390
SHA51213c714244ec56beeb202279e4109d59c2a43c3cf29f90a374a751c04fd472b45228ca5a0178f41109ed863dbd34e0879e4a21f5e38ae3d89559c57e6be990a9b
-
Filesize
148B
MD5fef831a2d274b87d032b1bebeeae6dfa
SHA1a98d14ccad604d5f2a398033594fd67de47ba60f
SHA256cdf51e2bbdb2f3d510633407356e87e784a88ccd31a479df11a201dbb03358ae
SHA512fd4fe722967d798911845c572c4470b8c2c494979d86e88275b431ccfad8d0158642c85b4bf617fbc0296e5f3ffde8ddf75dbeab5ae1cdd6e18b984f7186675a