Analysis

  • max time kernel
    148s
  • max time network
    153s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240412-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240412-enlocale:en-usos:windows10-2004-x64system
  • submitted
    15/04/2024, 07:57

General

  • Target

    f09de775370cf787b5227e237871af72_JaffaCakes118.exe

  • Size

    867KB

  • MD5

    f09de775370cf787b5227e237871af72

  • SHA1

    763cda7015d4a16bfe8ee522eab102b3fcb7de8c

  • SHA256

    a7ff4ec634c66ccea10417e86dfce613e278029b6f11f5ec25f14611561f6b03

  • SHA512

    8cef6fadcafb44b4c479e952d58238b5ce4d1d879696757271456fcdd18fddfaaeaaef2878ee829d5338fd2f9c59c0e8e63a2fdf3ce7470687e2f6117bfd81b9

  • SSDEEP

    24576:Lc8SjVYKV0omqByAMnuQEf+7p3jletEKDx0B7zM:Lct5dFMnllUt2W

Malware Config

Signatures

  • Ardamax

    A keylogger first seen in 2013.

  • Ardamax main executable 1 IoCs
  • Checks computer location settings 2 TTPs 2 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 5 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Drops file in System32 directory 9 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Program crash 1 IoCs
  • Modifies registry class 35 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of SetWindowsHookEx 5 IoCs
  • Suspicious use of WriteProcessMemory 9 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\f09de775370cf787b5227e237871af72_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\f09de775370cf787b5227e237871af72_JaffaCakes118.exe"
    1⤵
    • Checks computer location settings
    • Loads dropped DLL
    • Drops file in System32 directory
    • Suspicious use of WriteProcessMemory
    PID:2980
    • C:\Windows\SysWOW64\28463\BTKY.exe
      "C:\Windows\system32\28463\BTKY.exe"
      2⤵
      • Checks computer location settings
      • Executes dropped EXE
      • Loads dropped DLL
      • Adds Run key to start application
      • Drops file in System32 directory
      • Modifies registry class
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:892
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 892 -s 884
        3⤵
        • Loads dropped DLL
        • Program crash
        PID:1288
      • C:\Windows\SysWOW64\cmd.exe
        "C:\Windows\system32\cmd.exe" /c del C:\Windows\SysWOW64\28463\BTKY.exe > nul
        3⤵
          PID:2152
      • C:\Users\Admin\AppData\Local\Temp\380_love.exe
        "C:\Users\Admin\AppData\Local\Temp\380_love.exe"
        2⤵
        • Executes dropped EXE
        PID:1168
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -pss -s 452 -p 892 -ip 892
      1⤵
        PID:1028

      Network

      MITRE ATT&CK Enterprise v15

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Local\Temp\380_love.exe

        Filesize

        94KB

        MD5

        d74dae91a831db717e0c3331d790e7d7

        SHA1

        e9541c210eab80dd2d4d971f41133cd84c60045d

        SHA256

        ffab65bd548117dc76b8f85aedf069014224c9b7191a23e956191ab60f4cf413

        SHA512

        6e31eac13a36f5f24001939404f502a189e856c27bee8dbb301bbefa4d2c1540bc6901db59253751d9d875d6d7dc42898b9fe3777fad95aff80aa595c0d170ed

      • C:\Users\Admin\AppData\Local\Temp\@5CB6.tmp

        Filesize

        4KB

        MD5

        f1cf9fcbddeadabb738de497ffefdced

        SHA1

        7385a7c87e245da89cc5ef8f9295678c1566f25d

        SHA256

        086083bc73b14286f9c3c29df8b8dc6f014d8b084267fbaeee0af56344d1f779

        SHA512

        3a3b9d279b4c131ef3f358e0163f60ec9e60160a2cc45488adb915fea6642f3df5d35da2ccb6983d790401d237fbc808829f42c42ef958e7a0eac98fc33bb3f6

      • C:\Windows\SysWOW64\28463\AKV.exe

        Filesize

        457KB

        MD5

        d2366486acd1a1e7512b0024ea3c7bdb

        SHA1

        c9a4948a2902c899fbc8f51755a745b220f26265

        SHA256

        7142651f09fa4a93574850904e21ac8c99dd4e4aff728e2ba68188a459f53461

        SHA512

        50c77906a2175ab488198e2d240d6d8178a189369fc93ff5099e59e1114f8ac1b5496e639d128a60626403b2303a60c51d6f8abae886d90ec2eef03617eeabd5

      • C:\Windows\SysWOW64\28463\BTKY.001

        Filesize

        386B

        MD5

        2b948a1b6c9589b02c2a9a52e24932b4

        SHA1

        155d5840c5724af6ed469b483c5ad2407f79050d

        SHA256

        bf795c23784d0e958cf5205a00c059956f31985a31e212c4bb019f9a9e33c604

        SHA512

        801a990347c48a5a798f18ff5bb682d98894e897e3faac4764bb9fc1dfd11c7be9c3db9b23f9fa3ca16e253af93fe3dd5bb5585429d7f160acc0929d7a2b513b

      • C:\Windows\SysWOW64\28463\BTKY.006

        Filesize

        8KB

        MD5

        31854a50b294dd312eb7fa9eb1c99537

        SHA1

        e0b1682a001e15d0e0e1c1ca732cafb5c80b3160

        SHA256

        2fe2d55aae2deef38a37c9679d74ecf05699d6919760794f69583b43b7fe308c

        SHA512

        0482a4981ba242d4e931bd8b9eb5d606492cffb7609fb69fb349ed19c7a9e36a7e240e5ebe759505d253c5e72fb771612a76419c36fb035987a166569a5111c2

      • C:\Windows\SysWOW64\28463\BTKY.007

        Filesize

        5KB

        MD5

        603451f504bedb28c3a7bae4c89abf24

        SHA1

        cbfe12186b54663f60663c349739c7a49950c44e

        SHA256

        e4d6577ea390274308877284b6d0cd6672aeb0e76c9c9847ac59c0964f050d13

        SHA512

        136e28e288b3ce26b37c82b078a3440e3232c0f874d7d33e8e6fb6eadfd0024b9009448500c716523b81f142fa3bebf7d11f1dd3e8e6143867b06335eb5f9612

      • C:\Windows\SysWOW64\28463\BTKY.exe

        Filesize

        648KB

        MD5

        ce568bcaf7285124f764aff92f5079d4

        SHA1

        886f698e2239cf615f12b503853a5fa28c53aefc

        SHA256

        59d7d6de8a9e2d5535703d22c36888889530fd011d7f71cf034e93e36e7527af

        SHA512

        9f6e3496930cb5dd9c9403acc865bc94f63f64af49a27ffeedbc9d9082d50bff4a7a772bb98d4a2719f0ecae144393de9cc273ba83ae00abe347b0be0d7c9866

      • C:\Windows\SysWOW64\28463\key.bin

        Filesize

        105B

        MD5

        27c90d4d9b049f4cd00f32ed1d2e5baf

        SHA1

        338a3ea8f1e929d8916ece9b6e91e697eb562550

        SHA256

        172d6f21165fb3ca925e5b000451fd8946920206f7438018c28b158b90cf5ffb

        SHA512

        d73dadb3cf74c647ce5bad5b87d3fb42a212defcba8afb8cf962020b61a0369c0a2b1005797583daf1f1ae88b29b7288bc544a53d643f3519cf604aa0ffd6dae

      • memory/892-61-0x00000000033D0000-0x00000000033D1000-memory.dmp

        Filesize

        4KB

      • memory/892-75-0x0000000003490000-0x0000000003491000-memory.dmp

        Filesize

        4KB

      • memory/892-31-0x0000000000B10000-0x0000000000B11000-memory.dmp

        Filesize

        4KB

      • memory/892-34-0x0000000002420000-0x0000000002421000-memory.dmp

        Filesize

        4KB

      • memory/892-33-0x0000000002400000-0x0000000002401000-memory.dmp

        Filesize

        4KB

      • memory/892-32-0x0000000002410000-0x0000000002411000-memory.dmp

        Filesize

        4KB

      • memory/892-49-0x00000000006B0000-0x00000000006B1000-memory.dmp

        Filesize

        4KB

      • memory/892-36-0x0000000000AF0000-0x0000000000AF1000-memory.dmp

        Filesize

        4KB

      • memory/892-37-0x0000000003220000-0x0000000003221000-memory.dmp

        Filesize

        4KB

      • memory/892-72-0x0000000003470000-0x0000000003471000-memory.dmp

        Filesize

        4KB

      • memory/892-39-0x0000000003260000-0x0000000003261000-memory.dmp

        Filesize

        4KB

      • memory/892-40-0x0000000003260000-0x0000000003261000-memory.dmp

        Filesize

        4KB

      • memory/892-42-0x0000000003260000-0x0000000003261000-memory.dmp

        Filesize

        4KB

      • memory/892-43-0x0000000003280000-0x0000000003281000-memory.dmp

        Filesize

        4KB

      • memory/892-41-0x0000000003260000-0x0000000003261000-memory.dmp

        Filesize

        4KB

      • memory/892-44-0x0000000003260000-0x0000000003261000-memory.dmp

        Filesize

        4KB

      • memory/892-47-0x0000000002430000-0x0000000002431000-memory.dmp

        Filesize

        4KB

      • memory/892-46-0x0000000000AD0000-0x0000000000AD1000-memory.dmp

        Filesize

        4KB

      • memory/892-45-0x0000000003260000-0x0000000003261000-memory.dmp

        Filesize

        4KB

      • memory/892-48-0x0000000000650000-0x0000000000651000-memory.dmp

        Filesize

        4KB

      • memory/892-54-0x0000000003230000-0x0000000003231000-memory.dmp

        Filesize

        4KB

      • memory/892-56-0x00000000024E0000-0x00000000024E1000-memory.dmp

        Filesize

        4KB

      • memory/892-55-0x0000000002590000-0x0000000002591000-memory.dmp

        Filesize

        4KB

      • memory/892-58-0x00000000033C0000-0x00000000033C1000-memory.dmp

        Filesize

        4KB

      • memory/892-65-0x0000000003410000-0x0000000003411000-memory.dmp

        Filesize

        4KB

      • memory/892-66-0x0000000003440000-0x0000000003441000-memory.dmp

        Filesize

        4KB

      • memory/892-67-0x0000000003430000-0x0000000003431000-memory.dmp

        Filesize

        4KB

      • memory/892-64-0x0000000003420000-0x0000000003421000-memory.dmp

        Filesize

        4KB

      • memory/892-63-0x00000000033F0000-0x00000000033F1000-memory.dmp

        Filesize

        4KB

      • memory/892-62-0x0000000003400000-0x0000000003401000-memory.dmp

        Filesize

        4KB

      • memory/892-19-0x0000000000400000-0x00000000004DF000-memory.dmp

        Filesize

        892KB

      • memory/892-60-0x00000000033E0000-0x00000000033E1000-memory.dmp

        Filesize

        4KB

      • memory/892-59-0x00000000033B0000-0x00000000033B1000-memory.dmp

        Filesize

        4KB

      • memory/892-57-0x0000000002640000-0x0000000002641000-memory.dmp

        Filesize

        4KB

      • memory/892-35-0x00000000023E0000-0x00000000023E1000-memory.dmp

        Filesize

        4KB

      • memory/892-30-0x00000000009E0000-0x0000000000A3A000-memory.dmp

        Filesize

        360KB

      • memory/892-38-0x0000000003210000-0x0000000003213000-memory.dmp

        Filesize

        12KB

      • memory/892-70-0x0000000003480000-0x0000000003481000-memory.dmp

        Filesize

        4KB

      • memory/892-69-0x0000000003450000-0x0000000003451000-memory.dmp

        Filesize

        4KB

      • memory/892-73-0x00000000034A0000-0x00000000034A1000-memory.dmp

        Filesize

        4KB

      • memory/892-68-0x0000000003460000-0x0000000003461000-memory.dmp

        Filesize

        4KB

      • memory/892-77-0x00000000034C0000-0x00000000034C1000-memory.dmp

        Filesize

        4KB

      • memory/892-80-0x00000000034E0000-0x00000000034E1000-memory.dmp

        Filesize

        4KB

      • memory/892-79-0x0000000003270000-0x0000000003271000-memory.dmp

        Filesize

        4KB

      • memory/892-81-0x00000000034D0000-0x00000000034D1000-memory.dmp

        Filesize

        4KB

      • memory/892-82-0x0000000003500000-0x0000000003501000-memory.dmp

        Filesize

        4KB

      • memory/892-78-0x00000000034B0000-0x00000000034B1000-memory.dmp

        Filesize

        4KB

      • memory/892-83-0x00000000034F0000-0x00000000034F1000-memory.dmp

        Filesize

        4KB

      • memory/892-86-0x0000000003530000-0x0000000003531000-memory.dmp

        Filesize

        4KB

      • memory/892-85-0x0000000003540000-0x0000000003541000-memory.dmp

        Filesize

        4KB

      • memory/892-84-0x0000000003510000-0x0000000003511000-memory.dmp

        Filesize

        4KB

      • memory/892-89-0x0000000003580000-0x0000000003581000-memory.dmp

        Filesize

        4KB

      • memory/892-88-0x00000000038E0000-0x00000000038E1000-memory.dmp

        Filesize

        4KB

      • memory/892-87-0x0000000003560000-0x0000000003561000-memory.dmp

        Filesize

        4KB

      • memory/892-91-0x0000000003900000-0x0000000003901000-memory.dmp

        Filesize

        4KB

      • memory/892-90-0x0000000003910000-0x0000000003911000-memory.dmp

        Filesize

        4KB

      • memory/892-96-0x0000000003970000-0x0000000003971000-memory.dmp

        Filesize

        4KB

      • memory/892-95-0x0000000003940000-0x0000000003941000-memory.dmp

        Filesize

        4KB

      • memory/892-94-0x0000000003950000-0x0000000003951000-memory.dmp

        Filesize

        4KB

      • memory/892-93-0x0000000003920000-0x0000000003921000-memory.dmp

        Filesize

        4KB

      • memory/892-92-0x0000000003930000-0x0000000003931000-memory.dmp

        Filesize

        4KB

      • memory/892-98-0x00000000038F0000-0x00000000038F1000-memory.dmp

        Filesize

        4KB

      • memory/892-97-0x0000000003960000-0x0000000003961000-memory.dmp

        Filesize

        4KB

      • memory/892-99-0x0000000003AC0000-0x0000000003AC1000-memory.dmp

        Filesize

        4KB

      • memory/892-115-0x0000000000400000-0x00000000004DF000-memory.dmp

        Filesize

        892KB

      • memory/892-149-0x0000000000400000-0x00000000004DF000-memory.dmp

        Filesize

        892KB

      • memory/892-138-0x0000000000400000-0x00000000004DF000-memory.dmp

        Filesize

        892KB

      • memory/1168-120-0x0000000000400000-0x0000000000422000-memory.dmp

        Filesize

        136KB

      • memory/1168-119-0x0000000000400000-0x0000000000422000-memory.dmp

        Filesize

        136KB

      • memory/1168-116-0x0000000000400000-0x0000000000422000-memory.dmp

        Filesize

        136KB