General

  • Target

    fd117e9054e30aa6722b9207518e5e67_JaffaCakes118

  • Size

    1.8MB

  • Sample

    240420-srxe9aca5x

  • MD5

    fd117e9054e30aa6722b9207518e5e67

  • SHA1

    4c8cb147acaa046ffce44e3eb5bae2054594f960

  • SHA256

    238b0e5bd34df4a6cda3232a5e65da5d2b6291a3ad4838b417043aee2eda1cc8

  • SHA512

    1498287e56bba5320f396060d343cc1da59b598498041d77db0d36768e00f265f805c9fc4a60a58affbfc9aa80489757ce56246b9deb8c92de671a537c3c08df

  • SSDEEP

    49152:J8rMjkA/nHBMz6V8XEa9R9vMjmm0BiPkWps3KxOZEW/o6s:iQjkuS6aXQOBiIsOaW/o6s

Malware Config

Targets

    • Target

      fd117e9054e30aa6722b9207518e5e67_JaffaCakes118

    • Size

      1.8MB

    • MD5

      fd117e9054e30aa6722b9207518e5e67

    • SHA1

      4c8cb147acaa046ffce44e3eb5bae2054594f960

    • SHA256

      238b0e5bd34df4a6cda3232a5e65da5d2b6291a3ad4838b417043aee2eda1cc8

    • SHA512

      1498287e56bba5320f396060d343cc1da59b598498041d77db0d36768e00f265f805c9fc4a60a58affbfc9aa80489757ce56246b9deb8c92de671a537c3c08df

    • SSDEEP

      49152:J8rMjkA/nHBMz6V8XEa9R9vMjmm0BiPkWps3KxOZEW/o6s:iQjkuS6aXQOBiIsOaW/o6s

    • Ardamax

      A keylogger first seen in 2013.

    • Ardamax main executable

    • Executes dropped EXE

    • Loads dropped DLL

    • Themida packer

      Detects Themida, an advanced Windows software protection system.

    • Adds Run key to start application

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Drops file in System32 directory

MITRE ATT&CK Matrix ATT&CK v13

Persistence

Boot or Logon Autostart Execution

1
T1547

Registry Run Keys / Startup Folder

1
T1547.001

Privilege Escalation

Boot or Logon Autostart Execution

1
T1547

Registry Run Keys / Startup Folder

1
T1547.001

Defense Evasion

Modify Registry

1
T1112

Discovery

Query Registry

1
T1012

System Information Discovery

1
T1082

Tasks