Analysis

  • max time kernel
    121s
  • max time network
    123s
  • platform
    windows7_x64
  • resource
    win7-20240508-en
  • resource tags

    arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system
  • submitted
    22/06/2024, 01:34

General

  • Target

    00ac9dcf883fe827af6250d88e1c417b_JaffaCakes118.exe

  • Size

    1.3MB

  • MD5

    00ac9dcf883fe827af6250d88e1c417b

  • SHA1

    ad65323280c6ab9105baa6dd9f21516228f6b249

  • SHA256

    e225f71705ac110dfc382a97317c215882459185dbb558752c2e98ebc4a14c74

  • SHA512

    d8fd8c127a2c3a283559822d98c61ba9f153396493b1300f73b3c747e7af8e7a6b48a185a9c9a6ad757072a1a9e0a157d5ffc995f68a0912c49d07edda92b1d1

  • SSDEEP

    24576:FVaUTq64vUmx3CYfhbkF2dhBInNBnpCYK/6Ah4QPh/ajdHfxCD:FVrTwvUQcm2jpaSA7GN2

Malware Config

Signatures

  • Ardamax

    A keylogger first seen in 2013.

  • Ardamax main executable 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Drops file in System32 directory 6 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of SetWindowsHookEx 4 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\00ac9dcf883fe827af6250d88e1c417b_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\00ac9dcf883fe827af6250d88e1c417b_JaffaCakes118.exe"
    1⤵
    • Loads dropped DLL
    • Drops file in System32 directory
    • Suspicious use of WriteProcessMemory
    PID:1116
    • C:\Windows\SysWOW64\KPLWPO\RMC.exe
      "C:\Windows\system32\KPLWPO\RMC.exe"
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Adds Run key to start application
      • Drops file in System32 directory
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of SetWindowsHookEx
      PID:1708

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Windows\SysWOW64\KPLWPO\AKV.exe

    Filesize

    456KB

    MD5

    924cfca73fb9033f078a0f0621456f3a

    SHA1

    21c1edeac0a21fa9676362915a63856e7cb59b1a

    SHA256

    7b62f4292c1324c6aa08b8da79d19440f47e2da72e2caa8fab6c93b0c4296aba

    SHA512

    24bf43cf465d9bd6a011c8f8f8cf59b8d26b35406f36ae6dda5ed1e6094f5c2b6a83d0c992be7d6d5129c5e9f3d077dabfee847dad56a883a96d503f5a7ae06b

  • C:\Windows\SysWOW64\KPLWPO\RMC.001

    Filesize

    60KB

    MD5

    c9cec63855b65f0d823ac0db81864517

    SHA1

    03e0c57d0f093ccd1b06ea5f07a127a0eb2587cb

    SHA256

    c69bfea6d64eef6169eecfaa3b576c9cb48f8fed190487f9051eeb5b3785af6f

    SHA512

    df8b021329ae4bdc04c72da289a0cb5c95b90e5a51e048dbb4dbb9a38fbcf4718ba249480dd0920cfb84d4141c97d2c7bbf9bcfef8906d83a8812d5fb376fa9e

  • C:\Windows\SysWOW64\KPLWPO\RMC.002

    Filesize

    43KB

    MD5

    d718a21bcd75d95744395d6dcf2ef9f2

    SHA1

    c2e3751640138c3ef8a137038ca6578838fa9073

    SHA256

    9d344f12d5aff2bf16090d875317075f6cc57fac95418d7b7469e51d6b363406

    SHA512

    f50267c1db72ecdb5a14bb5c97b2420fdc9e53295f1b87ce5df241c96d0c8654698e6c0fc9bc9bd6cd4feca2d2be650b422727a018a74565df08345d42065abf

  • C:\Windows\SysWOW64\KPLWPO\RMC.004

    Filesize

    1KB

    MD5

    029c9ec9b3b17e7329320b181205e3a0

    SHA1

    000381e1ab0798e598a8bd0108a13ffc511a6047

    SHA256

    aac22626ebfe73796c8d9fb7734ade08a680faff896d2393e0b0446fec659b4e

    SHA512

    3cd7f69ede98ab85dd0797971e4a9eceffa8faf838ba70a954df2fcd4d35497bc499ccb7a14d27a17a688c1d9d9a48088d50dab27a662bc9f2fa66352a96d529

  • \Windows\SysWOW64\KPLWPO\RMC.exe

    Filesize

    1.7MB

    MD5

    405f59610beaf42b02989637f07cb34a

    SHA1

    e43ed23cdf65da7f184daa6ce3ba8ad1f743c6e6

    SHA256

    3115b43b33937f05243b3470c917c47d2f79e01ca1bead3e0b150018b4be2b57

    SHA512

    fcb5206da936d76125806b36c4cea8909902fc1b3c85a23b5d22955d8c3ccc0a27f5f5da49f91015582b5b16e2614d9e129540c0cc6056614212079e0a84b814

  • memory/1708-15-0x0000000000230000-0x0000000000231000-memory.dmp

    Filesize

    4KB

  • memory/1708-17-0x0000000000230000-0x0000000000231000-memory.dmp

    Filesize

    4KB