Analysis

  • max time kernel
    140s
  • max time network
    164s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240226-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system
  • submitted
    22/06/2024, 01:34

General

  • Target

    00ac9dcf883fe827af6250d88e1c417b_JaffaCakes118.exe

  • Size

    1.3MB

  • MD5

    00ac9dcf883fe827af6250d88e1c417b

  • SHA1

    ad65323280c6ab9105baa6dd9f21516228f6b249

  • SHA256

    e225f71705ac110dfc382a97317c215882459185dbb558752c2e98ebc4a14c74

  • SHA512

    d8fd8c127a2c3a283559822d98c61ba9f153396493b1300f73b3c747e7af8e7a6b48a185a9c9a6ad757072a1a9e0a157d5ffc995f68a0912c49d07edda92b1d1

  • SSDEEP

    24576:FVaUTq64vUmx3CYfhbkF2dhBInNBnpCYK/6Ah4QPh/ajdHfxCD:FVrTwvUQcm2jpaSA7GN2

Malware Config

Signatures

  • Ardamax

    A keylogger first seen in 2013.

  • Ardamax main executable 1 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Drops file in System32 directory 6 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of SetWindowsHookEx 4 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\00ac9dcf883fe827af6250d88e1c417b_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\00ac9dcf883fe827af6250d88e1c417b_JaffaCakes118.exe"
    1⤵
    • Checks computer location settings
    • Drops file in System32 directory
    • Suspicious use of WriteProcessMemory
    PID:3484
    • C:\Windows\SysWOW64\KPLWPO\RMC.exe
      "C:\Windows\system32\KPLWPO\RMC.exe"
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Adds Run key to start application
      • Drops file in System32 directory
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of SetWindowsHookEx
      PID:2424
  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=4240 --field-trial-handle=2656,i,16940681401824032220,151921362336696246,262144 --variations-seed-version /prefetch:8
    1⤵
      PID:2004

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Windows\SysWOW64\KPLWPO\AKV.exe

      Filesize

      456KB

      MD5

      924cfca73fb9033f078a0f0621456f3a

      SHA1

      21c1edeac0a21fa9676362915a63856e7cb59b1a

      SHA256

      7b62f4292c1324c6aa08b8da79d19440f47e2da72e2caa8fab6c93b0c4296aba

      SHA512

      24bf43cf465d9bd6a011c8f8f8cf59b8d26b35406f36ae6dda5ed1e6094f5c2b6a83d0c992be7d6d5129c5e9f3d077dabfee847dad56a883a96d503f5a7ae06b

    • C:\Windows\SysWOW64\KPLWPO\RMC.001

      Filesize

      60KB

      MD5

      c9cec63855b65f0d823ac0db81864517

      SHA1

      03e0c57d0f093ccd1b06ea5f07a127a0eb2587cb

      SHA256

      c69bfea6d64eef6169eecfaa3b576c9cb48f8fed190487f9051eeb5b3785af6f

      SHA512

      df8b021329ae4bdc04c72da289a0cb5c95b90e5a51e048dbb4dbb9a38fbcf4718ba249480dd0920cfb84d4141c97d2c7bbf9bcfef8906d83a8812d5fb376fa9e

    • C:\Windows\SysWOW64\KPLWPO\RMC.002

      Filesize

      43KB

      MD5

      d718a21bcd75d95744395d6dcf2ef9f2

      SHA1

      c2e3751640138c3ef8a137038ca6578838fa9073

      SHA256

      9d344f12d5aff2bf16090d875317075f6cc57fac95418d7b7469e51d6b363406

      SHA512

      f50267c1db72ecdb5a14bb5c97b2420fdc9e53295f1b87ce5df241c96d0c8654698e6c0fc9bc9bd6cd4feca2d2be650b422727a018a74565df08345d42065abf

    • C:\Windows\SysWOW64\KPLWPO\RMC.004

      Filesize

      1KB

      MD5

      029c9ec9b3b17e7329320b181205e3a0

      SHA1

      000381e1ab0798e598a8bd0108a13ffc511a6047

      SHA256

      aac22626ebfe73796c8d9fb7734ade08a680faff896d2393e0b0446fec659b4e

      SHA512

      3cd7f69ede98ab85dd0797971e4a9eceffa8faf838ba70a954df2fcd4d35497bc499ccb7a14d27a17a688c1d9d9a48088d50dab27a662bc9f2fa66352a96d529

    • C:\Windows\SysWOW64\KPLWPO\RMC.exe

      Filesize

      1.7MB

      MD5

      405f59610beaf42b02989637f07cb34a

      SHA1

      e43ed23cdf65da7f184daa6ce3ba8ad1f743c6e6

      SHA256

      3115b43b33937f05243b3470c917c47d2f79e01ca1bead3e0b150018b4be2b57

      SHA512

      fcb5206da936d76125806b36c4cea8909902fc1b3c85a23b5d22955d8c3ccc0a27f5f5da49f91015582b5b16e2614d9e129540c0cc6056614212079e0a84b814

    • memory/2424-16-0x00000000006E0000-0x00000000006E1000-memory.dmp

      Filesize

      4KB

    • memory/2424-18-0x00000000006E0000-0x00000000006E1000-memory.dmp

      Filesize

      4KB