Analysis

  • max time kernel
    147s
  • max time network
    149s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240508-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system
  • submitted
    22/06/2024, 03:49

General

  • Target

    0121a89cb657a11e5dd092883bfd7825_JaffaCakes118.exe

  • Size

    1.0MB

  • MD5

    0121a89cb657a11e5dd092883bfd7825

  • SHA1

    2dfe917bb76403eba25913d2ff8438ea86d0b4e2

  • SHA256

    764ce88df34adf060e0a41e97634498ebcc58b2570802328c08e8a505e56e9df

  • SHA512

    a74daabb75d13b45bb43553b8a7b496558d5e60a36af78b7dcfd8fd853954c8cad19fa86be909e28d8be06449aec525cee9549d6a7a17dd03ea1d81cd08255d9

  • SSDEEP

    24576:OGS8+RJTCHNrwVXmYvDypdaGesDfJBvC5bZh6ZcoC5/5wHQeYv1:OGl+RiNrwjvD1UFBvmbZhycEu1

Malware Config

Signatures

  • Ardamax

    A keylogger first seen in 2013.

  • Ardamax main executable 1 IoCs
  • Checks computer location settings 2 TTPs 2 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 8 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Drops file in System32 directory 7 IoCs
  • Drops file in Windows directory 4 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies Internet Explorer settings 1 TTPs 26 IoCs
  • Modifies registry class 38 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 11 IoCs
  • Suspicious use of WriteProcessMemory 11 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\0121a89cb657a11e5dd092883bfd7825_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\0121a89cb657a11e5dd092883bfd7825_JaffaCakes118.exe"
    1⤵
    • Checks computer location settings
    • Drops file in Windows directory
    • Modifies registry class
    • Suspicious use of WriteProcessMemory
    PID:4488
    • C:\Windows\INSTALL.EXE
      "C:\Windows\INSTALL.EXE"
      2⤵
      • Checks computer location settings
      • Executes dropped EXE
      • Loads dropped DLL
      • Drops file in System32 directory
      • Suspicious use of WriteProcessMemory
      PID:3484
      • C:\Windows\SysWOW64\28463\IDCC.exe
        "C:\Windows\system32\28463\IDCC.exe"
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Adds Run key to start application
        • Drops file in System32 directory
        • Modifies registry class
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of SetWindowsHookEx
        PID:1216
    • C:\Program Files\Internet Explorer\iexplore.exe
      "C:\Program Files\Internet Explorer\iexplore.exe" C:\Windows\ORKUT-LEIO-RESPONDO-APAGO_(14) (1).GIF
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:2964
      • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2964 CREDAT:17410 /prefetch:2
        3⤵
        • Loads dropped DLL
        • Modifies Internet Explorer settings
        • Suspicious use of SetWindowsHookEx
        PID:2524

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\@5091.tmp

    Filesize

    4KB

    MD5

    ccf39f70a662f70e7cae4cfc81255c44

    SHA1

    00177d41252c2a5322be8e54567a845217072e2c

    SHA256

    4c9cca81f2f2d91b636c0ec747e96821749788368c48981bf04accfeb5c2e5d0

    SHA512

    2cc006d3bd6af737f31707b457caaa267ee1361cfd0afab0be8b74be8587d02b20909962d138e137fe79252e0d112bd3be091a98ba50863520b5bbf21bb9501d

  • C:\Windows\INSTALL.EXE

    Filesize

    794KB

    MD5

    4755e50b28f834e70c9ae04bace9c331

    SHA1

    3c5fc2abfe131641174f1b54c0ee97e48e4eea2b

    SHA256

    bdacc150a93e38d8fb902cbb0a2a957c37c1d9d054035b34be4b5ec067ba2a9b

    SHA512

    7593b92c1f699e67f8916b2ec4ad8c9ada41e0b622bfe66414ad6059d6705c44fbfdb778e3092e2bb1ca5afacb97591e05327d85b5bd7d2a021cd7b838f8e9d9

  • C:\Windows\ORKUT-LEIO-RESPONDO-APAGO_(14) (1).GIF

    Filesize

    121KB

    MD5

    c842fb8964008fad924d507d3bdb8b40

    SHA1

    a15e755c7cf6eaf89c3f6364fd68a93e94456b5c

    SHA256

    275cf3d204fdb2d8c6a867254ce329b931abc296d8545608f23a04874dd1c045

    SHA512

    54414b769cac0ae0c08d3dd90cadc313a8c57185a24d7676454c9414e567d4cadad1da49bfe474a0cf3f2f7aeff6675ab6a1eafdd3cb84652dd34cbc1b5da048

  • C:\Windows\SysWOW64\28463\AKV.exe

    Filesize

    457KB

    MD5

    828586f5f9fd7e6bd99401fe7cece954

    SHA1

    8eb70f4af2cec3c3dd3ec1491913369e99b7b874

    SHA256

    02b8379b1838ea70f7f17e0785aaaedb7c721d9b6e262577723bba9492748d0c

    SHA512

    16b64be59cf9ae403fb3b7e1fc8da98cb2a5db84aef0e352910172796ecf96dcf86a7e16afe78fa7e22b7b6948e8a1fa027da7161d5a0ad98e76175d764ed6a7

  • C:\Windows\SysWOW64\28463\IDCC.001

    Filesize

    510B

    MD5

    f0cc2368b05cab054a1f0ce9e1d90aee

    SHA1

    0529d79508f6f3ce9e2c46861af673a2bcfdd759

    SHA256

    4ac150ef1b986ae20b634e15e46181d50ac96f357710a32ccc6f8d34ca570f35

    SHA512

    29908a03c7f0b0498ff1270508d3d25ce4f257af329e9440619895139234fcd5cb432b7e499a73df6bee3aa04a9e221161d6f19743b63efdd963f3d0ef3f0edc

  • C:\Windows\SysWOW64\28463\IDCC.006

    Filesize

    8KB

    MD5

    69db8c925f2dd8136d956a086ed1ee41

    SHA1

    9d0f653cc7ab881eb45fe93490a9c096f2dec6cf

    SHA256

    984da5476c2c69a779bc99d0901569347cc605a36499e2284706cda3ed6e13f3

    SHA512

    fa5cedd539dca3631511488aea8bcb7821db1d53452c1b61ee663cb5700bb9919b092593a7f5eb7a3c3a75f801b2980f817de4a66bf8aa51093ced4b30ffd068

  • C:\Windows\SysWOW64\28463\IDCC.007

    Filesize

    5KB

    MD5

    9e9da4c851850726c789bb4b94a41bb3

    SHA1

    1e2fd71f1d1a3ac15d3c820d8459635cd775cf24

    SHA256

    94f6502a4e94de0301ae07befd63767a4de35d9b2d2d00687a3130e883ab1963

    SHA512

    4c60e951056c5773d769a9c88245fc4a597949deb72a1a7546991488e85ffc4ff2a34840ad227595bcdc105cf187207721b57c457ac832ee0159dd0e1d9be063

  • C:\Windows\SysWOW64\28463\IDCC.exe

    Filesize

    648KB

    MD5

    c5ca2c96edc99cf9edf0f861d784209a

    SHA1

    6cb654b3eb20c85224a4849c4cc30012cabbdbaa

    SHA256

    0ca27dfe22971bfb19c7f3d6fe03cd398816a88fc50943ba9821fa6b91be7807

    SHA512

    aeb36bbbf68c7b733ddd856f8f0cdd9548ff597843a22611757c98f69a589035410fecfa692bb83c740823ddae6432d3be5cb66f4309a9d0f5fedeb7b017ff36

  • C:\Windows\SysWOW64\28463\key.bin

    Filesize

    106B

    MD5

    639d75ab6799987dff4f0cf79fa70c76

    SHA1

    be2678476d07f78bb81e8813c9ee2bfff7cc7efb

    SHA256

    fc42ab050ffdfed8c8c7aac6d7e4a7cad4696218433f7ca327bcfdf9f318ac98

    SHA512

    4b511d0330d7204af948ce7b15615d745e8d4ea0a73bbece4e00fb23ba2635dd99e4fa54a76236d6f74bdbcdba57d32fd4c36b608d52628e72d11d5ed6f8cde2

  • memory/1216-56-0x0000000003260000-0x0000000003261000-memory.dmp

    Filesize

    4KB

  • memory/1216-49-0x0000000002410000-0x0000000002411000-memory.dmp

    Filesize

    4KB

  • memory/1216-63-0x0000000003260000-0x0000000003261000-memory.dmp

    Filesize

    4KB

  • memory/1216-62-0x0000000003260000-0x0000000003261000-memory.dmp

    Filesize

    4KB

  • memory/1216-61-0x0000000003260000-0x0000000003261000-memory.dmp

    Filesize

    4KB

  • memory/1216-60-0x0000000003260000-0x0000000003261000-memory.dmp

    Filesize

    4KB

  • memory/1216-59-0x0000000003260000-0x0000000003261000-memory.dmp

    Filesize

    4KB

  • memory/1216-58-0x0000000003260000-0x0000000003261000-memory.dmp

    Filesize

    4KB

  • memory/1216-57-0x0000000003260000-0x0000000003261000-memory.dmp

    Filesize

    4KB

  • memory/1216-86-0x0000000000400000-0x00000000004DF000-memory.dmp

    Filesize

    892KB

  • memory/1216-54-0x0000000003220000-0x0000000003221000-memory.dmp

    Filesize

    4KB

  • memory/1216-53-0x00000000023A0000-0x00000000023A1000-memory.dmp

    Filesize

    4KB

  • memory/1216-52-0x00000000023E0000-0x00000000023E1000-memory.dmp

    Filesize

    4KB

  • memory/1216-51-0x0000000002420000-0x0000000002421000-memory.dmp

    Filesize

    4KB

  • memory/1216-50-0x0000000002400000-0x0000000002401000-memory.dmp

    Filesize

    4KB

  • memory/1216-55-0x0000000003210000-0x0000000003213000-memory.dmp

    Filesize

    12KB

  • memory/1216-48-0x00000000023C0000-0x00000000023C1000-memory.dmp

    Filesize

    4KB

  • memory/1216-46-0x0000000000A00000-0x0000000000A5A000-memory.dmp

    Filesize

    360KB

  • memory/1216-67-0x0000000003230000-0x0000000003231000-memory.dmp

    Filesize

    4KB

  • memory/1216-66-0x00000000005F0000-0x00000000005F1000-memory.dmp

    Filesize

    4KB

  • memory/1216-65-0x0000000000570000-0x0000000000571000-memory.dmp

    Filesize

    4KB

  • memory/1216-45-0x0000000000400000-0x00000000004DF000-memory.dmp

    Filesize

    892KB

  • memory/1216-82-0x0000000003260000-0x0000000003261000-memory.dmp

    Filesize

    4KB

  • memory/1216-81-0x0000000000A00000-0x0000000000A5A000-memory.dmp

    Filesize

    360KB

  • memory/1216-79-0x0000000000400000-0x00000000004DF000-memory.dmp

    Filesize

    892KB

  • memory/4488-1-0x0000000002630000-0x0000000002720000-memory.dmp

    Filesize

    960KB

  • memory/4488-36-0x0000000002630000-0x0000000002720000-memory.dmp

    Filesize

    960KB

  • memory/4488-44-0x0000000000400000-0x0000000000967000-memory.dmp

    Filesize

    5.4MB

  • memory/4488-0-0x0000000000400000-0x0000000000967000-memory.dmp

    Filesize

    5.4MB