Analysis

  • max time kernel
    143s
  • max time network
    119s
  • platform
    windows7_x64
  • resource
    win7-20240508-en
  • resource tags

    arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system
  • submitted
    26/06/2024, 17:13

General

  • Target

    12c4b0ebdebe107787da5a496e42a09d_JaffaCakes118.exe

  • Size

    1.3MB

  • MD5

    12c4b0ebdebe107787da5a496e42a09d

  • SHA1

    c18727cbb1445d976f39cb797da06e24d8f99ade

  • SHA256

    64df387c509c8396d6016735bc72cb4a0af2a14d113d9e0b5dcd29fa8f1c2635

  • SHA512

    edbf9ceeb72bc75c95fa5396b5dc6ca401ef302b01ff477cac30ddb4696828cde8a03ae5c44946b6117ee39e17255e45e656ff30cef37a56958ec07954ce8cb0

  • SSDEEP

    24576:9fYGIKoqH+FKk83Khkp1aX6uUBiYwX84+vXQbOQ7ckuyW4BWJgXUtjQNtYVbHFmV:2GuC+n86KzaXd+MQASeTBXEtMNAblmJ3

Malware Config

Signatures

  • Ardamax

    A keylogger first seen in 2013.

  • Ardamax main executable 1 IoCs
  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 7 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Drops file in System32 directory 6 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of AdjustPrivilegeToken 10 IoCs
  • Suspicious use of SetWindowsHookEx 4 IoCs
  • Suspicious use of WriteProcessMemory 14 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\12c4b0ebdebe107787da5a496e42a09d_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\12c4b0ebdebe107787da5a496e42a09d_JaffaCakes118.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:1632
    • C:\Users\Admin\AppData\Local\Xenocode\Sandbox\scnner tools\20.1.11.06\2012.04.13T08.22\Virtual\STUBEXE\@APPDATALOCAL@\Temp\Install.exe
      "C:\Users\Admin\AppData\Local\Temp\Install.exe"
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Drops file in System32 directory
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:940
      • C:\Users\Admin\AppData\Local\Xenocode\Sandbox\scnner tools\20.1.11.06\2012.04.13T08.22\Native\STUBEXE\@SYSTEM@\YJNWYW\OEK.exe
        "C:\Windows\system32\YJNWYW\OEK.exe"
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Adds Run key to start application
        • Drops file in System32 directory
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of SetWindowsHookEx
        PID:2420

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Windows\SysWOW64\YJNWYW\OEK.001

    Filesize

    61KB

    MD5

    383d5f5d4240d590e7dec3f7312a4ac7

    SHA1

    f6bcade8d37afb80cf52a89b3e84683f4643fbce

    SHA256

    7e87f6817b17a75106d34ce9884c40ddfb381bf8f2013930916498d1df0a6422

    SHA512

    e652c41ec95d653940b869426bc2cbd8e5b3159110ffaab7d623e23eebe1f34ca65be6a9a9cdcd5f41aec7567469d6b4d6362d24ae92267cddb8940e1265806a

  • C:\Windows\SysWOW64\YJNWYW\OEK.002

    Filesize

    43KB

    MD5

    93df156c4bd9d7341f4c4a4847616a69

    SHA1

    c7663b32c3c8e247bc16b51aff87b45484652dc1

    SHA256

    e55b6eabf0f99b90bd4cf3777c25813bded7b6fc5c9955188c8aa5224d299c3e

    SHA512

    ed2e98c5fd1f0d49e5bac8baa515d489c89f8d42772ae05e4b7a32da8f06d511adad27867034ca0865beae9f78223e95c7d0f826154fc663f2fab9bd61e36e35

  • C:\Windows\SysWOW64\YJNWYW\OEK.003

    Filesize

    65KB

    MD5

    cefd6e9c8a039ab9a7833414dfb03f76

    SHA1

    2a026d0514e0119d0fd545a0d2f6deb198806b70

    SHA256

    4d71cf9a598c7babd938c2635a755441da18502118cc3336ae25389510c7d01f

    SHA512

    efcfd6654bf0c45158f43a8c8fd45cc8d40cac227926faa0cd368f1d8012df1bc271f3c7d5db539b1bf282087e533e5a809cf040ac087fcfab58bb320c5a5502

  • C:\Windows\SysWOW64\YJNWYW\OEK.004

    Filesize

    1KB

    MD5

    e59f589ff947bd8d09d0736bc00110d4

    SHA1

    06aa6b80b4e1e3ba99b2101efd61bd305c3d8a99

    SHA256

    c8e5bc6ccb189e350af1de2210e59c216b6c5ef60fbf4ccb397e0f50f17e0df8

    SHA512

    c02d085946c363db7b2fbff663ddbcec5e1669d58b2638b9b23d7c01451fb022099e996cd69f3087768909e6c5b5e1beabae53cff9bc943857e613311c921266

  • C:\Windows\SysWOW64\YJNWYW\OEK.exe

    Filesize

    1.7MB

    MD5

    3cd29c0df98a7aeb69a9692843ca3edb

    SHA1

    7c86aea093f1979d18901bd1b89a2b02a60ac3e2

    SHA256

    5a37cd66508fa3fc85ae547de3498e709bd45167cb57f5e9b271dc3a1cb71a32

    SHA512

    e78f3206b1878e8db1766d4038a375bbebcbcdb8d1b0a0cb9b0dc72c54881392b9c27e2864ad9118702da58f203f13e0ad5d230980ad1ef2370391a2c4acffc9

  • \Users\Admin\AppData\Local\Xenocode\Sandbox\scnner tools\20.1.11.06\2012.04.13T08.22\Native\STUBEXE\@SYSTEM@\YJNWYW\OEK.exe

    Filesize

    17KB

    MD5

    3c69601eda703669caf6e866408f02ca

    SHA1

    6c7a9efe6ce4b5ecba79bc52a51ea8feb3a4aacb

    SHA256

    036ae1db34e1964ca5745e3d9bf2028ace023a63362164c6eae3219f0ab5d52b

    SHA512

    fdd3dcfce298b012b0a8264b6935eb0cf1afdb483ad7479dae0ba658084ed22f7405b8d5812bb7db10a211d6885dd287ccb1752875adb0235c6763a6d5fd092c

  • \Users\Admin\AppData\Local\Xenocode\Sandbox\scnner tools\20.1.11.06\2012.04.13T08.22\Virtual\STUBEXE\@APPDATALOCAL@\Temp\Install.exe

    Filesize

    17KB

    MD5

    baeb12380f1f8594f086ea22908fc5b3

    SHA1

    009a8a10d79a1d564963083f6a75c3f4d6532418

    SHA256

    9373d0cf4464f30b170fb65ef617e24b47790a308f76854f73c6f9a5da09eed0

    SHA512

    35d50d277f0adf1fc8459516952866ffa0943c46e255190b67a05d71ea0f56b756cee5bfebf4ce8bb7cb37ed85a0981f492be86d533043393d32fec9747ec73c

  • memory/1632-120-0x0000000000370000-0x00000000003DC000-memory.dmp

    Filesize

    432KB

  • memory/1632-44-0x0000000000370000-0x00000000003DC000-memory.dmp

    Filesize

    432KB

  • memory/1632-11-0x0000000000370000-0x00000000003DC000-memory.dmp

    Filesize

    432KB

  • memory/1632-31-0x0000000000370000-0x00000000003DC000-memory.dmp

    Filesize

    432KB

  • memory/1632-41-0x0000000077950000-0x0000000077951000-memory.dmp

    Filesize

    4KB

  • memory/1632-40-0x0000000000370000-0x00000000003DC000-memory.dmp

    Filesize

    432KB

  • memory/1632-39-0x0000000000370000-0x00000000003DC000-memory.dmp

    Filesize

    432KB

  • memory/1632-33-0x0000000000370000-0x00000000003DC000-memory.dmp

    Filesize

    432KB

  • memory/1632-29-0x0000000000370000-0x00000000003DC000-memory.dmp

    Filesize

    432KB

  • memory/1632-27-0x0000000000370000-0x00000000003DC000-memory.dmp

    Filesize

    432KB

  • memory/1632-25-0x0000000000370000-0x00000000003DC000-memory.dmp

    Filesize

    432KB

  • memory/1632-23-0x0000000000370000-0x00000000003DC000-memory.dmp

    Filesize

    432KB

  • memory/1632-21-0x0000000000370000-0x00000000003DC000-memory.dmp

    Filesize

    432KB

  • memory/1632-17-0x0000000000370000-0x00000000003DC000-memory.dmp

    Filesize

    432KB

  • memory/1632-15-0x0000000000370000-0x00000000003DC000-memory.dmp

    Filesize

    432KB

  • memory/1632-13-0x0000000000370000-0x00000000003DC000-memory.dmp

    Filesize

    432KB

  • memory/1632-9-0x0000000000370000-0x00000000003DC000-memory.dmp

    Filesize

    432KB

  • memory/1632-7-0x0000000000370000-0x00000000003DC000-memory.dmp

    Filesize

    432KB

  • memory/1632-5-0x0000000000370000-0x00000000003DC000-memory.dmp

    Filesize

    432KB

  • memory/1632-58-0x0000000000370000-0x00000000003DC000-memory.dmp

    Filesize

    432KB

  • memory/1632-82-0x0000000000370000-0x00000000003DC000-memory.dmp

    Filesize

    432KB

  • memory/1632-0-0x0000000000370000-0x00000000003DC000-memory.dmp

    Filesize

    432KB

  • memory/1632-155-0x0000000000370000-0x00000000003DC000-memory.dmp

    Filesize

    432KB

  • memory/1632-198-0x0000000000370000-0x00000000003DC000-memory.dmp

    Filesize

    432KB

  • memory/1632-42-0x0000000000370000-0x00000000003DC000-memory.dmp

    Filesize

    432KB

  • memory/1632-19-0x0000000000370000-0x00000000003DC000-memory.dmp

    Filesize

    432KB

  • memory/1632-46-0x0000000000370000-0x00000000003DC000-memory.dmp

    Filesize

    432KB

  • memory/1632-48-0x0000000000370000-0x00000000003DC000-memory.dmp

    Filesize

    432KB

  • memory/1632-50-0x0000000000370000-0x00000000003DC000-memory.dmp

    Filesize

    432KB

  • memory/1632-52-0x0000000000370000-0x00000000003DC000-memory.dmp

    Filesize

    432KB

  • memory/1632-98-0x0000000077950000-0x0000000077951000-memory.dmp

    Filesize

    4KB

  • memory/1632-219-0x0000000000370000-0x00000000003DC000-memory.dmp

    Filesize

    432KB

  • memory/1632-207-0x0000000000370000-0x00000000003DC000-memory.dmp

    Filesize

    432KB

  • memory/1632-199-0x0000000077950000-0x0000000077951000-memory.dmp

    Filesize

    4KB

  • memory/1632-191-0x0000000000370000-0x00000000003DC000-memory.dmp

    Filesize

    432KB

  • memory/1632-179-0x0000000000370000-0x00000000003DC000-memory.dmp

    Filesize

    432KB

  • memory/1632-166-0x0000000000370000-0x00000000003DC000-memory.dmp

    Filesize

    432KB

  • memory/1632-141-0x0000000000370000-0x00000000003DC000-memory.dmp

    Filesize

    432KB

  • memory/1632-130-0x0000000000370000-0x00000000003DC000-memory.dmp

    Filesize

    432KB

  • memory/1632-109-0x0000000000370000-0x00000000003DC000-memory.dmp

    Filesize

    432KB

  • memory/1632-96-0x0000000000370000-0x00000000003DC000-memory.dmp

    Filesize

    432KB

  • memory/1632-84-0x0000000077950000-0x0000000077951000-memory.dmp

    Filesize

    4KB

  • memory/1632-64-0x0000000000370000-0x00000000003DC000-memory.dmp

    Filesize

    432KB

  • memory/1632-62-0x0000000000370000-0x00000000003DC000-memory.dmp

    Filesize

    432KB

  • memory/1632-60-0x0000000000370000-0x00000000003DC000-memory.dmp

    Filesize

    432KB

  • memory/1632-56-0x0000000000370000-0x00000000003DC000-memory.dmp

    Filesize

    432KB

  • memory/1632-3-0x0000000000370000-0x00000000003DC000-memory.dmp

    Filesize

    432KB

  • memory/1632-1-0x0000000000370000-0x00000000003DC000-memory.dmp

    Filesize

    432KB

  • memory/1632-54-0x0000000000370000-0x00000000003DC000-memory.dmp

    Filesize

    432KB

  • memory/1632-637-0x0000000000370000-0x00000000003DC000-memory.dmp

    Filesize

    432KB