Analysis

  • max time kernel
    119s
  • max time network
    121s
  • platform
    windows7_x64
  • resource
    win7-20240704-en
  • resource tags

    arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system
  • submitted
    05/07/2024, 10:50

General

  • Target

    26dcfae12f388eb7d9a42fd202d6569d_JaffaCakes118.exe

  • Size

    1.1MB

  • MD5

    26dcfae12f388eb7d9a42fd202d6569d

  • SHA1

    2cf3b08b378b5f6d84cb34c8e0a4ed7f0ef7e86c

  • SHA256

    cf486d42d09743d634094e6fae43524324e14e21f6f7a08beba498e1c357ac2c

  • SHA512

    95c8afd48b5b02a47060117a5f7632f4eb038bef6d4187363c2d3d47d69dab8fda85f4f650a37cef2c56c1314d59d9b924040e5974e67173491e7f99b1ba6558

  • SSDEEP

    24576:wHvZTA0s6BlRSmrQZJcfezavPMqYD/tQHCMfAjG61cYHs:4BTbs6TomrQD8e2vE3ii6+GIc

Malware Config

Signatures

  • Ardamax

    A keylogger first seen in 2013.

  • Ardamax main executable 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Drops file in System32 directory 6 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of SetWindowsHookEx 4 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\26dcfae12f388eb7d9a42fd202d6569d_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\26dcfae12f388eb7d9a42fd202d6569d_JaffaCakes118.exe"
    1⤵
    • Loads dropped DLL
    • Drops file in System32 directory
    • Suspicious use of WriteProcessMemory
    PID:2812
    • C:\Windows\SysWOW64\KXXNQF\ORD.exe
      "C:\Windows\system32\KXXNQF\ORD.exe"
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Adds Run key to start application
      • Drops file in System32 directory
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:2596
      • C:\Windows\SysWOW64\cmd.exe
        "C:\Windows\system32\cmd.exe" /c del C:\Windows\SysWOW64\KXXNQF\ORD.exe > nul
        3⤵
          PID:1984

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Windows\SysWOW64\KXXNQF\AKV.exe

      Filesize

      461KB

      MD5

      7e335c1258740a5798c2b3eea5a97229

      SHA1

      6ce1e98ddc05a4b9e772901c9bc6caae4103267f

      SHA256

      667ab5d791b89216a46f7dd3a1bcb9b7e5f235415a74a9678ca41cec051c462f

      SHA512

      8c190dd139f5459a91c81871f53fc080a81c6397c68cb5b0ee195571012cc8af923b10cd77301da1816f935d36a0587d1c75126f5553005a0f50eb22d3441cb4

    • C:\Windows\SysWOW64\KXXNQF\ORD.001

      Filesize

      61KB

      MD5

      9fca42b7fa3132ded471b886c4bf8a51

      SHA1

      86109ac13f8b63bd3467bbf05e39c5cf9bd11d26

      SHA256

      c519bcfc50245700b30cb417478b46810443b03a6447387dd1d0a13966ff00dd

      SHA512

      bbdd590e1bd2971fbc6a462f6501341c0808d658ba3407b051f9d299d9babf0632af092d64c6ad290d4ae5d9db8c367898a064bbea916c516c0a54066ad698ab

    • C:\Windows\SysWOW64\KXXNQF\ORD.002

      Filesize

      43KB

      MD5

      4c30b3e90b3da5619bc0d5f53c025135

      SHA1

      829f487b7c26f6cb8b7f211b2331abbc5229aa61

      SHA256

      b632cedab7ce3d19eebc0d31864dc8c38cd249dcbde299cda818f7026ec294cf

      SHA512

      fd0b36fb43c6b62f6d47455b392276d4e3710b204ef11c70cefed417740a4b5d9357ba37f612f3f87d539175af312ead05bc7a4360fe3e26fd43c56e856e6313

    • C:\Windows\SysWOW64\KXXNQF\ORD.004

      Filesize

      1KB

      MD5

      2e0e7c1046a1d07fc7dcac15825d0f8e

      SHA1

      4233d7bcac84da73411b0664223c84c980afb420

      SHA256

      e668dfcfa02af57b2ba04afe584ff6dd873dfb18c6a3348ac1356fde097ca743

      SHA512

      72538782c1182850500d98fc921750c472883c3f372fbbadd0dec897432b8b329eb562edb231fb01d9f85b9090efa44bb10b6e978bbcb8132ad75ff304a5f2ae

    • \Windows\SysWOW64\KXXNQF\ORD.exe

      Filesize

      1.5MB

      MD5

      9c28244f2dbe3a4758b532838b0040c9

      SHA1

      4b58bb4033d43ae64af6c18db48d5d25e23f6121

      SHA256

      cb770745d547a27a4b99fdbe27a672135f812b29d94fd2b843d06bb5aa1748aa

      SHA512

      24ed3d4c6aae307a0f1bb1f063b211152644b06d7425a5fe24b09f5f747dd63011451cef3f47cc4985b3316cf1213c056d38768ccb7f44cb2fab28cf4e30e969

    • memory/2596-15-0x00000000001C0000-0x00000000001C1000-memory.dmp

      Filesize

      4KB

    • memory/2596-17-0x00000000001C0000-0x00000000001C1000-memory.dmp

      Filesize

      4KB