Analysis

  • max time kernel
    122s
  • max time network
    127s
  • platform
    windows7_x64
  • resource
    win7-20240704-en
  • resource tags

    arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system
  • submitted
    08/07/2024, 02:00

General

  • Target

    2a98aa48cb2a707c1c8b276c39be77a3_JaffaCakes118.exe

  • Size

    720KB

  • MD5

    2a98aa48cb2a707c1c8b276c39be77a3

  • SHA1

    6fb85b3453d719f26beebe3cb3f260426d8ac551

  • SHA256

    ce01dfd3f455df79927fd15ce174511f9144fb292fed1f12331ac4c8fd4664bf

  • SHA512

    96e3317fd17bf0083b0ae2478e1271e0a8ba9db354d1835c16d16d7ea816f8d29a7dc2abac2c4151157f614f8e5dd39a1ccb416d6d7056538c78bfdba2424abf

  • SSDEEP

    12288:hILk+Jr3/Z3HWBldgWaouk0/nAohnErIZfNOeiiOp9hqhVKcPks1Tnpt:w/J2BnJaO0/AoerIvOe5C9hYVKfs1Ft

Malware Config

Signatures

  • Ardamax

    A keylogger first seen in 2013.

  • Ardamax main executable 1 IoCs
  • Executes dropped EXE 3 IoCs
  • Loads dropped DLL 11 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Drops file in System32 directory 6 IoCs
  • Drops file in Windows directory 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Office loads VBA resources, possible macro or embedded object present
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of SetWindowsHookEx 9 IoCs
  • Suspicious use of WriteProcessMemory 20 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2a98aa48cb2a707c1c8b276c39be77a3_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\2a98aa48cb2a707c1c8b276c39be77a3_JaffaCakes118.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2448
    • C:\Users\Admin\AppData\Local\Temp\BMC Killer.exe
      "C:\Users\Admin\AppData\Local\Temp\BMC Killer.exe"
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:2452
      • C:\Users\Admin\AppData\Local\Temp\Exporer32.exe
        "C:\Users\Admin\AppData\Local\Temp\Exporer32.exe"
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Drops file in System32 directory
        • Suspicious use of WriteProcessMemory
        PID:2724
        • C:\Windows\SysWOW64\28463\ICQV.exe
          "C:\Windows\system32\28463\ICQV.exe"
          4⤵
          • Executes dropped EXE
          • Loads dropped DLL
          • Adds Run key to start application
          • Drops file in System32 directory
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of SetWindowsHookEx
          PID:2112
    • C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE
      "C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\BMC FILES IS BEEN DELETED.doc"
      2⤵
      • Loads dropped DLL
      • Drops file in Windows directory
      • Suspicious behavior: AddClipboardFormatListener
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:2620
      • C:\Windows\splwow64.exe
        C:\Windows\splwow64.exe 12288
        3⤵
          PID:1508

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\BMC FILES IS BEEN DELETED.doc

      Filesize

      185B

      MD5

      742c844c3a2bf06e759ee64203e00c9d

      SHA1

      28bfd095f6ea14f107433b684436f9d1436e8d49

      SHA256

      6c22fc85eacdff707103c06eec6d64b30f426adfec4b7aeb795849aab113ac53

      SHA512

      85879968c0b30727e00a5c452c17b56819a0e814ae5c9781bc0bcd2bbe34eb6282a8dc768b9aedc6a7827d2da0a18e2d5c057bdf9b48a1b023522d3ca577972c

    • C:\Users\Admin\AppData\Roaming\Microsoft\Templates\Normal.dotm

      Filesize

      19KB

      MD5

      690ff52ea5252c40d11eaba1190f4f4c

      SHA1

      87876bda7ec392896e50f3475966660b357d663c

      SHA256

      63b161b28c70b59690e744ea0fbe19b5ef8ad76becedf6d3b7f1150432cc4cb6

      SHA512

      657e7478498d5807a6f5d992daade09bd0d92cd769b64b5658c028671721b5ec6d705a38e2068fe70e2da19b57c913cdfb69950441d19c8ad9a20b6056c50250

    • C:\Windows\SysWOW64\28463\AKV.exe

      Filesize

      395KB

      MD5

      d63cc8679a63448db1c64252e14e4ab5

      SHA1

      10b3a9ac4bc16e8ac1cd05e50b4d540fa3ef223e

      SHA256

      29b3646a556879a4a48e4f2f81e09179c34ac2051ed3e4f4c28e293092470d3d

      SHA512

      cb1911e1a77fb9be560aa4fd8bbef65e181b6d4438d65657501dbcd8dbf488ba01738a7222f35f8d4317e8df8c6f307d9e3623d6e3e45753e138b80fb68ff768

    • C:\Windows\SysWOW64\28463\ICQV.001

      Filesize

      404B

      MD5

      1bceab23d5ab382a596537d50697b649

      SHA1

      715311b1b0bcf5ce6b11d9661a5c720290ec6ad9

      SHA256

      6291f683a6926b840eb4730a24bf334b661aca095efba350768033616285b452

      SHA512

      9c36ccea46b13db81de0bf8a4e5df4804c2a4670f66c2a5c7d18d2807362c132236d1630709cb2372d3b3af44e113fcb2118a66a826b90fc74c004752e046792

    • C:\Windows\SysWOW64\28463\ICQV.006

      Filesize

      8KB

      MD5

      81e20f4361cf8f5a57812871c24d945e

      SHA1

      5d7877d6959ab26599b05795a71633f00c37a3da

      SHA256

      e6e8b4a29dccb3531f58c75b754caf7f26afe3e7043239305fd0ae7ab2f7571d

      SHA512

      69b1d75ab7123054bf98cf3a0f2cc7a0749cda8d85ebdef85be7d89f1454154ce29070907b934727a6c5276ff430e94810b87a5634d25d8529df9ee36fd20818

    • C:\Windows\SysWOW64\28463\ICQV.007

      Filesize

      5KB

      MD5

      e9fbdcc2f5fb657fa519b3f5c69fc52d

      SHA1

      c49cca77b46a59d620711de7564d43e5dafcd2b5

      SHA256

      cc440cfc4ce1a1ff503cc9e8937c59aae64bfce4daa3e7dc757220a25cadc2e4

      SHA512

      913759967e16b99d8ea66433e5dc99d5ddbf737be6784306e67c2b23a525b7a578fcae1028221d3209abc452ff30508eb750c62113c3868a7af36b544e525fb1

    • \Users\Admin\AppData\Local\Temp\@3830.tmp

      Filesize

      4KB

      MD5

      25530555085337eb644b061f239aa9d4

      SHA1

      8d91e099aba5439d4bfa8bce464c94e3e1acf620

      SHA256

      3fb6b438ad1530abdd068bffb303fb8a4de51430e0e18ddb6b1a0469ffab8325

      SHA512

      b1f9de0c276533a5a7070aeb2b6415cc1c0bdd2baf5e0645c6ac5ba767cab0d76e5b4461800d89724992af2c863294ada3c1eb2e4516183fe2010c33d47d6a2a

    • \Users\Admin\AppData\Local\Temp\BMC Killer.exe

      Filesize

      527KB

      MD5

      484fefb87e6b935ebe57cdde015b9659

      SHA1

      619eb3197a89ef92f4871db3aade055e89271b52

      SHA256

      2defd256a5409dfd9cc44b64801bd814b5ce329688b1ec47847ef37cb9b5ec75

      SHA512

      1f5b2abdebcfbe50f35e4358f5c2afbe5d5c8da6f1de9796fe6b0ea5a81d7ec4fe3adaf9de29c48838b7ddda75219bacb473fdd2b70f39c08ab0b3740b7a95d3

    • \Users\Admin\AppData\Local\Temp\Exporer32.exe

      Filesize

      503KB

      MD5

      5b81d2a722548fda35998dd57c086eb1

      SHA1

      4979fe0cc17b9b8a28cf84ea8a42ed920c282703

      SHA256

      199ce83c1df59c827f382f42f90d4a0c002b212b5317dbb266a7eab11ab7182a

      SHA512

      846d3194e6e5ce4b2b4f3aa972ab540224600842a4db4e2c6055022503db269721c03fafbfa6c11051f2eca5d9924d3c1868d422d7002149494dc2d1a2a0a233

    • \Windows\SysWOW64\28463\ICQV.exe

      Filesize

      473KB

      MD5

      97d8ad45f48b4b28a93aab94699b7168

      SHA1

      8b69b7fd7c008b95d12386f6da415097e72151de

      SHA256

      661df22a66b2062b233eb0bd9665de924cfe0ac9c6ba29e20ffef24f817f9331

      SHA512

      3351eac970bab391de410fcf1937da75d2e4722b808f10332f487ddfe469544e32e7d4ed0e5bdc19bd5f472cffcc55ca1498c95945b4e9c4ceff6ff5cc521c8a

    • memory/2448-15-0x0000000000D10000-0x0000000000D17000-memory.dmp

      Filesize

      28KB

    • memory/2448-20-0x00000000746D0000-0x0000000074DBE000-memory.dmp

      Filesize

      6.9MB

    • memory/2448-13-0x0000000000D10000-0x0000000000D17000-memory.dmp

      Filesize

      28KB

    • memory/2448-0-0x00000000746DE000-0x00000000746DF000-memory.dmp

      Filesize

      4KB

    • memory/2448-2-0x00000000746D0000-0x0000000074DBE000-memory.dmp

      Filesize

      6.9MB

    • memory/2448-1-0x0000000001290000-0x000000000129C000-memory.dmp

      Filesize

      48KB

    • memory/2452-39-0x0000000000400000-0x0000000000407000-memory.dmp

      Filesize

      28KB

    • memory/2452-14-0x0000000000400000-0x0000000000407000-memory.dmp

      Filesize

      28KB

    • memory/2620-22-0x000000006D00D000-0x000000006D018000-memory.dmp

      Filesize

      44KB

    • memory/2620-21-0x000000005FFF0000-0x0000000060000000-memory.dmp

      Filesize

      64KB

    • memory/2620-19-0x000000002F7C1000-0x000000002F7C2000-memory.dmp

      Filesize

      4KB

    • memory/2620-69-0x000000006D00D000-0x000000006D018000-memory.dmp

      Filesize

      44KB

    • memory/2620-87-0x000000005FFF0000-0x0000000060000000-memory.dmp

      Filesize

      64KB