Analysis

  • max time kernel
    121s
  • max time network
    121s
  • platform
    windows7_x64
  • resource
    win7-20240705-en
  • resource tags

    arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system
  • submitted
    13/07/2024, 22:35

General

  • Target

    439ddf6bd306f2c9b9b059cefae5191a_JaffaCakes118.exe

  • Size

    1.1MB

  • MD5

    439ddf6bd306f2c9b9b059cefae5191a

  • SHA1

    d2acd93b0da5ca2539a30eb294b789d195cf54b3

  • SHA256

    5e5751ab12a05b80925a7159c8e95ce78106fd9d87a1fdbe1c54203acf52f3f6

  • SHA512

    02f7ea2ee6d19173745706634b14e628970818d3fdc71d94c8162645e23a83c88a6509e09cdd8162b396e02e4348e731e05fb08b12fea905860cf4e3f05b4114

  • SSDEEP

    24576:wHvZTgeTSLuCulRS6aJ0Kk8ITXMiKc2quYfT4DkTNOK03RKgtrlML5QfOebfqgb:4BTdGqvU/eKk84car4kMbpmYbfq

Malware Config

Signatures

  • Ardamax

    A keylogger first seen in 2013.

  • Ardamax main executable 1 IoCs
  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 5 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Drops file in System32 directory 6 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of SetWindowsHookEx 4 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\439ddf6bd306f2c9b9b059cefae5191a_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\439ddf6bd306f2c9b9b059cefae5191a_JaffaCakes118.exe"
    1⤵
    • Loads dropped DLL
    • Drops file in System32 directory
    • Suspicious use of WriteProcessMemory
    PID:2356
    • C:\Windows\SysWOW64\VWBTEM\VMD.exe
      "C:\Windows\system32\VWBTEM\VMD.exe"
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Adds Run key to start application
      • Drops file in System32 directory
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of SetWindowsHookEx
      PID:2336
    • C:\Users\Admin\AppData\Local\Temp\JDownloadeer.exe
      "C:\Users\Admin\AppData\Local\Temp\JDownloadeer.exe"
      2⤵
      • Executes dropped EXE
      • Suspicious use of WriteProcessMemory
      PID:1648
      • C:\Program Files\Java\jre7\bin\javaw.exe
        "C:\Program Files\Java\jre7\bin\javaw.exe" -Xmx512m -jar "C:\Users\Admin\AppData\Local\Temp\App\JDownloader\JDownloader.jar"
        3⤵
          PID:2828

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Windows\SysWOW64\VWBTEM\AKV.exe

      Filesize

      461KB

      MD5

      7e335c1258740a5798c2b3eea5a97229

      SHA1

      6ce1e98ddc05a4b9e772901c9bc6caae4103267f

      SHA256

      667ab5d791b89216a46f7dd3a1bcb9b7e5f235415a74a9678ca41cec051c462f

      SHA512

      8c190dd139f5459a91c81871f53fc080a81c6397c68cb5b0ee195571012cc8af923b10cd77301da1816f935d36a0587d1c75126f5553005a0f50eb22d3441cb4

    • C:\Windows\SysWOW64\VWBTEM\VMD.001

      Filesize

      61KB

      MD5

      9fca42b7fa3132ded471b886c4bf8a51

      SHA1

      86109ac13f8b63bd3467bbf05e39c5cf9bd11d26

      SHA256

      c519bcfc50245700b30cb417478b46810443b03a6447387dd1d0a13966ff00dd

      SHA512

      bbdd590e1bd2971fbc6a462f6501341c0808d658ba3407b051f9d299d9babf0632af092d64c6ad290d4ae5d9db8c367898a064bbea916c516c0a54066ad698ab

    • C:\Windows\SysWOW64\VWBTEM\VMD.002

      Filesize

      43KB

      MD5

      4c30b3e90b3da5619bc0d5f53c025135

      SHA1

      829f487b7c26f6cb8b7f211b2331abbc5229aa61

      SHA256

      b632cedab7ce3d19eebc0d31864dc8c38cd249dcbde299cda818f7026ec294cf

      SHA512

      fd0b36fb43c6b62f6d47455b392276d4e3710b204ef11c70cefed417740a4b5d9357ba37f612f3f87d539175af312ead05bc7a4360fe3e26fd43c56e856e6313

    • C:\Windows\SysWOW64\VWBTEM\VMD.004

      Filesize

      1KB

      MD5

      4df40848ecc79487389e115c32e8dc3f

      SHA1

      4f848790402ef7c43d7e091a767e207d1e7c7d3f

      SHA256

      8f0ae843a98181bb460474207d1bcaf14ecee858112a21dd595db8f8699d8e67

      SHA512

      d85dd5dbf49b05454d738f5ded1659b4ab924d6d3d861aa3196dc8393374f0f3074172cbff63e7d5686298d8ac24d9a9177b3ea9eb24b64cbb8eb1b54edee99a

    • \Users\Admin\AppData\Local\Temp\JDownloadeer.exe

      Filesize

      41KB

      MD5

      2720fd3043177a9cd731a27daa45bb97

      SHA1

      302557b7819961ce05cb2d187139d16b85a4da5e

      SHA256

      7c659324ff0792be97b09888e4003ea57150da7850803bf1eb2918230758198f

      SHA512

      185efd6eaaf8913346b4c9fa33cfd7ee6b0a736edbce7f39e99dab6eb295c0b234836cf1fb7cab32803aac12946eb8104621d9b02b04bb7f3c51920e6ec95841

    • \Windows\SysWOW64\VWBTEM\VMD.exe

      Filesize

      1.5MB

      MD5

      9c28244f2dbe3a4758b532838b0040c9

      SHA1

      4b58bb4033d43ae64af6c18db48d5d25e23f6121

      SHA256

      cb770745d547a27a4b99fdbe27a672135f812b29d94fd2b843d06bb5aa1748aa

      SHA512

      24ed3d4c6aae307a0f1bb1f063b211152644b06d7425a5fe24b09f5f747dd63011451cef3f47cc4985b3316cf1213c056d38768ccb7f44cb2fab28cf4e30e969

    • memory/1648-27-0x0000000000400000-0x0000000000416000-memory.dmp

      Filesize

      88KB

    • memory/2336-16-0x00000000001C0000-0x00000000001C1000-memory.dmp

      Filesize

      4KB

    • memory/2336-28-0x00000000001C0000-0x00000000001C1000-memory.dmp

      Filesize

      4KB