General

  • Target

    4ada0281fa1ed7bdb8041dcb4ce835ca_JaffaCakes118

  • Size

    647KB

  • Sample

    240715-wywn3stanr

  • MD5

    4ada0281fa1ed7bdb8041dcb4ce835ca

  • SHA1

    66cb2e1d3139a150e5cba6416c0d311e2a93e7cc

  • SHA256

    c7a080639a5f7c5c28fe45b9aa6e3210fec8dfee9ed2c3ed847dd4e0a0041000

  • SHA512

    b2973bb50b0c90142945838a3ed7f9771c5628916768948c176bb01b81265c10067b9210cbd797ecc1f71ab953ab50d0caa191e9d6d1bbc7b14fc54a8e4f59af

  • SSDEEP

    12288:J3TdtLW5WIj1YSSdFxiBSXyMzBUWb9lx/9AgHLo8OW+rBAf:hDsj1dEyBcJ9nPx/igrp+Wf

Malware Config

Targets

    • Target

      4ada0281fa1ed7bdb8041dcb4ce835ca_JaffaCakes118

    • Size

      647KB

    • MD5

      4ada0281fa1ed7bdb8041dcb4ce835ca

    • SHA1

      66cb2e1d3139a150e5cba6416c0d311e2a93e7cc

    • SHA256

      c7a080639a5f7c5c28fe45b9aa6e3210fec8dfee9ed2c3ed847dd4e0a0041000

    • SHA512

      b2973bb50b0c90142945838a3ed7f9771c5628916768948c176bb01b81265c10067b9210cbd797ecc1f71ab953ab50d0caa191e9d6d1bbc7b14fc54a8e4f59af

    • SSDEEP

      12288:J3TdtLW5WIj1YSSdFxiBSXyMzBUWb9lx/9AgHLo8OW+rBAf:hDsj1dEyBcJ9nPx/igrp+Wf

    • Ardamax

      A keylogger first seen in 2013.

    • Ardamax main executable

    • Modifies WinLogon for persistence

    • Disables RegEdit via registry modification

    • Disables Task Manager via registry modification

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • AutoIT Executable

      AutoIT scripts compiled to PE executables.

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks