Analysis

  • max time kernel
    148s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240730-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240730-enlocale:en-usos:windows10-2004-x64system
  • submitted
    01-08-2024 02:46

General

  • Target

    7ee5741a0e7c220db4b1a6d719730fde_JaffaCakes118.exe

  • Size

    940KB

  • MD5

    7ee5741a0e7c220db4b1a6d719730fde

  • SHA1

    45fd4c43f6f03f62a913a4292d68c8a0637660dc

  • SHA256

    29ab8dbea928c0a5eab52ffe79d7f9e51d284ea5138bc31a7b7855a8c6ebbf96

  • SHA512

    622bb0619e3bd1f4956fd758e98d3bf5b6d1c622e0f7c9ae0e1e31e156a5c1f41404038e5b973db4ccc7def25c7671c9b732f026ae82c4c8326b0814b6025f34

  • SSDEEP

    24576:FU/pTqAYpJIgNc7+l+BtBQhWrVFE6XIjVgMGd5yrol:qRTqZJIUxsGW8ZgB6o

Malware Config

Signatures

  • Ardamax

    A keylogger first seen in 2013.

  • Ardamax main executable 1 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Drops file in System32 directory 5 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Checks processor information in registry 2 TTPs 3 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Modifies registry class 1 IoCs
  • Suspicious behavior: AddClipboardFormatListener 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of SetWindowsHookEx 13 IoCs
  • Suspicious use of WriteProcessMemory 5 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\7ee5741a0e7c220db4b1a6d719730fde_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\7ee5741a0e7c220db4b1a6d719730fde_JaffaCakes118.exe"
    1⤵
    • Checks computer location settings
    • Drops file in System32 directory
    • System Location Discovery: System Language Discovery
    • Modifies registry class
    • Suspicious use of WriteProcessMemory
    PID:1576
    • C:\Windows\SysWOW64\FJFEBM\SIC.exe
      "C:\Windows\system32\FJFEBM\SIC.exe"
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Adds Run key to start application
      • Drops file in System32 directory
      • System Location Discovery: System Language Discovery
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of SetWindowsHookEx
      PID:1668
    • C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE
      "C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\event 30-04.doc" /o ""
      2⤵
      • Checks processor information in registry
      • Enumerates system info in registry
      • Suspicious behavior: AddClipboardFormatListener
      • Suspicious use of SetWindowsHookEx
      PID:3696

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\TCDF012.tmp\iso690.xsl

    Filesize

    263KB

    MD5

    ff0e07eff1333cdf9fc2523d323dd654

    SHA1

    77a1ae0dd8dbc3fee65dd6266f31e2a564d088a4

    SHA256

    3f925e0cc1542f09de1f99060899eafb0042bb9682507c907173c392115a44b5

    SHA512

    b4615f995fab87661c2dbe46625aa982215d7bde27cafae221dca76087fe76da4b4a381943436fcac1577cb3d260d0050b32b7b93e3eb07912494429f126bb3d

  • C:\Users\Admin\AppData\Local\Temp\event 30-04.doc

    Filesize

    154KB

    MD5

    0401d564ef74d730cffbaaca249dce70

    SHA1

    4287c7f00ef70b4acd8d05f808cdadc8786fbf21

    SHA256

    b71f365fef94334e7893288c3a5fbc3bf2510eb6f549d62679f370fccafcd55b

    SHA512

    1e0613829bc121d18917d7f261f3d0b9b465149c27a4d7432087b5af2ee7eb63ebb2ce2079f41542d58ff50c7f9aebef0a524a9f1bbc53dcde49497df705febf

  • C:\Users\Admin\AppData\Roaming\Microsoft\UProof\CUSTOM.DIC

    Filesize

    2B

    MD5

    f3b25701fe362ec84616a93a45ce9998

    SHA1

    d62636d8caec13f04e28442a0a6fa1afeb024bbb

    SHA256

    b3d510ef04275ca8e698e5b3cbb0ece3949ef9252f0cdc839e9ee347409a2209

    SHA512

    98c5f56f3de340690c139e58eb7dac111979f0d4dffe9c4b24ff849510f4b6ffa9fd608c0a3de9ac3c9fd2190f0efaf715309061490f9755a9bfdf1c54ca0d84

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\fb3b0dbfee58fac8.customDestinations-ms

    Filesize

    1KB

    MD5

    d233f6065be6445642fc73d5c83b580e

    SHA1

    7e9aae6a4aa8c744056cacb989ee871cf470e50a

    SHA256

    d3720b4e56864e61e210fe03dd8dd3338e09105f622463e130b00a51f15811d8

    SHA512

    0ad2803d4d9c81ff201e5242cb78129e7104f7f6a771a24c812e24b87497888d2a79376cf4ca14eb62bb750b4766829757ce22b8091ca0b32e7754ee0a7e4622

  • C:\Windows\SysWOW64\FJFEBM\SIC.001

    Filesize

    61KB

    MD5

    4eb04b9187bbf3e3c33bf95e74eb6262

    SHA1

    ca5dcaea5ef4ba48c0bb06635c0b5abed4f0f342

    SHA256

    cf84d5704b350beaf1f2b46dc44bd372141d7554a8958ce22c0a84a3f21f2fe7

    SHA512

    aeaa608cd4f66ba817a7e8698d17f9801c9cedf99875decff39bc18cebdec3947f02566bdf21d9096e5a6a6b740717ab06d46a2a9605bf8e8fa0fee12fe17e81

  • C:\Windows\SysWOW64\FJFEBM\SIC.002

    Filesize

    43KB

    MD5

    1aed6fee0870288cdb607393fc2f33a1

    SHA1

    584fd8d5ffbced19dd09b8b71cee9026c0ac65c6

    SHA256

    02c4eef7045896258d00077e123719aa256c606f4e38c417965ba5f64d48e180

    SHA512

    15e5b7843b07bcb4a638057b05712c66b285d70ace24ab3a4c125d24d538ace20cfac179accefa417d7790f7a095327affd3cd73d9eacaa632356f95a9fde3b8

  • C:\Windows\SysWOW64\FJFEBM\SIC.004

    Filesize

    1KB

    MD5

    842fca62e33029a1d63c52e3bccbe57e

    SHA1

    c4609c3d1e219a8cb06e0fdb568a2dbabb371d01

    SHA256

    47f411e46f2b98dafe11e3033e61d02419230c971aa53cd962eeed44906b2c98

    SHA512

    338f1e5b6d3373449a2ea30853717d70263d59256445586ab7de8d5ba2661fbba2159ef992b774eab65f57ac0ebaf5816f7f2d7d660549e70c8ec14b5fcfc512

  • C:\Windows\SysWOW64\FJFEBM\SIC.exe

    Filesize

    1.5MB

    MD5

    193cfb5ea668afa421a01778d2c66530

    SHA1

    3f847421af343ed21b6287dc3ce243cf0a5fba6e

    SHA256

    a6d79ab4ec98a3c1a4c8bacb97a6497c583a56e09e9d132d4f0c9ab0bb6e6892

    SHA512

    53bda8967976f86dbce61fc044ec82157ba5eda3f04d214da874d20dee4419d03ff84e925f71360a0f48050bf6b64614dd2c2f954fb76f8e1a110b03eeed0f4e

  • memory/1668-17-0x0000000000620000-0x0000000000621000-memory.dmp

    Filesize

    4KB

  • memory/1668-429-0x0000000000620000-0x0000000000621000-memory.dmp

    Filesize

    4KB

  • memory/3696-27-0x00007FFC6AAF0000-0x00007FFC6AB00000-memory.dmp

    Filesize

    64KB

  • memory/3696-39-0x00007FFC684B0000-0x00007FFC684C0000-memory.dmp

    Filesize

    64KB

  • memory/3696-30-0x00007FFCAAA70000-0x00007FFCAAC65000-memory.dmp

    Filesize

    2.0MB

  • memory/3696-29-0x00007FFCAAA70000-0x00007FFCAAC65000-memory.dmp

    Filesize

    2.0MB

  • memory/3696-24-0x00007FFC6AAF0000-0x00007FFC6AB00000-memory.dmp

    Filesize

    64KB

  • memory/3696-34-0x00007FFCAAA70000-0x00007FFCAAC65000-memory.dmp

    Filesize

    2.0MB

  • memory/3696-36-0x00007FFCAAA70000-0x00007FFCAAC65000-memory.dmp

    Filesize

    2.0MB

  • memory/3696-35-0x00007FFCAAA70000-0x00007FFCAAC65000-memory.dmp

    Filesize

    2.0MB

  • memory/3696-37-0x00007FFC684B0000-0x00007FFC684C0000-memory.dmp

    Filesize

    64KB

  • memory/3696-32-0x00007FFCAAA70000-0x00007FFCAAC65000-memory.dmp

    Filesize

    2.0MB

  • memory/3696-38-0x00007FFCAAA70000-0x00007FFCAAC65000-memory.dmp

    Filesize

    2.0MB

  • memory/3696-31-0x00007FFCAAA70000-0x00007FFCAAC65000-memory.dmp

    Filesize

    2.0MB

  • memory/3696-25-0x00007FFC6AAF0000-0x00007FFC6AB00000-memory.dmp

    Filesize

    64KB

  • memory/3696-28-0x00007FFC6AAF0000-0x00007FFC6AB00000-memory.dmp

    Filesize

    64KB

  • memory/3696-26-0x00007FFCAAB0D000-0x00007FFCAAB0E000-memory.dmp

    Filesize

    4KB

  • memory/3696-23-0x00007FFC6AAF0000-0x00007FFC6AB00000-memory.dmp

    Filesize

    64KB

  • memory/3696-430-0x00007FFCAAA70000-0x00007FFCAAC65000-memory.dmp

    Filesize

    2.0MB

  • memory/3696-450-0x00007FFC6AAF0000-0x00007FFC6AB00000-memory.dmp

    Filesize

    64KB

  • memory/3696-451-0x00007FFC6AAF0000-0x00007FFC6AB00000-memory.dmp

    Filesize

    64KB

  • memory/3696-452-0x00007FFC6AAF0000-0x00007FFC6AB00000-memory.dmp

    Filesize

    64KB

  • memory/3696-453-0x00007FFC6AAF0000-0x00007FFC6AB00000-memory.dmp

    Filesize

    64KB

  • memory/3696-454-0x00007FFCAAA70000-0x00007FFCAAC65000-memory.dmp

    Filesize

    2.0MB