Analysis

  • max time kernel
    150s
  • max time network
    131s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    11-08-2024 12:12

General

  • Target

    8a509bb4520c25623e28ae3a6d16091b_JaffaCakes118.exe

  • Size

    799KB

  • MD5

    8a509bb4520c25623e28ae3a6d16091b

  • SHA1

    c3873283621afe782f327af5749fbf4a8ef9b662

  • SHA256

    1813c39c2f2e1d3584904ba014882fec75e51a50debf4e9670e8a03beacd7964

  • SHA512

    ca316bf77db21d73921b6364e57354e83450eae6d98e5e24516c0c21ce9ccc44f4888f09a8eb0fa1ec9db53285089b27fcb3c95859c7cb5a19924412d2f4ed20

  • SSDEEP

    24576:FouTWebeT2B1YC+oApJ15P3NIFaZHoy+DyQw:iuTWieiByCP0j5/K89oy+OD

Malware Config

Signatures

  • Ardamax

    A keylogger first seen in 2013.

  • Ardamax main executable 1 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 5 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Drops file in System32 directory 5 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Program crash 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Checks processor information in registry 2 TTPs 3 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Modifies Internet Explorer settings 1 TTPs 1 IoCs
  • Modifies registry class 1 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of SetWindowsHookEx 17 IoCs
  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\8a509bb4520c25623e28ae3a6d16091b_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\8a509bb4520c25623e28ae3a6d16091b_JaffaCakes118.exe"
    1⤵
    • Checks computer location settings
    • Loads dropped DLL
    • Drops file in System32 directory
    • System Location Discovery: System Language Discovery
    • Modifies registry class
    • Suspicious use of WriteProcessMemory
    PID:212
    • C:\Windows\SysWOW64\9283\XGQA.exe
      "C:\Windows\system32\9283\XGQA.exe"
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Adds Run key to start application
      • Drops file in System32 directory
      • System Location Discovery: System Language Discovery
      • Modifies Internet Explorer settings
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of SetWindowsHookEx
      PID:3500
    • C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE
      "C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" "C:\Users\Admin\AppData\Local\Temp\ORDER.xls"
      2⤵
      • Checks processor information in registry
      • Enumerates system info in registry
      • Suspicious behavior: AddClipboardFormatListener
      • Suspicious use of SetWindowsHookEx
      PID:4060
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -u -p 212 -s 684
      2⤵
      • Loads dropped DLL
      • Program crash
      PID:3464
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 416 -p 212 -ip 212
    1⤵
      PID:4040
    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --field-trial-handle=4292,i,1729213506309163284,12809566808978835441,262144 --variations-seed-version --mojo-platform-channel-handle=4120 /prefetch:8
      1⤵
        PID:4280

      Network

      MITRE ATT&CK Enterprise v15

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Local\Temp\@AC58.tmp

        Filesize

        41KB

        MD5

        c6bd86e00a5cb9a8a40b87ba9818103d

        SHA1

        9a834a3a0399e38bc24a54c0ec586d60d8b5a5c2

        SHA256

        540e028727362a64b7c27253354fe04b9b74caedb2e5a3e9af60d98872ac3c9e

        SHA512

        b9f82601a4f0377f951c4a2cfa36336aa7df53e56fc4b3339db382db7368d95cd6efa625ea394661472c2d100e6ac60b49ed8c8fe60bbde67f7af0ca12f556dc

      • C:\Users\Admin\AppData\Local\Temp\ORDER.xls

        Filesize

        16KB

        MD5

        a2497311efe4072dd87abcc06c62f7ba

        SHA1

        d4f6ec9f631a4196f5befc1ffb09f91ca5454b28

        SHA256

        12eed53f4ace0911f3f6689d6d21cafdf669f37877a3edf068ef4ecbc87df511

        SHA512

        e85a0f5b61227c9d9682a5a6857f7b401273ebcd72d36ce44079ea3d93b18adb984492e6b28a7e8fefd766c9e25e7c9fed040dd9b9b943c7f091f49f73d81906

      • C:\Windows\SysWOW64\9283\XGQA.001

        Filesize

        876B

        MD5

        c737614cc655e215a289b26ed578a07b

        SHA1

        90b600621204dea76436b433e0fefd5933bbd995

        SHA256

        05ea0a913670b524687d9885b198da93b68fe75266687e9d76b6d338c356a6fa

        SHA512

        18a7acb2ebea14cc0edfcaefcdc0253ff056f895ba96340e907e258f6005502b47e1fe4387ffb9000bb68ed5715b6c4b4611576ffb3db95f3b7a80a6afb00abe

      • C:\Windows\SysWOW64\9283\XGQA.006

        Filesize

        60KB

        MD5

        3191cbb2f371fb39acf9e97601a6190c

        SHA1

        1ac9e4f91097d5ff1a8b7e879115ed73b15fdddd

        SHA256

        c41cf85fa07cbcaeaf549aa51d9501f70563aa2d6772d6f1c768e9ad5cdeafec

        SHA512

        febc17d382f4087ebdb56b031c3029eb2c8113de77d8820e80f62cf149952e97d541f72f945078cd3fdfb46df4b3781a83d487facee2072aaadbc01a37d9d60a

      • C:\Windows\SysWOW64\9283\XGQA.007

        Filesize

        42KB

        MD5

        57dc2ece810bda49bef41d049d295fbf

        SHA1

        d930bc781c2cde133cc549bafc6db8209bd92178

        SHA256

        0fc50d2a9de2d03fe8bea07564816f0f22fb836a8e13fa5f71b0e313e6570ab7

        SHA512

        a213ee00c5caebb9360eea40b06e5dd533aa54b5d117940b72e5dd67a84a9816f13daec806878c5cd6200b88a5a0d72b46cb9a5b37e62ea53dc101b0ced2d413

      • C:\Windows\SysWOW64\9283\XGQA.exe

        Filesize

        1.2MB

        MD5

        011f4de8c53021b41567afbe1ce5807a

        SHA1

        4a93acf18f153106e7fe846f22e1aab08485d1c7

        SHA256

        7add4f20a7125bc818db4bc18fe612875b0506ce2a7d69c29ff736e78365d714

        SHA512

        18e2a3ebeab351e362ae38b0780a791a39a59257f3f96b1052fa0761a7f22498c38e235426bf47ee9c4845b9ed652866cfc627446750caece237c07cb253918f

      • memory/3500-37-0x00000000023A0000-0x00000000023AE000-memory.dmp

        Filesize

        56KB

      • memory/3500-25-0x00000000006B0000-0x00000000006B1000-memory.dmp

        Filesize

        4KB

      • memory/3500-62-0x00000000006B0000-0x00000000006B1000-memory.dmp

        Filesize

        4KB

      • memory/4060-42-0x00007FFA4DD30000-0x00007FFA4DF25000-memory.dmp

        Filesize

        2.0MB

      • memory/4060-45-0x00007FFA4DD30000-0x00007FFA4DF25000-memory.dmp

        Filesize

        2.0MB

      • memory/4060-32-0x00007FFA4DD30000-0x00007FFA4DF25000-memory.dmp

        Filesize

        2.0MB

      • memory/4060-28-0x00007FFA0DDB0000-0x00007FFA0DDC0000-memory.dmp

        Filesize

        64KB

      • memory/4060-41-0x00007FFA4DD30000-0x00007FFA4DF25000-memory.dmp

        Filesize

        2.0MB

      • memory/4060-29-0x00007FFA4DDCD000-0x00007FFA4DDCE000-memory.dmp

        Filesize

        4KB

      • memory/4060-44-0x00007FFA4DD30000-0x00007FFA4DF25000-memory.dmp

        Filesize

        2.0MB

      • memory/4060-43-0x00007FFA4DD30000-0x00007FFA4DF25000-memory.dmp

        Filesize

        2.0MB

      • memory/4060-46-0x00007FFA0B970000-0x00007FFA0B980000-memory.dmp

        Filesize

        64KB

      • memory/4060-27-0x00007FFA0DDB0000-0x00007FFA0DDC0000-memory.dmp

        Filesize

        64KB

      • memory/4060-47-0x00007FFA0B970000-0x00007FFA0B980000-memory.dmp

        Filesize

        64KB

      • memory/4060-40-0x00007FFA4DD30000-0x00007FFA4DF25000-memory.dmp

        Filesize

        2.0MB

      • memory/4060-39-0x00007FFA4DD30000-0x00007FFA4DF25000-memory.dmp

        Filesize

        2.0MB

      • memory/4060-38-0x00007FFA4DD30000-0x00007FFA4DF25000-memory.dmp

        Filesize

        2.0MB

      • memory/4060-33-0x00007FFA0DDB0000-0x00007FFA0DDC0000-memory.dmp

        Filesize

        64KB

      • memory/4060-31-0x00007FFA0DDB0000-0x00007FFA0DDC0000-memory.dmp

        Filesize

        64KB

      • memory/4060-30-0x00007FFA4DD30000-0x00007FFA4DF25000-memory.dmp

        Filesize

        2.0MB

      • memory/4060-26-0x00007FFA0DDB0000-0x00007FFA0DDC0000-memory.dmp

        Filesize

        64KB

      • memory/4060-63-0x00007FFA4DD30000-0x00007FFA4DF25000-memory.dmp

        Filesize

        2.0MB