Analysis

  • max time kernel
    120s
  • max time network
    119s
  • platform
    windows7_x64
  • resource
    win7-20240705-en
  • resource tags

    arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system
  • submitted
    15-08-2024 13:36

General

  • Target

    9a3e0e49a8fd9366c9f0120f25ee8503_JaffaCakes118.exe

  • Size

    1.3MB

  • MD5

    9a3e0e49a8fd9366c9f0120f25ee8503

  • SHA1

    e64ce5b297fad9d8e8644a2098f741fe9e705780

  • SHA256

    ef3b646c9caec59d861e509022d6394d2dc930ce7877b83bae361fe749d1d3d6

  • SHA512

    7acdb43ccc940d50308a6d5b729e52de730fb1863b50911ee8fd1dcc36b8312e1bbc341dad6bd2c7bf7854c757d4723b0ad4289be5f9a7307f1709efa95d62b3

  • SSDEEP

    24576:bZxTl5zwghzjbJSxUDZ9eCZiEw0WYVMOGEX+Qw6+18VEIkQwMvDfj4gi+Z4BRrip:bXTnwIzjbUe3e0wEVXd1wIVPXeBY

Malware Config

Signatures

  • Ardamax

    A keylogger first seen in 2013.

  • Ardamax main executable 1 IoCs
  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 4 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Drops file in System32 directory 6 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of SetWindowsHookEx 4 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\9a3e0e49a8fd9366c9f0120f25ee8503_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\9a3e0e49a8fd9366c9f0120f25ee8503_JaffaCakes118.exe"
    1⤵
    • Loads dropped DLL
    • Drops file in System32 directory
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:2996
    • C:\Windows\SysWOW64\EPAXJV\OGR.exe
      "C:\Windows\system32\EPAXJV\OGR.exe"
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Adds Run key to start application
      • Drops file in System32 directory
      • System Location Discovery: System Language Discovery
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of SetWindowsHookEx
      PID:340
    • C:\Users\Admin\AppData\Local\Temp\pokebot.exe
      "C:\Users\Admin\AppData\Local\Temp\pokebot.exe"
      2⤵
      • Executes dropped EXE
      PID:2584

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Windows\SysWOW64\EPAXJV\AKV.exe

    Filesize

    456KB

    MD5

    1f29b1075a91b3da0ccc0b9c49eece56

    SHA1

    048e675f087181035aedece9e7b11d065c6355cc

    SHA256

    4f6825548b32329c3360ed9abb7c0a6809a2c2291cf0bcaac511a9fa32a6336e

    SHA512

    7e152caf055f57f599ecc1e3a404b540b721b3315d2ba16bff6eb21f03edeb3a06ae185621e3139293612d94210f500f098bd281489ca7f336efd8b5284ee060

  • C:\Windows\SysWOW64\EPAXJV\OGR.002

    Filesize

    43KB

    MD5

    093e599a1281e943ce1592f61d9591af

    SHA1

    6896810fe9b7efe4f5ae68bf280fec637e97adf5

    SHA256

    1ac0964d97b02204f4d4ae79cd5244342f1a1798f5846e9dd7f3448d4177a009

    SHA512

    64cb58fbf6295d15d9ee6a8a7a325e7673af7ee02e4ece8da5a95257f666566a425b348b802b78ac82e7868ba7923f85255c2c31e548618afa9706c1f88d34dc

  • C:\Windows\SysWOW64\EPAXJV\OGR.004

    Filesize

    1KB

    MD5

    5f7d687933e9ec5bcdbde17d59ff84d2

    SHA1

    fabac02b06109b0c3e421d38c63fb1a5ada5d728

    SHA256

    ffe0ea1b4896e88cb3459eb6997f3e30cdc1b5cf13a90809c41ff28d7d5aaf2d

    SHA512

    ab115eb6e09ff6f16f526e7a73de372915da7478bb1dfd9d1f956c945fc9c512a06de99a38bc617a1d1e79dc833355435844c9b60dbaeeac505dc5e0eb75d92f

  • \Users\Admin\AppData\Local\Temp\pokebot.exe

    Filesize

    682KB

    MD5

    c506d6aa12290d64c5c9495d11538db2

    SHA1

    a2e817fc0bd750d0257b447afc895d05352e42a9

    SHA256

    08288d971a0d8289b3c65e3ff49d7a20a29c72a660b89a6dbeb10e36339aa993

    SHA512

    0ad9d399adaf2123bfb12b9c748c148947b9e256ae60e51fbf6a6c32f4e10608355b46fb4b63937a2f2062683cb47e00e2d5f5bf1975557af2baf335be2e3e51

  • \Windows\SysWOW64\EPAXJV\OGR.001

    Filesize

    61KB

    MD5

    86b63726200d9ff6662fd2de00b9fcaa

    SHA1

    f4ecf611b4dca6c60901993a10b44e8c485f9b95

    SHA256

    b203eb072b0e912d402ba0c5652a13f788d3b69abf6ef73ca01d9ad9317b7eaf

    SHA512

    ce116dfb3244fe68b8fb42875fba4e512f4cdc586bec5945428f4a0a539169ac84292cdb3310e4974eb2c4342b6205e8fee32e47a2840b104cf28db9e1750c3a

  • \Windows\SysWOW64\EPAXJV\OGR.exe

    Filesize

    1.5MB

    MD5

    0aaffc12ef1b416b9276bdc3fdec9dff

    SHA1

    9f38d7cf6241d867da58f89db9ff26544314b938

    SHA256

    42b33dd905c5668c2518a6a7d407fb10c303cfedeaefcd7b6e4c7cc1b891c73b

    SHA512

    bbde0986b298c6172e7c8e3f938db9425f54cca097e280736e1ba289afd06a0b86f7cbc91f6d46458bc8e75069c12cda1cf808acf3b6c773b0661d081136ee7c

  • memory/340-24-0x0000000000230000-0x0000000000231000-memory.dmp

    Filesize

    4KB

  • memory/340-27-0x0000000000230000-0x0000000000231000-memory.dmp

    Filesize

    4KB

  • memory/2584-26-0x0000000000400000-0x00000000004AE000-memory.dmp

    Filesize

    696KB