Analysis

  • max time kernel
    136s
  • max time network
    104s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    22/08/2024, 16:22

General

  • Target

    b8524b2b1bc8241c408600cefdcde821_JaffaCakes118.exe

  • Size

    1.2MB

  • MD5

    b8524b2b1bc8241c408600cefdcde821

  • SHA1

    72fb7b330842c12d91f4636f25e6c4d43574c9a7

  • SHA256

    a9507d8377fde1343f92c5ba7f7c0721c5d1c4af5f317c64f10fb2a349c7431d

  • SHA512

    b20e6f41755d0675a0e6ca9c92d567bea748054a599eb44e87cc06909133d975b9a9cd87e8a8884d509a86c2417982a76e8f74b2015364b3105dd766ea0fe82b

  • SSDEEP

    24576:k65IkNmFqY8xl0qsBT/y1c6syYh/8VGQaztdeK/MW9h9ZFpbM+sEc+CUG6:H5hNSqzXQtB6s9d8cThdeE9h9zpfzX

Malware Config

Signatures

  • Ardamax

    A keylogger first seen in 2013.

  • Ardamax main executable 1 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Drops file in System32 directory 6 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of SetWindowsHookEx 5 IoCs
  • Suspicious use of WriteProcessMemory 13 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\b8524b2b1bc8241c408600cefdcde821_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\b8524b2b1bc8241c408600cefdcde821_JaffaCakes118.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • System Location Discovery: System Language Discovery
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:3632
    • C:\Users\Admin\AppData\Local\Temp\b8524b2b1bc8241c408600cefdcde821_JaffaCakes118.exe
      2⤵
      • Checks computer location settings
      • Drops file in System32 directory
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:1660
      • C:\Windows\SysWOW64\WWFFYX\XRR.exe
        "C:\Windows\system32\WWFFYX\XRR.exe"
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Adds Run key to start application
        • Drops file in System32 directory
        • System Location Discovery: System Language Discovery
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of SetWindowsHookEx
        PID:3912

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Windows\SysWOW64\WWFFYX\AKV.exe

    Filesize

    465KB

    MD5

    4061e424a7e62d613aa16201364593c9

    SHA1

    84e5f41196523eddd24b62670ec8100632dbc933

    SHA256

    d39b682a1de3541ce4858727a3206a0fb78d1e070e4dd60fab43c2537d1adfd9

    SHA512

    3290348c02db1d9125d80b6e240544d51b0805240e113397d85a3fbdf3421172c8dd23e5631525db9258b7eedcdc228df3082041a017c664593eac698773f5fa

  • C:\Windows\SysWOW64\WWFFYX\XRR.001

    Filesize

    61KB

    MD5

    4eb04b9187bbf3e3c33bf95e74eb6262

    SHA1

    ca5dcaea5ef4ba48c0bb06635c0b5abed4f0f342

    SHA256

    cf84d5704b350beaf1f2b46dc44bd372141d7554a8958ce22c0a84a3f21f2fe7

    SHA512

    aeaa608cd4f66ba817a7e8698d17f9801c9cedf99875decff39bc18cebdec3947f02566bdf21d9096e5a6a6b740717ab06d46a2a9605bf8e8fa0fee12fe17e81

  • C:\Windows\SysWOW64\WWFFYX\XRR.002

    Filesize

    43KB

    MD5

    1aed6fee0870288cdb607393fc2f33a1

    SHA1

    584fd8d5ffbced19dd09b8b71cee9026c0ac65c6

    SHA256

    02c4eef7045896258d00077e123719aa256c606f4e38c417965ba5f64d48e180

    SHA512

    15e5b7843b07bcb4a638057b05712c66b285d70ace24ab3a4c125d24d538ace20cfac179accefa417d7790f7a095327affd3cd73d9eacaa632356f95a9fde3b8

  • C:\Windows\SysWOW64\WWFFYX\XRR.004

    Filesize

    1KB

    MD5

    473c4dfea14e331bc7361fe1d4835bc8

    SHA1

    1a9de9b5df14ec0081170e3640929f6966e6581e

    SHA256

    ff2f438aad7382a01af834ae4847ee1a5a83ca6560849d883605f1f629f39ca5

    SHA512

    fc6ea7429ea59fec5a96324d2c6a4935793ec520b27f10a035170552a907ca502070f24f6323f8e776cf67aa6a2e14643af3ea594734ed6e0d86104a6092848c

  • C:\Windows\SysWOW64\WWFFYX\XRR.exe

    Filesize

    1.5MB

    MD5

    865b02aa4fb68ac150953986e6f63f1c

    SHA1

    214190642d67f02c349e68f3f3c6ef0e9c2212d7

    SHA256

    fac58547e80a1b9598261b6d2aa5175653831e507c57b6860bc5d04d2e754dff

    SHA512

    473dc55a8a8f11d8445cef9cd8cabf8a9b227a6e47994ecfe9c86d41062641668d858e61b7ade1ad2801c5daa13d0630159b7ad241379e111c83564030c0a40e

  • memory/1660-5-0x0000000000400000-0x000000000051A000-memory.dmp

    Filesize

    1.1MB

  • memory/1660-20-0x0000000000400000-0x000000000051A000-memory.dmp

    Filesize

    1.1MB

  • memory/1660-6-0x0000000000400000-0x000000000051A000-memory.dmp

    Filesize

    1.1MB

  • memory/1660-3-0x0000000000400000-0x000000000051A000-memory.dmp

    Filesize

    1.1MB

  • memory/1660-4-0x0000000000400000-0x000000000051A000-memory.dmp

    Filesize

    1.1MB

  • memory/3632-0-0x0000000000400000-0x0000000000417000-memory.dmp

    Filesize

    92KB

  • memory/3632-8-0x0000000000400000-0x0000000000417000-memory.dmp

    Filesize

    92KB

  • memory/3912-27-0x0000000000400000-0x0000000000590000-memory.dmp

    Filesize

    1.6MB

  • memory/3912-29-0x0000000000400000-0x0000000000590000-memory.dmp

    Filesize

    1.6MB