Analysis

  • max time kernel
    122s
  • max time network
    123s
  • platform
    windows7_x64
  • resource
    win7-20240705-en
  • resource tags

    arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system
  • submitted
    23/08/2024, 07:17

General

  • Target

    bacd3aab6910a82ed5b64b210e92135c_JaffaCakes118.exe

  • Size

    1.2MB

  • MD5

    bacd3aab6910a82ed5b64b210e92135c

  • SHA1

    36d2f786c6f1699a8d309854fa2bb165cf93c4fc

  • SHA256

    1784f7a5e094146e84d53f20d6d504a4cf353e369fc895ed81bc9bbd9950d5a7

  • SHA512

    51e45d86cdb476ba192655627610bae691e3cc7a9a300492552ab14bb891a5273af904e4d75e47a675101790b370f52102a5371fc91d3ed94b8b57b93a265640

  • SSDEEP

    24576:eITTy6nYLlB8G4yQAIl/VNagjl7AUMDgaWqnllZdLJaMcF8MGV0:e6TyQsX4yQAItasEpDgaW4lZdlaGQ

Malware Config

Signatures

  • Ardamax

    A keylogger first seen in 2013.

  • Ardamax main executable 1 IoCs
  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 1 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Drops file in System32 directory 5 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\bacd3aab6910a82ed5b64b210e92135c_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\bacd3aab6910a82ed5b64b210e92135c_JaffaCakes118.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:3024
    • C:\Users\Admin\AppData\Local\Temp\NEW.exe
      "C:\Users\Admin\AppData\Local\Temp\NEW.exe"
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Drops file in System32 directory
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:2544
      • C:\Windows\SysWOW64\FJDMVR\JII.exe
        "C:\Windows\system32\FJDMVR\JII.exe"
        3⤵
        • Executes dropped EXE
        • Adds Run key to start application
        • System Location Discovery: System Language Discovery
        PID:2864

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\NEW.exe

    Filesize

    1.2MB

    MD5

    49b98877ff5fe0d83e1df3d6a4fe595d

    SHA1

    1767463f9fe2fd38b664c3818b2309591a036480

    SHA256

    9e6d7df6da98b564cba6cc6d449ba9ca8d704aa4d2e14cc2fb1f4ae82ac40d76

    SHA512

    d387c25d96346cf54c951f93321414c6f64b58efe9ae810a0784d4a75de64967836e159e9bfc3399eb16165f50a3b4a2129c977a6fb3a2644fcebad2b418a5b2

  • C:\Windows\SysWOW64\FJDMVR\AKV.exe

    Filesize

    490KB

    MD5

    64a6cc55dc76d26448c30a8a1885f7cb

    SHA1

    149e467026647e080b4c69ab4f99b2d3c2b4dbe4

    SHA256

    5cbc0ec73c901be4ac182e13f6869f6f8cf0831b9603e542a3919f6a06087640

    SHA512

    de8cd7bea8113871ce8a36966fbaefd02b8ef7b09a8cbb631b4ac353bdf65b27d5630146ed700fd6edbc4276f4368ebad76b772d9b84349ddc2bd6f7127c377d

  • C:\Windows\SysWOW64\FJDMVR\JII.001

    Filesize

    61KB

    MD5

    bf311791d2f9ea9c82a8d4764a98c0d8

    SHA1

    405ba2bd110590abd0bf340d12e054405afb011f

    SHA256

    d720cf3d297743da7ab1da528f4c086a29d59ef553e1a96569b49a59831d583b

    SHA512

    8be092f068807767b0065de10f9da386b90d8e587356881ba3391380b953b199e818b527e74b305d7c714fc94cb6f8e66c76d89d1785fa9910aa4cb39c5cada8

  • C:\Windows\SysWOW64\FJDMVR\JII.002

    Filesize

    44KB

    MD5

    ce365878123962c3438e349621c10198

    SHA1

    5b861d9fc2923c61ef390a0b729a21078aa5fd59

    SHA256

    ba254f6675490a045d4c85a5f46681c175c1321692c20fc808c7c244173dd63f

    SHA512

    efc6f143d5e9244a6635562d7e9a9cea22ab7e7b304e933642a51d66da896e9038208b86c12f6da623a01b9175e73eeb40ab600e6625db3595144bfca1231a76

  • C:\Windows\SysWOW64\FJDMVR\JII.004

    Filesize

    1KB

    MD5

    042ac0c0c95c3a5259214a77c69839a9

    SHA1

    140d39a68fd998b318a2709adb347ef5e9541d9b

    SHA256

    34d1d51c8ea3f1ebb03417ef954449e842fef2c55a7c27634af6e447b8311d5c

    SHA512

    82b80d67e416bfa51d35d578b7a26be8cf104f8f8d6a3df90a64705a30dec42b39891896522c773890be33bd324238bca0a58484171885cfb4e936875fd66d76

  • C:\Windows\SysWOW64\FJDMVR\JII.exe

    Filesize

    1.7MB

    MD5

    8f7590bbba70748e69612e9e2d5a9f2e

    SHA1

    f3ad9834bc38f33fe501b9076c65ac29d0410578

    SHA256

    2dec3a8fb4a5b198335e7f4a9b611194b0a081abf0c56f9df3f4e2697e69d9e4

    SHA512

    347e9ac793afd627e064ecdfea61c3e2b626ace0ea41928aad93a72567048b8e9bdf773f8a4a59a0d96ce8c08612c542c15982e8051828bef025fea6132838c6

  • memory/3024-0-0x000007FEF5CCE000-0x000007FEF5CCF000-memory.dmp

    Filesize

    4KB

  • memory/3024-1-0x000007FEF5A10000-0x000007FEF63AD000-memory.dmp

    Filesize

    9.6MB

  • memory/3024-2-0x000007FEF5A10000-0x000007FEF63AD000-memory.dmp

    Filesize

    9.6MB

  • memory/3024-3-0x000007FEF5A10000-0x000007FEF63AD000-memory.dmp

    Filesize

    9.6MB

  • memory/3024-15-0x0000000000C10000-0x0000000000C20000-memory.dmp

    Filesize

    64KB

  • memory/3024-21-0x000007FEF5A10000-0x000007FEF63AD000-memory.dmp

    Filesize

    9.6MB