Analysis

  • max time kernel
    96s
  • max time network
    102s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    12-09-2024 02:58

General

  • Target

    dbb0d59aaeb0211ca74f9afbe9dc5c77_JaffaCakes118.exe

  • Size

    539KB

  • MD5

    dbb0d59aaeb0211ca74f9afbe9dc5c77

  • SHA1

    718f2d8dea8f02ae88f0712ca16c7a5cde0f9b8c

  • SHA256

    4525078def51388b7bac98705728c60484255077dbdcca1fb0f5661ba0f01520

  • SHA512

    63e68948a3b3f45a384d6161077cd40448eb64e536b6e7f8c4ab418c1e566b683147f00b3a2036ae3b550c19481e2c25e624e641c3a0429b810cbdc2dc3f6391

  • SSDEEP

    12288:fI/QHMCSnw1+DnszNwJxs5DWBZfiiZF5r0iKE3ym4HAyzjxGw+Osmghr/:5HYw1EmDWvr5rOEagA+5Tj

Malware Config

Signatures

  • Ardamax

    A keylogger first seen in 2013.

  • Ardamax main executable 1 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Drops file in System32 directory 5 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\dbb0d59aaeb0211ca74f9afbe9dc5c77_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\dbb0d59aaeb0211ca74f9afbe9dc5c77_JaffaCakes118.exe"
    1⤵
    • Checks computer location settings
    • Loads dropped DLL
    • Drops file in System32 directory
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:3884
    • C:\Windows\SysWOW64\28463\HLIV.exe
      "C:\Windows\system32\28463\HLIV.exe"
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • System Location Discovery: System Language Discovery
      PID:3984

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\@979C.tmp

    Filesize

    4KB

    MD5

    19cf467919727d52844f6526ef495371

    SHA1

    107b53f43c923db816c3743896cad71b3795ad5c

    SHA256

    e75ac29f8ac2c921ad6bebc70e53eb462ba2860aca514d9a3ef09ac49007b5b9

    SHA512

    2cd6093b1b78670f1e6ff074de818acaceffcbf94a32d6875c1e42fa980570cf9f3f3d7de53800111503bf7a505fd7b238170095158c5c7bc631781e02ce2095

  • C:\Windows\SysWOW64\28463\AKV.exe

    Filesize

    458KB

    MD5

    b32fec1ef63f9c2c4c2eacdf439163ed

    SHA1

    541f11ef53115aeb1ee214beb505a7254824de87

    SHA256

    15e4d7edda2c9e41794d7cdf43c735604fbe4c4e7135a9b5efd58f9825d2e078

    SHA512

    0af6fb805634944ead3618617887581d313d4817e26a9990271bfd6f615387ceb31ffa0c4145ce9b59cb3bfe6fdb3b8224f2230e552581734d26e15a79a63a18

  • C:\Windows\SysWOW64\28463\HLIV.001

    Filesize

    486B

    MD5

    351ef83e7f9d778e0194c7213baa86f3

    SHA1

    169261353d28cd2c352b377247d26b9767fb16ee

    SHA256

    52935358390d5c5ab984363b9a6db5d7a6735695fb81c5d7bc6bd55293305726

    SHA512

    4d80a314a11384e0860d87ec3c5f8de67100b8a6fca2ec488ef280f3a65b96db9469f8c977bcc8d0a3462ce6c82eb5f8f04df6ed13d87e1093df7f9d12197587

  • C:\Windows\SysWOW64\28463\HLIV.006

    Filesize

    8KB

    MD5

    9a45af5044d301aacf2928ea47cb3b6a

    SHA1

    35bfa3bd42dfd0a1cf97a56d992a3ca47577bc9d

    SHA256

    71b69ce0cfaa58eb4c9742111b2dfd8fe0f5e1a4b6c38e26121a43eaf18f222b

    SHA512

    52b7ec0f6e9595be59ea3866c71cb5b2f92fb18924bf6860776bc4e8512944bd11e663908c76796f7c18ad7f074bae11c58205b4c8fde750de7a6e88f850a9a5

  • C:\Windows\SysWOW64\28463\HLIV.007

    Filesize

    5KB

    MD5

    9d4055a18afc0de43f275f196748ec9f

    SHA1

    b4078c0569d80c0020f658b727b877ebb0d38838

    SHA256

    bb45a2069543808f0bb8ee15d46efb4476e7ec906b6999acc46f2e0453d25ff4

    SHA512

    229d3e6481e0c1ea9e04c92c177c84380608fceb74f969b56c3d4e8ba2e3525103cdeb46ad1b6d9fd8dbeb4795ca503aefb9327f44af1b8e66a19723d85e621b

  • C:\Windows\SysWOW64\28463\HLIV.exe

    Filesize

    567KB

    MD5

    568f7447183c41c3c9263924e52a4822

    SHA1

    e9e4b24af15d174cd9e3af989d3b3deca98725ee

    SHA256

    5ebddc2b4757c9650a51531203ea4ca28b6a145cade7cc4905c6bc23ae62e88f

    SHA512

    a3d155d5e92771652603a228e140b6aef029d3f99dd6d0da2a05c0d4dd42026dfbb6069f97e904bd6516d1a7752666ded8796f63dcb255451ccbc9a3d17d882d

  • memory/3984-23-0x00000000004E0000-0x00000000004E1000-memory.dmp

    Filesize

    4KB