Analysis

  • max time kernel
    93s
  • max time network
    94s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    14-09-2024 07:47

General

  • Target

    dfc4076522186734ade1c2ba0ec32173_JaffaCakes118.exe

  • Size

    518KB

  • MD5

    dfc4076522186734ade1c2ba0ec32173

  • SHA1

    a1070c204de5ddd2e1a9cba8e469bd03b0bdb78e

  • SHA256

    bbdebf1bc2604098084adff16cc1765bca064e8788c0e048d80fe721fb5456bb

  • SHA512

    f66c8e543f3cad56de65db016abb1d83b013acc3b397fe5d205bfae1fa500d3883ca30ea2ba8b4ebe661f43bde39adc9af05acfa7f79e122aeeedcab476c1f52

  • SSDEEP

    12288:2IovIQgS6mIUP27DOhm3Os/CXL3+4rATWu/EAn8EGm:65gS7IU+nOFP+4skA8EH

Malware Config

Signatures

  • Ardamax

    A keylogger first seen in 2013.

  • Ardamax main executable 1 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Drops file in System32 directory 5 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\dfc4076522186734ade1c2ba0ec32173_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\dfc4076522186734ade1c2ba0ec32173_JaffaCakes118.exe"
    1⤵
    • Checks computer location settings
    • Loads dropped DLL
    • Drops file in System32 directory
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:4988
    • C:\Windows\SysWOW64\28463\VMPP.exe
      "C:\Windows\system32\28463\VMPP.exe"
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • System Location Discovery: System Language Discovery
      PID:2316

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\@A086.tmp

    Filesize

    4KB

    MD5

    19cf467919727d52844f6526ef495371

    SHA1

    107b53f43c923db816c3743896cad71b3795ad5c

    SHA256

    e75ac29f8ac2c921ad6bebc70e53eb462ba2860aca514d9a3ef09ac49007b5b9

    SHA512

    2cd6093b1b78670f1e6ff074de818acaceffcbf94a32d6875c1e42fa980570cf9f3f3d7de53800111503bf7a505fd7b238170095158c5c7bc631781e02ce2095

  • C:\Windows\SysWOW64\28463\AKV.exe

    Filesize

    458KB

    MD5

    b32fec1ef63f9c2c4c2eacdf439163ed

    SHA1

    541f11ef53115aeb1ee214beb505a7254824de87

    SHA256

    15e4d7edda2c9e41794d7cdf43c735604fbe4c4e7135a9b5efd58f9825d2e078

    SHA512

    0af6fb805634944ead3618617887581d313d4817e26a9990271bfd6f615387ceb31ffa0c4145ce9b59cb3bfe6fdb3b8224f2230e552581734d26e15a79a63a18

  • C:\Windows\SysWOW64\28463\VMPP.001

    Filesize

    472B

    MD5

    73edd637ea7208042f3bd5254d457ee7

    SHA1

    076ffd77495a5741a3a7bef24280fd5c6ead5994

    SHA256

    09d0238c895fdf989fe753a1ff8274a20f23a1b87d214666d4d26748421a0431

    SHA512

    a806c50401124b5c886e35137863e6714f8472bc7fd0467f0c1373cd1d806f377c17b112d37e540fe892d3e3931c62716fe395ec53c260a3c53b9d0edee0f845

  • C:\Windows\SysWOW64\28463\VMPP.006

    Filesize

    8KB

    MD5

    9a45af5044d301aacf2928ea47cb3b6a

    SHA1

    35bfa3bd42dfd0a1cf97a56d992a3ca47577bc9d

    SHA256

    71b69ce0cfaa58eb4c9742111b2dfd8fe0f5e1a4b6c38e26121a43eaf18f222b

    SHA512

    52b7ec0f6e9595be59ea3866c71cb5b2f92fb18924bf6860776bc4e8512944bd11e663908c76796f7c18ad7f074bae11c58205b4c8fde750de7a6e88f850a9a5

  • C:\Windows\SysWOW64\28463\VMPP.007

    Filesize

    5KB

    MD5

    9d4055a18afc0de43f275f196748ec9f

    SHA1

    b4078c0569d80c0020f658b727b877ebb0d38838

    SHA256

    bb45a2069543808f0bb8ee15d46efb4476e7ec906b6999acc46f2e0453d25ff4

    SHA512

    229d3e6481e0c1ea9e04c92c177c84380608fceb74f969b56c3d4e8ba2e3525103cdeb46ad1b6d9fd8dbeb4795ca503aefb9327f44af1b8e66a19723d85e621b

  • C:\Windows\SysWOW64\28463\VMPP.exe

    Filesize

    567KB

    MD5

    568f7447183c41c3c9263924e52a4822

    SHA1

    e9e4b24af15d174cd9e3af989d3b3deca98725ee

    SHA256

    5ebddc2b4757c9650a51531203ea4ca28b6a145cade7cc4905c6bc23ae62e88f

    SHA512

    a3d155d5e92771652603a228e140b6aef029d3f99dd6d0da2a05c0d4dd42026dfbb6069f97e904bd6516d1a7752666ded8796f63dcb255451ccbc9a3d17d882d

  • memory/2316-23-0x0000000000710000-0x0000000000711000-memory.dmp

    Filesize

    4KB