Analysis

  • max time kernel
    149s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    16-09-2024 11:00

General

  • Target

    e4a08112110b2fe9f8d0ee7b4f90106f_JaffaCakes118.exe

  • Size

    192KB

  • MD5

    e4a08112110b2fe9f8d0ee7b4f90106f

  • SHA1

    eb73f5498e8712085dada9590b23f944340b0af2

  • SHA256

    35b23efe02029c882cbdf0519feb3cda498d565564784c427aca7fe629ba9e5b

  • SHA512

    ad7d2d547ebb0150e22a9e8a8a17c02dcba77d985e9fe4c3c73d4c66aebb17032b2c68f8b01548dc6b1a971c2d941492d3a600ab3aab39a07e1b363d60ae75f1

  • SSDEEP

    6144:CmpyGJXMzYPd95Va3VOtcrBodT2vMyGapZBuJAXM8B:CeMzYPFValO3davZMS

Malware Config

Signatures

  • Ardamax

    A keylogger first seen in 2013.

  • Ardamax main executable 1 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 4 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Drops file in System32 directory 4 IoCs
  • Drops file in Windows directory 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of SetWindowsHookEx 4 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\e4a08112110b2fe9f8d0ee7b4f90106f_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\e4a08112110b2fe9f8d0ee7b4f90106f_JaffaCakes118.exe"
    1⤵
    • Checks computer location settings
    • Loads dropped DLL
    • Drops file in System32 directory
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:5020
    • C:\Windows\SysWOW64\winesec.exe
      "C:\Windows\system32\winesec.exe"
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Drops file in Windows directory
      • System Location Discovery: System Language Discovery
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of SetWindowsHookEx
      PID:4028

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\@B815.tmp

    Filesize

    4KB

    MD5

    75e03e528628f1b435614e2982661c31

    SHA1

    400358a42179c337c01b6b9c7492705853efdc18

    SHA256

    880128dc529da91fc984c5d80feb09342fada3c24a13a5a413bc77fd603ef56c

    SHA512

    6377b296937a2af642d2216ad8583e502b5f2a5925800aca60ee022619683d4e0998b02548b19f860d97b7bdc0f6deb6de0e26898f3bdde7c283ce9550cb62c2

  • C:\Windows\SysWOW64\winesec.001

    Filesize

    2KB

    MD5

    8b55183241b1715a7d01c50951d2dd45

    SHA1

    0fadb7f62b78d00e78647f8126e0ddf5392df333

    SHA256

    065ea7faadce53c8bba90dcb9073e61ea438e0da5a614cd8c24933d3a626e8bb

    SHA512

    7a11c9e399af59ca372904165e5bc9d8c8ed3dfd36f5eb7788a8db7a712e23196805c7cffcddbbe738bee71b771d93de7ad756449c4f8b6c3fd6273241721bf5

  • C:\Windows\SysWOW64\winesec.006

    Filesize

    5KB

    MD5

    751af9fd705f1c046dba80d13dc151f4

    SHA1

    873c556c548f893dd4fdc5aa7f5a53a6966f1f8d

    SHA256

    9f2555ea46c5b4d8c0a8150360609a37f82691dbab5cdb46120da806d614ac50

    SHA512

    b86126932584376e966b8dffa9ef367372627c45199b8f1d5d67cb4c977284ccaf4d026c79952b33157fd211f856783006e5470db05d8ff7c2ff64589336e1a7

  • C:\Windows\SysWOW64\winesec.007

    Filesize

    4KB

    MD5

    ce92c6226c4192736c898f6fddc55c82

    SHA1

    c02a50511be7e146e8f9b59ce5c47d75f6d85728

    SHA256

    c963421686c1393fdfeb7838351cd8a95de0837696975f869f6ee75c3751f77d

    SHA512

    e6db4c41f0a606ac0aa9f0afd9849047fc16471cc7d0f4b2abb1f27f75b30ef9af4491911c1694b85b094c34539a85068debdf222651b0ac65dca33a73300106

  • C:\Windows\SysWOW64\winesec.exe

    Filesize

    286KB

    MD5

    b9683df54fd54f5330846c2e0f53a00c

    SHA1

    8148b461cfe9192ee89930427b553476e34d5d92

    SHA256

    127760b71ac1fb6cc8539f460cf3dbe5ad6424e282308f8eb4a01f38feb7d7ae

    SHA512

    a738e99f21d973cf88049032e3b7911fb24508431d1beaff3fdaca2be3d45487b8e69c1cd686d231526f6fb0c2ddb6830c730479566d5ce5e45b6569c919d501

  • memory/4028-19-0x00000000005F0000-0x00000000005F1000-memory.dmp

    Filesize

    4KB

  • memory/4028-25-0x00000000005F0000-0x00000000005F1000-memory.dmp

    Filesize

    4KB