Analysis

  • max time kernel
    118s
  • max time network
    119s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    19-09-2024 13:01

General

  • Target

    eb631d5e7add23a6dc50e841a8c98c88_JaffaCakes118.exe

  • Size

    149KB

  • MD5

    eb631d5e7add23a6dc50e841a8c98c88

  • SHA1

    8f83c560438574022f1d960dc599457e50999a9c

  • SHA256

    4f56cc08c70c59b91b071909506d6061f2e5fd3071f9cf5fd21f12e08c71f4cd

  • SHA512

    35a9c7d03fea0507a492e47c5e63da50c5703e37f1ba8eed852f378d22cd682d747fcd6ef487e80eaeec42cf5d36725dd72079bead90a2f6babc2d5718f4a2ed

  • SSDEEP

    3072:eOOGY+qa9LqOAszNWTQ0hO+bH9FCOVclE0xuFX7C7kw5r6:wGpxYE0sIdFCOV/F27koO

Malware Config

Signatures

  • Ardamax

    A keylogger first seen in 2013.

  • Ardamax main executable 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 4 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Drops file in System32 directory 4 IoCs
  • Drops file in Windows directory 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SendNotifyMessage 1 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\eb631d5e7add23a6dc50e841a8c98c88_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\eb631d5e7add23a6dc50e841a8c98c88_JaffaCakes118.exe"
    1⤵
    • Loads dropped DLL
    • Drops file in System32 directory
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:1560
    • C:\Windows\SysWOW64\CKM.exe
      "C:\Windows\system32\CKM.exe"
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Adds Run key to start application
      • Drops file in Windows directory
      • System Location Discovery: System Language Discovery
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      • Suspicious use of SetWindowsHookEx
      PID:2652

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Windows\SysWOW64\CKM.001

    Filesize

    81B

    MD5

    a7daac11f42f110338a74ba35cb5f0ba

    SHA1

    eb7105d44c4085a0ff6bd69c23598735dec59a76

    SHA256

    59daec54114434e32405eb0a4f1edd2b440a5e8c729ed5e97b84c9dd8742dc7a

    SHA512

    ab1bf4c20778f724bc3dc3c617ee7b0e78f5db98e06b72e11b75462ec7da8b097ebe062e8606bef49fcb5d206af8086b30fa4f3d15e632232620c18a72b7f252

  • \Users\Admin\AppData\Local\Temp\@EF20.tmp

    Filesize

    4KB

    MD5

    b3ce78b324bbaf657fa5dfb80270240d

    SHA1

    3eacec137e3e0c898e916dfebee4668aa2c6ef3d

    SHA256

    da289a8e9545c71918bda3fa6f84e45eaec17a7016be8c885f35940aebfcd486

    SHA512

    1494fa678289bee54ff554e1fd7e63ca38f22135d60afc7b95a566879592d00e9cf29fd2e31d541ad0881fd28c057928c467e002965a21944467232852fda068

  • \Windows\SysWOW64\CKM.006

    Filesize

    4KB

    MD5

    2ae55889b93c5fac99ae642d1c9279b9

    SHA1

    640ff431cf80e0e811a74060efdb0c27c2ac4459

    SHA256

    b7025d43db6c92a011df5f8a5f90c6c4401875543a994dc3434ac52480a3941d

    SHA512

    62b3b8c892ecfa40d08783f005064fdd0e7eebbb3459ee7f646b492f541f7907fbd9e479e60142ad9d2318dca693fc57cf57add079e33397a3f2c8667da0ee92

  • \Windows\SysWOW64\CKM.exe

    Filesize

    244KB

    MD5

    3d940db5a36c4850146a7515f36bf64e

    SHA1

    77e61d2cddbfe4722f623197856a8053a9d6ca73

    SHA256

    ba471b072fc8d13d946754e6cacc41c2c992581018bff3d051d4a07b5b2bc375

    SHA512

    ab629b4436dcec4e65899bb9c66263a0d74a48be6ced4a5fd472b20959e858bc69772a1f74b5b20c06ec4860ff03d01bb20074d2c79b567b60480c80c1648d83