General

  • Target

    f2f29d15f7808b8f7abfe135f2ab201c_JaffaCakes118

  • Size

    670KB

  • Sample

    240923-xyxrta1hqe

  • MD5

    f2f29d15f7808b8f7abfe135f2ab201c

  • SHA1

    b33e398af7acaf52a4af6fc7117f40f46489f0e5

  • SHA256

    cb2cd5a74a3ac0a52521e417e021bbdde60d71002203da5ff1e7e69d1775a7d4

  • SHA512

    62240594d83d17aaef91d22932ee023aed98566ad6fc12c2b1328ab0f4ff583cd2a60e13104b60e0dab8294db65cd43fff36435d9444b82fa45181bf0847d8d3

  • SSDEEP

    12288:trY7ESE9jFOpGcNHe+0bK+c9Qqvf+iSOAhFzgSm23+GIc0s90OsQj:lY7EScIphH1KKTFv5SDhKSmYVIc0s90u

Malware Config

Targets

    • Target

      f2f29d15f7808b8f7abfe135f2ab201c_JaffaCakes118

    • Size

      670KB

    • MD5

      f2f29d15f7808b8f7abfe135f2ab201c

    • SHA1

      b33e398af7acaf52a4af6fc7117f40f46489f0e5

    • SHA256

      cb2cd5a74a3ac0a52521e417e021bbdde60d71002203da5ff1e7e69d1775a7d4

    • SHA512

      62240594d83d17aaef91d22932ee023aed98566ad6fc12c2b1328ab0f4ff583cd2a60e13104b60e0dab8294db65cd43fff36435d9444b82fa45181bf0847d8d3

    • SSDEEP

      12288:trY7ESE9jFOpGcNHe+0bK+c9Qqvf+iSOAhFzgSm23+GIc0s90OsQj:lY7EScIphH1KKTFv5SDhKSmYVIc0s90u

    • Ardamax

      A keylogger first seen in 2013.

    • Ardamax main executable

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Indicator Removal: File Deletion

      Adversaries may delete files left behind by the actions of their intrusion activity.

    • Maps connected drives based on registry

      Disk information is often read in order to detect sandboxing environments.

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks