Analysis

  • max time kernel
    124s
  • max time network
    125s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    25-09-2024 18:36

General

  • Target

    f69f1640e8b31b05990e6940c38a9c92_JaffaCakes118.exe

  • Size

    1.1MB

  • MD5

    f69f1640e8b31b05990e6940c38a9c92

  • SHA1

    8c783f9aaf00453892b98b29fbc8e7705719a6c4

  • SHA256

    bc6a91bf685fc28ee79f3f983a7a0d5457a414fe329b427de920a07bbbd6f49d

  • SHA512

    e16dcfb5ce2d48fb3c102fbeb12573d55df68d51b35c34658b2cb6d1ca990fd18c952cc27414bd7a75990d0a1c8788a1b7563af39bd6ea5be0fe9136cbf9f590

  • SSDEEP

    24576:yHvZT0U1eGwNqdkrvYXz4klAiNIpjA6z0QOTdGg5X/5INo:SBTHFwNqdkrgXzPW2WGQOxpXR4

Malware Config

Signatures

  • Ardamax

    A keylogger first seen in 2013.

  • Ardamax main executable 1 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Drops file in System32 directory 6 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Checks processor information in registry 2 TTPs 3 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Modifies registry class 1 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of SetWindowsHookEx 5 IoCs
  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\f69f1640e8b31b05990e6940c38a9c92_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\f69f1640e8b31b05990e6940c38a9c92_JaffaCakes118.exe"
    1⤵
    • Checks computer location settings
    • Drops file in System32 directory
    • System Location Discovery: System Language Discovery
    • Modifies registry class
    • Suspicious use of WriteProcessMemory
    PID:460
    • C:\Windows\SysWOW64\ATUHFQ\LYJ.exe
      "C:\Windows\system32\ATUHFQ\LYJ.exe"
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Adds Run key to start application
      • Drops file in System32 directory
      • System Location Discovery: System Language Discovery
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of SetWindowsHookEx
      PID:4752
    • C:\Program Files\Microsoft Office\Root\Office16\POWERPNT.EXE
      "C:\Program Files\Microsoft Office\Root\Office16\POWERPNT.EXE" /s "C:\Users\Admin\AppData\Local\Temp\arriesgate.pps" /ou ""
      2⤵
      • Checks processor information in registry
      • Enumerates system info in registry
      • Suspicious behavior: AddClipboardFormatListener
      • Suspicious use of SetWindowsHookEx
      PID:4436

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\arriesgate.pps

    Filesize

    84KB

    MD5

    cf23edb3a9119bbe6fd1ad01244f3a00

    SHA1

    7f316eceb5ec656b2535f4d60c30cee5fe7267cd

    SHA256

    c6f7a992e1cd53c9bd0cfbecbfbcee7a1e81728634bd9a294ed70f2046760202

    SHA512

    68fc44ebe13a79782082b482143c82dcc604818087a4c42ac43d3e02de1fd2a60e898fc72b15703544d966309593d20e4c68af11953e155e8f8b8239b87c28ba

  • C:\Windows\SysWOW64\ATUHFQ\AKV.exe

    Filesize

    461KB

    MD5

    7e335c1258740a5798c2b3eea5a97229

    SHA1

    6ce1e98ddc05a4b9e772901c9bc6caae4103267f

    SHA256

    667ab5d791b89216a46f7dd3a1bcb9b7e5f235415a74a9678ca41cec051c462f

    SHA512

    8c190dd139f5459a91c81871f53fc080a81c6397c68cb5b0ee195571012cc8af923b10cd77301da1816f935d36a0587d1c75126f5553005a0f50eb22d3441cb4

  • C:\Windows\SysWOW64\ATUHFQ\LYJ.001

    Filesize

    61KB

    MD5

    9fca42b7fa3132ded471b886c4bf8a51

    SHA1

    86109ac13f8b63bd3467bbf05e39c5cf9bd11d26

    SHA256

    c519bcfc50245700b30cb417478b46810443b03a6447387dd1d0a13966ff00dd

    SHA512

    bbdd590e1bd2971fbc6a462f6501341c0808d658ba3407b051f9d299d9babf0632af092d64c6ad290d4ae5d9db8c367898a064bbea916c516c0a54066ad698ab

  • C:\Windows\SysWOW64\ATUHFQ\LYJ.002

    Filesize

    43KB

    MD5

    4c30b3e90b3da5619bc0d5f53c025135

    SHA1

    829f487b7c26f6cb8b7f211b2331abbc5229aa61

    SHA256

    b632cedab7ce3d19eebc0d31864dc8c38cd249dcbde299cda818f7026ec294cf

    SHA512

    fd0b36fb43c6b62f6d47455b392276d4e3710b204ef11c70cefed417740a4b5d9357ba37f612f3f87d539175af312ead05bc7a4360fe3e26fd43c56e856e6313

  • C:\Windows\SysWOW64\ATUHFQ\LYJ.004

    Filesize

    1KB

    MD5

    08cd81bfb032afca0de47eba2065963c

    SHA1

    edea4349eb6946c145133945025b05ab1e1170d9

    SHA256

    d869cfa840b3f3f5b7a3794b2967388eb594783539a79a99b0ca6ec359b3caa0

    SHA512

    9c4603d6f260613660cc898b693dc036ca180fc290172f4355e35b4f77f79b58a44a8e9af88601ef9d45bfee8aef8b9aa9d89c41d87d61aa41c807f2b872d3cf

  • C:\Windows\SysWOW64\ATUHFQ\LYJ.exe

    Filesize

    1.5MB

    MD5

    9c28244f2dbe3a4758b532838b0040c9

    SHA1

    4b58bb4033d43ae64af6c18db48d5d25e23f6121

    SHA256

    cb770745d547a27a4b99fdbe27a672135f812b29d94fd2b843d06bb5aa1748aa

    SHA512

    24ed3d4c6aae307a0f1bb1f063b211152644b06d7425a5fe24b09f5f747dd63011451cef3f47cc4985b3316cf1213c056d38768ccb7f44cb2fab28cf4e30e969

  • memory/4436-30-0x00007FFCDFC80000-0x00007FFCDFC90000-memory.dmp

    Filesize

    64KB

  • memory/4436-37-0x00007FFD22050000-0x00007FFD22245000-memory.dmp

    Filesize

    2.0MB

  • memory/4436-24-0x00007FFCE20D0000-0x00007FFCE20E0000-memory.dmp

    Filesize

    64KB

  • memory/4436-25-0x00007FFCE20D0000-0x00007FFCE20E0000-memory.dmp

    Filesize

    64KB

  • memory/4436-23-0x00007FFD22050000-0x00007FFD22245000-memory.dmp

    Filesize

    2.0MB

  • memory/4436-21-0x00007FFCE20D0000-0x00007FFCE20E0000-memory.dmp

    Filesize

    64KB

  • memory/4436-20-0x00007FFCE20D0000-0x00007FFCE20E0000-memory.dmp

    Filesize

    64KB

  • memory/4436-26-0x00007FFD22050000-0x00007FFD22245000-memory.dmp

    Filesize

    2.0MB

  • memory/4436-28-0x00007FFD22050000-0x00007FFD22245000-memory.dmp

    Filesize

    2.0MB

  • memory/4436-27-0x00007FFD22050000-0x00007FFD22245000-memory.dmp

    Filesize

    2.0MB

  • memory/4436-19-0x00007FFCE20D0000-0x00007FFCE20E0000-memory.dmp

    Filesize

    64KB

  • memory/4436-33-0x00007FFD22050000-0x00007FFD22245000-memory.dmp

    Filesize

    2.0MB

  • memory/4436-34-0x00007FFCDFC80000-0x00007FFCDFC90000-memory.dmp

    Filesize

    64KB

  • memory/4436-22-0x00007FFD220ED000-0x00007FFD220EE000-memory.dmp

    Filesize

    4KB

  • memory/4436-39-0x00007FFD22050000-0x00007FFD22245000-memory.dmp

    Filesize

    2.0MB

  • memory/4436-38-0x00007FFD22050000-0x00007FFD22245000-memory.dmp

    Filesize

    2.0MB

  • memory/4436-36-0x00007FFD22050000-0x00007FFD22245000-memory.dmp

    Filesize

    2.0MB

  • memory/4436-35-0x00007FFD22050000-0x00007FFD22245000-memory.dmp

    Filesize

    2.0MB

  • memory/4436-32-0x00007FFD22050000-0x00007FFD22245000-memory.dmp

    Filesize

    2.0MB

  • memory/4436-31-0x00007FFD22050000-0x00007FFD22245000-memory.dmp

    Filesize

    2.0MB

  • memory/4436-97-0x00007FFCE20D0000-0x00007FFCE20E0000-memory.dmp

    Filesize

    64KB

  • memory/4436-99-0x00007FFD22050000-0x00007FFD22245000-memory.dmp

    Filesize

    2.0MB

  • memory/4436-87-0x00007FFD22050000-0x00007FFD22245000-memory.dmp

    Filesize

    2.0MB

  • memory/4436-96-0x00007FFCE20D0000-0x00007FFCE20E0000-memory.dmp

    Filesize

    64KB

  • memory/4436-95-0x00007FFCE20D0000-0x00007FFCE20E0000-memory.dmp

    Filesize

    64KB

  • memory/4436-98-0x00007FFCE20D0000-0x00007FFCE20E0000-memory.dmp

    Filesize

    64KB

  • memory/4752-86-0x00000000006B0000-0x00000000006B1000-memory.dmp

    Filesize

    4KB

  • memory/4752-18-0x00000000006B0000-0x00000000006B1000-memory.dmp

    Filesize

    4KB