Analysis

  • max time kernel
    140s
  • max time network
    136s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    28-09-2024 14:08

General

  • Target

    fc7667c962cc70254bdbf5c20490ff8d_JaffaCakes118.exe

  • Size

    986KB

  • MD5

    fc7667c962cc70254bdbf5c20490ff8d

  • SHA1

    74b56cd78731c5cf3a2d838aa527ba98ace4af2b

  • SHA256

    dc4f9ccfeed3b040efd67d90e491c115b32887664845a05cc9018263c8116083

  • SHA512

    b0d3ab6053730f4263759df8b58a4947247b8c1ec13c674dc5db826bcbcf4a0d033039cf1412b09792ceb5c90f194d7ee79036f5751763869d3dd8d6bb4cb208

  • SSDEEP

    24576:+MdTTDWpMsrWM8Eoox2AekP1/37sm3DU4SeAqKji2/TV5nJ:+MBTqpx85AekP1sm3D8eO

Malware Config

Signatures

  • Ardamax

    A keylogger first seen in 2013.

  • Ardamax main executable 1 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Drops file in Windows directory 5 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of SetWindowsHookEx 4 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\fc7667c962cc70254bdbf5c20490ff8d_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\fc7667c962cc70254bdbf5c20490ff8d_JaffaCakes118.exe"
    1⤵
    • Checks computer location settings
    • Drops file in Windows directory
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:2384
    • C:\Windows\XXOCVV\IBS.exe
      "C:\Windows\XXOCVV\IBS.exe"
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Adds Run key to start application
      • Drops file in Windows directory
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of SetWindowsHookEx
      PID:1176

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Windows\XXOCVV\IBS.001

    Filesize

    61KB

    MD5

    2235fc6de0e4a5c7b2907189deed75fd

    SHA1

    9f91cbe5fb9fbc50b50409ad16d5b805e94b16b2

    SHA256

    ae36fb7840b98c74ba34c1dd9c581e7185c5f2521fe611446adf3149a08a0a6e

    SHA512

    fc9235695505e1b87d8cc06771ebb91c6b4e05f091a3dca60592ce42538a57a798e45d8c3093ebc1db9faed340d85cee15a4b5e3170eddbd936c1e6e7fa9e030

  • C:\Windows\XXOCVV\IBS.002

    Filesize

    44KB

    MD5

    49f3466e9ba4c92529bbc6eeb1ee0ab9

    SHA1

    f0af510b20004d5380977c4cfb1831e40042d81f

    SHA256

    7912617f47fce846b880131f2ecfc58d60a67b58db1f9462f36f3e4705a8bc41

    SHA512

    9bb4883cb1b21a78bb049b75c04c27dafbcb06b73f3c102e957f470fd4451419edd67a30f295bee2e1da5dd158d186c3c26bb3fd33ea3a1d13232252143d9319

  • C:\Windows\XXOCVV\IBS.004

    Filesize

    1KB

    MD5

    0c556aa81f2b00ef300e2f4fc2ea4bf3

    SHA1

    9c0ae71b10143f1ceb260f01d9a95ef37dbda87a

    SHA256

    7e3401f6de9816ec291a14377bbc2ea3550f9b0b8cf5ab3f07c5ef43bef18783

    SHA512

    1dbefcff693495176b8ce7188adae31f282f04f5e5b9b6fc00549423a1885df9868dfe71e78232cb79f4ad98365ab07a1574e1b399b29cdbae7678faabad691e

  • C:\Windows\XXOCVV\IBS.exe

    Filesize

    1.7MB

    MD5

    050208e69caba33b40c37bf3f69c303a

    SHA1

    109da1ef57f0601086006aa18002fabce8635451

    SHA256

    f69fca14da64b63551018bca80b8f43ada22eb63cb679002e195399ec5175995

    SHA512

    4f1c59c562f72135ca13fc25fe7f71e2e1cc6124142c70b0c33082b0693d8d2cee83ea6297dc964e0fb247907578f8839c86cae93fa776a4d407d537d2bc3717

  • memory/1176-14-0x0000000000880000-0x0000000000881000-memory.dmp

    Filesize

    4KB

  • memory/1176-16-0x0000000000880000-0x0000000000881000-memory.dmp

    Filesize

    4KB