Analysis

  • max time kernel
    16s
  • max time network
    16s
  • platform
    windows7_x64
  • resource
    win7-20240729-en
  • resource tags

    arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system
  • submitted
    02-10-2024 22:35

General

  • Target

    0cba813ca83f3e80664be6cd05bfa97e_JaffaCakes118.exe

  • Size

    1.0MB

  • MD5

    0cba813ca83f3e80664be6cd05bfa97e

  • SHA1

    d21d8267b1e58ac567c1279f9db755276e367bab

  • SHA256

    6943cef14249d809466043ff45d34048e6a889356228c80fb4cca726e241c589

  • SHA512

    5235faab2a44a28e97906c434b59a6cd860ecb0007e9a9a784dcffd24f620a1b9289956c2a187810d72a1096a77b5b4f04b48b657a6cd8ef55976864ae94c72a

  • SSDEEP

    24576:xesTnX3/lPxkAFNcZxj57iNbz9wPEtHJGDE0+NI:x3TntPmHiNbz2sJn0a

Malware Config

Signatures

  • Ardamax

    A keylogger first seen in 2013.

  • Ardamax main executable 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 4 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Drops file in System32 directory 6 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies Internet Explorer settings 1 TTPs 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\0cba813ca83f3e80664be6cd05bfa97e_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\0cba813ca83f3e80664be6cd05bfa97e_JaffaCakes118.exe"
    1⤵
    • Loads dropped DLL
    • Drops file in System32 directory
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:2268
    • C:\Windows\SysWOW64\WIMXOD\OLG.exe
      "C:\Windows\system32\WIMXOD\OLG.exe"
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Adds Run key to start application
      • Drops file in System32 directory
      • System Location Discovery: System Language Discovery
      • Modifies Internet Explorer settings
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of SetWindowsHookEx
      PID:2952
  • C:\Windows\SysWOW64\DllHost.exe
    C:\Windows\SysWOW64\DllHost.exe /Processid:{76D0CB12-7604-4048-B83C-1005C7DDC503}
    1⤵
    • Loads dropped DLL
    • System Location Discovery: System Language Discovery
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    PID:2816

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\2000UP.jpg

    Filesize

    29KB

    MD5

    05d713cd0a74a79ecc7d22502ec51645

    SHA1

    76e03ff8f3f90a03ee00c8984486327e6ce1645f

    SHA256

    7f56c2bcc333e084c8976aee00a3f49b43848f91c318ba3b2afa78a9f57e28e4

    SHA512

    b4f87ede34c02b9b7efa39e6bf7bbcc0f6d8463aba40849024c2f1a2e5032779fce80b6a763da4f965022ba873d32cc23a8db3c9640c2a34e9b9a3b8236d1d21

  • C:\Windows\SysWOW64\WIMXOD\AKV.exe

    Filesize

    498KB

    MD5

    51c1f8be2696047a60425cf4e8370eeb

    SHA1

    c565f5f7ca1eae6af9c7e7d07092031975ddf356

    SHA256

    900f9e42b5157d485000517997655dea2b5a36b249295e16a650ea38a8992de4

    SHA512

    a25712fa2ca973a3d73fc9fd59bd4c4734cb31f1683d0960e86fb0d1f078f011c8c9aebd85b6513f434c4e96cc8dd4367620a9b5c55112b586187ee2fed96c9a

  • C:\Windows\SysWOW64\WIMXOD\OLG.002

    Filesize

    42KB

    MD5

    afa4b981d51f73aaa544fac1a7108ab3

    SHA1

    8dd9f0811c98175b1cf9d73893e03283e020ada2

    SHA256

    456ed6eae6b31494b782f8786d28f22a96f38abcc81e93cc9802dac6bb1b9238

    SHA512

    4e0234d692b5eb91cfe5f2f2926a0b0f49dc43510c695dd6bff78071c86dfad91cbcde3428d4965026fd980c1a353b221b0a3fa35d223d678ef82cfb9e0294e5

  • C:\Windows\SysWOW64\WIMXOD\OLG.004

    Filesize

    472B

    MD5

    ada3399e268ec1b7e105d01a7cede4cb

    SHA1

    45318021c8bb41859b0712820b7e9a9c7f7ae423

    SHA256

    0da7114554cb1b900e462b6e13ce27365912b7e374523f5c1c1d445a54c16490

    SHA512

    ac3b0ad654a7c8835ceb2146f4c6b6ee7317bf960153b6c9748ac85a9f7af51edea29b0215ba7d841289cb4a6541c6cf6abfb89b81f086896ebd2455d05b0df9

  • \Windows\SysWOW64\WIMXOD\OLG.001

    Filesize

    60KB

    MD5

    2bfb29b33b47a062d48c9ad462cc06c2

    SHA1

    1b39d2cb07740cfafe6809d30431952e2b7c2a5f

    SHA256

    f5b12e8464198b5c9cb2308e86942ef6d49ad0aeb844b47a385e90f0977d9001

    SHA512

    3521cca90074871f0e28706061e4a6ec8c0abca1c36ac73e860216be46df06c89ec8a5690677c4df0bf451ba2d2374351009a459101de459b71efa3889a043ee

  • \Windows\SysWOW64\WIMXOD\OLG.exe

    Filesize

    1.3MB

    MD5

    93e6298315cf566b520382d6c701dc62

    SHA1

    ab5ee9810535cfee6fb1f751d63cc5a0ed0e256e

    SHA256

    035a7419c78813bae698ee98db9f48302d4de0bd011ac573eb457f65268b702b

    SHA512

    1c37c580578964ea00a3fd193ba04ca81ed2e5cf3e74395e90994b3dd0e22d3c55fb640eb8138af81eef6d88af37459dcc6bb6bd035fc1aaa71476ba4634a8ee

  • memory/2268-20-0x00000000003B0000-0x00000000003B2000-memory.dmp

    Filesize

    8KB

  • memory/2816-21-0x0000000000130000-0x0000000000132000-memory.dmp

    Filesize

    8KB

  • memory/2952-16-0x00000000001C0000-0x00000000001C1000-memory.dmp

    Filesize

    4KB

  • memory/2952-23-0x00000000001C0000-0x00000000001C1000-memory.dmp

    Filesize

    4KB