Analysis

  • max time kernel
    141s
  • max time network
    123s
  • platform
    windows7_x64
  • resource
    win7-20240708-en
  • resource tags

    arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system
  • submitted
    03-10-2024 22:59

General

  • Target

    10d45979874eb4499795d8a1e51f2836_JaffaCakes118.exe

  • Size

    2.3MB

  • MD5

    10d45979874eb4499795d8a1e51f2836

  • SHA1

    ed0a03845121cb397433226b5ef218b9291f8ea7

  • SHA256

    02d47750c5216e8511202b46db7fd20dfff9c81b6cd15ceef93ee301702cd3f2

  • SHA512

    de3809c38484ffab72fd3bbab0b1c5e5223e16ccd9da52c300cf3e1b37842a6845cba6137f7938138e477eddc696d156b47a679215b439b34c20fd04fe73b1bc

  • SSDEEP

    49152:sygCp6HtAtYNox4cdbTPieMm9aJAesm5eYfUBrwAqANA+IUSGLE26Jd:s/Cp6HtAtSof79KAesmkSerqAKFGo

Malware Config

Signatures

  • Ardamax

    A keylogger first seen in 2013.

  • Ardamax main executable 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Indicator Removal: File Deletion 1 TTPs

    Adversaries may delete files left behind by the actions of their intrusion activity.

  • Drops file in Windows directory 5 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 5 IoCs
  • Suspicious use of FindShellTrayWindow 27 IoCs
  • Suspicious use of SendNotifyMessage 8 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\10d45979874eb4499795d8a1e51f2836_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\10d45979874eb4499795d8a1e51f2836_JaffaCakes118.exe"
    1⤵
    • Loads dropped DLL
    • Drops file in Windows directory
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:2244
    • C:\Windows\system32QPSS.exe
      "C:\Windows\system32QPSS.exe"
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • System Location Discovery: System Language Discovery
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:2404
      • C:\Windows\SysWOW64\cmd.exe
        "C:\Windows\system32\cmd.exe" /c del C:\Windows\SYSTEM~1.EXE > nul
        3⤵
        • System Location Discovery: System Language Discovery
        PID:2580
    • C:\Program Files\VideoLAN\VLC\vlc.exe
      "C:\Program Files\VideoLAN\VLC\vlc.exe" --started-from-file "C:\Users\Admin\AppData\Local\Temp\ghn_0001.wmv"
      2⤵
      • Suspicious behavior: AddClipboardFormatListener
      • Suspicious behavior: GetForegroundWindowSpam
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      • Suspicious use of SetWindowsHookEx
      PID:2180

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\ghn_0001.wmv

    Filesize

    1.9MB

    MD5

    8273c4435bd0bd5d1c5dd6e1094e4a64

    SHA1

    5556e60360bc2311ae8e1f3b3742a3be74076c99

    SHA256

    68b7b3d76f05e996f4c645a69dda8233114e7366b9a324f7d8a3e01f634a92d1

    SHA512

    2f8d49cbb11d9692d8b2b2f5dc80b051e6d938fe4b8f287447572df4a73acada834f464aae0169033862c0ee703e058d2f9c30db4f5ddfb99fc29f63f7810e27

  • C:\Windows\system32QPSS.001

    Filesize

    404B

    MD5

    466dac75e7a23d24d2a284f59d72cec5

    SHA1

    7e3541a7688937d4a67691a1e8d7470ba79fc998

    SHA256

    8a880ed186650af7c01d18cfbed4ce7af88c2a2ecef8ec221526dbe85fcbca14

    SHA512

    eb7613536b565a2bcbf2702e83f0b06d398c5dfbbde915969716424719193710ae2e8088130a98d43c2104e74458e5f714a648c586208603a80d9ac0def857d2

  • C:\Windows\system32QPSS.006

    Filesize

    7KB

    MD5

    9bff554f06d83650594d29c02ff22490

    SHA1

    5b00b436753479c29403b18256d1be009134f920

    SHA256

    37dc6bab558f611dface5ee2d0cb73f078f1b850de80f4bc5c1e4ebde024c693

    SHA512

    eb98be1e1b86acbe8d36542a42ec73f2357392ece2bca103910be6f5c06b5fbb3b8639cf4b8da03ccf284f09dffece1b12e2882f6f13c5d17ca66a8560e7e572

  • C:\Windows\system32QPSS.007

    Filesize

    5KB

    MD5

    b6f12dd5978a40f15490b637523b0207

    SHA1

    c2a9ae1415e61f59ceaffe91bb5ccde499bcfafd

    SHA256

    097124b7451b236ec652f964aeb3a06a8caf8aa8763db37cc1db16ab91dffe9e

    SHA512

    5baa4a7641cbdd5e6a331f1a5d753ae3d5a2b8e64a6db21ac475176b0d020e6cc79c5ef83fb35003612976d39fcabc3786e46a1b36ca6f91a614995e50c37795

  • C:\Windows\system32QPSS.exe

    Filesize

    471KB

    MD5

    9db739b6cc6f87cc09aa60428f94551a

    SHA1

    f8dad673918a9f342a90d8c0221423c90ae35fd7

    SHA256

    050dbbfa127d4db9f3fdf7efc1961dc2530a5affd1921818c053d7aaa07f1eda

    SHA512

    0f410d81d92dbeec6bbc17a3f6e296bc8e96544b45e7ca2209d832bcdce1b3993c43c1f1298d77bb03eff94bb0c27a7cb950d599a6572a2e4c929400edde5a2d

  • \Users\Admin\AppData\Local\Temp\@BDA4.tmp

    Filesize

    4KB

    MD5

    d1e6a3b3fec7d6f1d0db1bc02da26d93

    SHA1

    d7da87bdc09c38836cecd0844bfd587172c076f4

    SHA256

    bca04b3b3b4b8b416597ecd653056ec98f88e16a57ef64f2143b09ab892a3730

    SHA512

    327def77c38f293c4e8b4f20a3380bc7c5ba5b72f2431b20f67cbaeb2a4d11c2dd9493e477d36de88d75cf185b8fc2936fd6eee3cfa9bcd5620e0fc054f232f8

  • memory/2180-55-0x000007FEF5310000-0x000007FEF5367000-memory.dmp

    Filesize

    348KB

  • memory/2180-40-0x000007FEF5670000-0x000007FEF6720000-memory.dmp

    Filesize

    16.7MB

  • memory/2180-89-0x000007FEF6720000-0x000007FEF69D6000-memory.dmp

    Filesize

    2.7MB

  • memory/2180-31-0x000007FEF7F10000-0x000007FEF7F44000-memory.dmp

    Filesize

    208KB

  • memory/2180-30-0x000000013FC60000-0x000000013FD58000-memory.dmp

    Filesize

    992KB

  • memory/2180-37-0x000007FEF73C0000-0x000007FEF73D1000-memory.dmp

    Filesize

    68KB

  • memory/2180-52-0x000007FEF53F0000-0x000007FEF5457000-memory.dmp

    Filesize

    412KB

  • memory/2180-38-0x000007FEF73A0000-0x000007FEF73BD000-memory.dmp

    Filesize

    116KB

  • memory/2180-32-0x000007FEF6720000-0x000007FEF69D6000-memory.dmp

    Filesize

    2.7MB

  • memory/2180-36-0x000007FEF7EF0000-0x000007FEF7F07000-memory.dmp

    Filesize

    92KB

  • memory/2180-35-0x000007FEFA9A0000-0x000007FEFA9B1000-memory.dmp

    Filesize

    68KB

  • memory/2180-34-0x000007FEFB1F0000-0x000007FEFB207000-memory.dmp

    Filesize

    92KB

  • memory/2180-33-0x000007FEFB6A0000-0x000007FEFB6B8000-memory.dmp

    Filesize

    96KB

  • memory/2180-44-0x000007FEF6E90000-0x000007FEF6EA8000-memory.dmp

    Filesize

    96KB

  • memory/2180-57-0x000007FEF52E0000-0x000007FEF5304000-memory.dmp

    Filesize

    144KB

  • memory/2180-56-0x000007FEF6D50000-0x000007FEF6D78000-memory.dmp

    Filesize

    160KB

  • memory/2180-58-0x000007FEF5160000-0x000007FEF52E0000-memory.dmp

    Filesize

    1.5MB

  • memory/2180-62-0x000007FEF50F0000-0x000007FEF5101000-memory.dmp

    Filesize

    68KB

  • memory/2180-61-0x000007FEF5110000-0x000007FEF513F000-memory.dmp

    Filesize

    188KB

  • memory/2180-60-0x000007FEFA990000-0x000007FEFA9A0000-memory.dmp

    Filesize

    64KB

  • memory/2180-59-0x000007FEF5140000-0x000007FEF5157000-memory.dmp

    Filesize

    92KB

  • memory/2180-63-0x000007FEF32F0000-0x000007FEF34F6000-memory.dmp

    Filesize

    2.0MB

  • memory/2180-66-0x000007FEF3230000-0x000007FEF327D000-memory.dmp

    Filesize

    308KB

  • memory/2180-65-0x000007FEF3280000-0x000007FEF32C2000-memory.dmp

    Filesize

    264KB

  • memory/2180-64-0x000007FEF32D0000-0x000007FEF32E2000-memory.dmp

    Filesize

    72KB

  • memory/2180-67-0x000007FEF30C0000-0x000007FEF322B000-memory.dmp

    Filesize

    1.4MB

  • memory/2180-53-0x000007FEF5370000-0x000007FEF53EC000-memory.dmp

    Filesize

    496KB

  • memory/2180-54-0x000007FEF6D80000-0x000007FEF6D91000-memory.dmp

    Filesize

    68KB

  • memory/2180-71-0x000007FEF2B40000-0x000007FEF2B55000-memory.dmp

    Filesize

    84KB

  • memory/2180-39-0x000007FEF7380000-0x000007FEF7391000-memory.dmp

    Filesize

    68KB

  • memory/2180-70-0x000007FEF2B60000-0x000007FEF2E10000-memory.dmp

    Filesize

    2.7MB

  • memory/2180-68-0x000007FEF3060000-0x000007FEF30B7000-memory.dmp

    Filesize

    348KB

  • memory/2180-51-0x000007FEF6DA0000-0x000007FEF6DD0000-memory.dmp

    Filesize

    192KB

  • memory/2180-50-0x000007FEF6DD0000-0x000007FEF6DE8000-memory.dmp

    Filesize

    96KB

  • memory/2180-49-0x000007FEF6DF0000-0x000007FEF6E01000-memory.dmp

    Filesize

    68KB

  • memory/2180-48-0x000007FEF6E10000-0x000007FEF6E2B000-memory.dmp

    Filesize

    108KB

  • memory/2180-47-0x000007FEF6E30000-0x000007FEF6E41000-memory.dmp

    Filesize

    68KB

  • memory/2180-46-0x000007FEF6E50000-0x000007FEF6E61000-memory.dmp

    Filesize

    68KB

  • memory/2180-45-0x000007FEF6E70000-0x000007FEF6E81000-memory.dmp

    Filesize

    68KB

  • memory/2180-43-0x000007FEF7350000-0x000007FEF7371000-memory.dmp

    Filesize

    132KB

  • memory/2180-42-0x000007FEF6EB0000-0x000007FEF6EF1000-memory.dmp

    Filesize

    260KB

  • memory/2180-41-0x000007FEF5460000-0x000007FEF566B000-memory.dmp

    Filesize

    2.0MB

  • memory/2180-69-0x000007FEF2E10000-0x000007FEF3051000-memory.dmp

    Filesize

    2.3MB

  • memory/2180-72-0x000007FEF27C0000-0x000007FEF27D1000-memory.dmp

    Filesize

    68KB

  • memory/2180-76-0x000007FEF2500000-0x000007FEF2511000-memory.dmp

    Filesize

    68KB

  • memory/2180-77-0x000007FEF1DB0000-0x000007FEF1DFE000-memory.dmp

    Filesize

    312KB

  • memory/2180-78-0x000007FEF1D50000-0x000007FEF1DA7000-memory.dmp

    Filesize

    348KB

  • memory/2180-79-0x000007FEF1D10000-0x000007FEF1D25000-memory.dmp

    Filesize

    84KB

  • memory/2180-82-0x000007FEF0580000-0x000007FEF0592000-memory.dmp

    Filesize

    72KB

  • memory/2180-81-0x000007FEF05A0000-0x000007FEF05B1000-memory.dmp

    Filesize

    68KB

  • memory/2180-80-0x000007FEF05C0000-0x000007FEF05F4000-memory.dmp

    Filesize

    208KB

  • memory/2180-75-0x000007FEF2680000-0x000007FEF26F4000-memory.dmp

    Filesize

    464KB

  • memory/2180-74-0x000007FEF2700000-0x000007FEF2747000-memory.dmp

    Filesize

    284KB

  • memory/2180-73-0x000007FEF2750000-0x000007FEF27B1000-memory.dmp

    Filesize

    388KB

  • memory/2180-83-0x000007FEEF6C0000-0x000007FEEF83A000-memory.dmp

    Filesize

    1.5MB

  • memory/2404-84-0x0000000000250000-0x0000000000251000-memory.dmp

    Filesize

    4KB

  • memory/2404-28-0x0000000010000000-0x0000000010006000-memory.dmp

    Filesize

    24KB

  • memory/2404-19-0x0000000000250000-0x0000000000251000-memory.dmp

    Filesize

    4KB

  • memory/2404-29-0x00000000003D0000-0x00000000003D6000-memory.dmp

    Filesize

    24KB