Analysis

  • max time kernel
    122s
  • max time network
    122s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    03-10-2024 03:50

General

  • Target

    0dc73286e68d6afbb8ea5e3d37d43afb_JaffaCakes118.exe

  • Size

    598KB

  • MD5

    0dc73286e68d6afbb8ea5e3d37d43afb

  • SHA1

    2829cd925521f8e1f35c8fa5ca526bfdfa995647

  • SHA256

    a54c6bc0fc02a0d927162bad14d7c98112a119e9b153007c252c3a2d92cc6ff8

  • SHA512

    546fe7b8a6c603c8cc579039687764cbb776faa7fe3eb403eef1c6858fd0918859b26c32cdf751c640a6cb28524dfc18bd5da7918409cc5bb1056ff1a5aade86

  • SSDEEP

    12288:OEW+WI0sHSSQoa478qBhINa3R3NW8RlPmJmjn97A8j1AtwAnWmgU+b3hEnqzxP3f:I+QsHSSQoWa3R3NW8n6mj97Dj1AiAWmy

Malware Config

Signatures

  • Ardamax

    A keylogger first seen in 2013.

  • Ardamax main executable 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 4 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Indicator Removal: File Deletion 1 TTPs

    Adversaries may delete files left behind by the actions of their intrusion activity.

  • Drops file in System32 directory 5 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of SetWindowsHookEx 5 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\0dc73286e68d6afbb8ea5e3d37d43afb_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\0dc73286e68d6afbb8ea5e3d37d43afb_JaffaCakes118.exe"
    1⤵
    • Loads dropped DLL
    • Drops file in System32 directory
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:300
    • C:\Windows\SysWOW64\28463\LYDT.exe
      "C:\Windows\system32\28463\LYDT.exe"
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Adds Run key to start application
      • Drops file in System32 directory
      • System Location Discovery: System Language Discovery
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:792
      • C:\Windows\SysWOW64\cmd.exe
        "C:\Windows\system32\cmd.exe" /c del C:\Windows\SysWOW64\28463\LYDT.exe > nul
        3⤵
        • System Location Discovery: System Language Discovery
        PID:2616

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Windows\SysWOW64\28463\LYDT.001

    Filesize

    392B

    MD5

    4e282ffa5d664bb70fffeaa663e7b3fa

    SHA1

    7ef5fa2d83df69a823da821034ad545c4a9e644c

    SHA256

    62bc6d88c863a01400c5cf37be1cfe967d17f3d53e532e8d222f1f3d3608c125

    SHA512

    05dfc123a9daac70ec434070f6557866f7057230860b207933a1d3fa760aaac6298dc0894697fc22a00b93f9be759b5f536befc82d8463bc3870de051456e313

  • C:\Windows\SysWOW64\28463\LYDT.007

    Filesize

    5KB

    MD5

    2183e6a435b000fc6e85b712513c3480

    SHA1

    c088b82494aaeca23a5acfaf83f55597bd0bdc6e

    SHA256

    9a1a58cea0b0cfe3479d29bb39b0a5af0ee75fbd94254529ad28f2e54aec30e5

    SHA512

    94ffbd46b10cf71ea59d3d44ceece691d7d50e8e111e330d44346f1e56e62d7a3b5c375917494fff89966d0ea5fc562d45b14b983269eba72b2831abce7a1afe

  • \Users\Admin\AppData\Local\Temp\@DF76.tmp

    Filesize

    4KB

    MD5

    b89311bdf4e6640cc9051e629476cbe4

    SHA1

    ced30235482232b045cd5d8004e8ead01b30f9ca

    SHA256

    db0e9d83d8a5309ae4ab4747ff6ce506a2f85b01a598caad697a69b3ddb557a1

    SHA512

    8e71c2238e23cd793feb061736d00f8aea0002f79e2632093529ed6242f9af2a99baa598d58c04bbc9c02715d7f18955ae88334e39caa2978e88904cf27911d4

  • \Windows\SysWOW64\28463\LYDT.006

    Filesize

    8KB

    MD5

    911a5a213762001178a48b2ceefa1880

    SHA1

    de9b25ac58e893397ab9ad3331bd922bbd5043ae

    SHA256

    273375c7be87b6da793320ee25ea08967bf8cb43e6213e4af94955e565afabc9

    SHA512

    cc4f95dc64085033a6f5308d61bce83991a8949ec89513fa0428527b6c20f40bc4ce0b323da3020f405f29bf3fcf703722082247f591568d39e8e355543f04c9

  • \Windows\SysWOW64\28463\LYDT.exe

    Filesize

    912KB

    MD5

    6768ba61744862704760b66ce8f8fdd4

    SHA1

    e86cbed8cf20c2a9c76219d0c434bc310ffb2392

    SHA256

    4cf4bf2b7d2bb4215e255e1f2b1238ad989f3c8a98ebfd5cb033bccf32fedaa0

    SHA512

    eadb56b633707724ef4f47f8b421b0f3b2afa5a9800fae030f81aefae483eed6b494da470278273f388c3ae346a33cbbfe742924d231dab1c9b42bbefaf95a61

  • memory/300-11-0x00000000028B0000-0x0000000002993000-memory.dmp

    Filesize

    908KB

  • memory/792-20-0x0000000000250000-0x0000000000251000-memory.dmp

    Filesize

    4KB

  • memory/792-23-0x0000000000400000-0x00000000004E3000-memory.dmp

    Filesize

    908KB

  • memory/792-24-0x0000000000250000-0x0000000000251000-memory.dmp

    Filesize

    4KB

  • memory/792-25-0x0000000000400000-0x00000000004E3000-memory.dmp

    Filesize

    908KB