General

  • Target

    11bfc07c75b6f0545cbdaa20007db413_JaffaCakes118

  • Size

    602KB

  • Sample

    241004-ek5amaxdqf

  • MD5

    11bfc07c75b6f0545cbdaa20007db413

  • SHA1

    6ffdc476c9aab1f75bfbead8dca434b91772364a

  • SHA256

    39438c438c6d2f295d9001bc7d23ee3548ecc31e1cbf34271cbc2e9a7e640036

  • SHA512

    a2962a85c1499f1505b8348c38bb3b185f02f70de1e641d10968dc46ee8699f1d26aea600888dfca64487ea2b8cc0d514ebbae1625b7ca56f8203ea80fce656f

  • SSDEEP

    12288:M3TdtLW5WIj1YSSdFx3ovBSXyMzBUWb9lx/9AgHLo8OW+rB8:2Dsj1dEnwBcJ9nPx/igrp+q

Malware Config

Targets

    • Target

      11bfc07c75b6f0545cbdaa20007db413_JaffaCakes118

    • Size

      602KB

    • MD5

      11bfc07c75b6f0545cbdaa20007db413

    • SHA1

      6ffdc476c9aab1f75bfbead8dca434b91772364a

    • SHA256

      39438c438c6d2f295d9001bc7d23ee3548ecc31e1cbf34271cbc2e9a7e640036

    • SHA512

      a2962a85c1499f1505b8348c38bb3b185f02f70de1e641d10968dc46ee8699f1d26aea600888dfca64487ea2b8cc0d514ebbae1625b7ca56f8203ea80fce656f

    • SSDEEP

      12288:M3TdtLW5WIj1YSSdFx3ovBSXyMzBUWb9lx/9AgHLo8OW+rB8:2Dsj1dEnwBcJ9nPx/igrp+q

    • Ardamax

      A keylogger first seen in 2013.

    • Ardamax main executable

    • Modifies WinLogon for persistence

    • Disables RegEdit via registry modification

    • Disables Task Manager via registry modification

    • ASPack v2.12-2.42

      Detects executables packed with ASPack v2.12-2.42

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • AutoIT Executable

      AutoIT scripts compiled to PE executables.

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks