Analysis

  • max time kernel
    120s
  • max time network
    118s
  • platform
    windows7_x64
  • resource
    win7-20240704-en
  • resource tags

    arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system
  • submitted
    06-10-2024 18:54

General

  • Target

    19471f98e68f19bce203dfc964eaaadb_JaffaCakes118.exe

  • Size

    1.2MB

  • MD5

    19471f98e68f19bce203dfc964eaaadb

  • SHA1

    c2f4eeb37a05f4e43b6ea825df5afb96bb0dbf5b

  • SHA256

    73a92df3abe0565f65eb72f7d82999007741bb1eff7ca081dd6e784b346bb976

  • SHA512

    d96396ccfd4002d46106b769883f7dba4a1a3a09a6c489b1ee703c73137817bfd5c1361e1a1afdc55de99b42f4727f4b9568f2da0af899da5a3c8959730dad3c

  • SSDEEP

    24576:euIIABU/pT/luS5EEdbb40C82oX3PWcy/4PMn7S+06/FDJU5ve:euINuRT/ltHZbV2oWcy/97SH2DQe

Malware Config

Signatures

  • Ardamax

    A keylogger first seen in 2013.

  • Ardamax main executable 1 IoCs
  • Modifies WinLogon for persistence 2 TTPs 1 IoCs
  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 4 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Drops file in System32 directory 7 IoCs
  • Drops file in Windows directory 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 4 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Office loads VBA resources, possible macro or embedded object present
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 16 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\19471f98e68f19bce203dfc964eaaadb_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\19471f98e68f19bce203dfc964eaaadb_JaffaCakes118.exe"
    1⤵
    • Modifies WinLogon for persistence
    • Loads dropped DLL
    • Drops file in System32 directory
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:2372
    • C:\Windows\SysWOW64\iexpIore.exe
      "C:\Windows\system32\iexpIore.exe"
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Drops file in System32 directory
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:1720
      • C:\Windows\SysWOW64\CTOGAA\HSA.exe
        "C:\Windows\system32\CTOGAA\HSA.exe"
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Adds Run key to start application
        • Drops file in System32 directory
        • System Location Discovery: System Language Discovery
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of SetWindowsHookEx
        PID:2160
    • C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE
      "C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\event 30-04.doc"
      2⤵
      • Loads dropped DLL
      • Drops file in Windows directory
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: AddClipboardFormatListener
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:1420
      • C:\Windows\splwow64.exe
        C:\Windows\splwow64.exe 12288
        3⤵
          PID:1528

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\event 30-04.doc

      Filesize

      154KB

      MD5

      0401d564ef74d730cffbaaca249dce70

      SHA1

      4287c7f00ef70b4acd8d05f808cdadc8786fbf21

      SHA256

      b71f365fef94334e7893288c3a5fbc3bf2510eb6f549d62679f370fccafcd55b

      SHA512

      1e0613829bc121d18917d7f261f3d0b9b465149c27a4d7432087b5af2ee7eb63ebb2ce2079f41542d58ff50c7f9aebef0a524a9f1bbc53dcde49497df705febf

    • C:\Windows\SysWOW64\CTOGAA\HSA.001

      Filesize

      61KB

      MD5

      4eb04b9187bbf3e3c33bf95e74eb6262

      SHA1

      ca5dcaea5ef4ba48c0bb06635c0b5abed4f0f342

      SHA256

      cf84d5704b350beaf1f2b46dc44bd372141d7554a8958ce22c0a84a3f21f2fe7

      SHA512

      aeaa608cd4f66ba817a7e8698d17f9801c9cedf99875decff39bc18cebdec3947f02566bdf21d9096e5a6a6b740717ab06d46a2a9605bf8e8fa0fee12fe17e81

    • C:\Windows\SysWOW64\CTOGAA\HSA.002

      Filesize

      43KB

      MD5

      1aed6fee0870288cdb607393fc2f33a1

      SHA1

      584fd8d5ffbced19dd09b8b71cee9026c0ac65c6

      SHA256

      02c4eef7045896258d00077e123719aa256c606f4e38c417965ba5f64d48e180

      SHA512

      15e5b7843b07bcb4a638057b05712c66b285d70ace24ab3a4c125d24d538ace20cfac179accefa417d7790f7a095327affd3cd73d9eacaa632356f95a9fde3b8

    • C:\Windows\SysWOW64\CTOGAA\HSA.004

      Filesize

      1KB

      MD5

      779ff99404e8b8d81c658a4e22e677c2

      SHA1

      33482d87aff5e13f8d03994cc7b75111fdc4ef48

      SHA256

      5b9e83a776ae17d5c5feeb695aa7d73e9cf50ef44edb7803e2ef0caf7303366d

      SHA512

      2f1526f051d8094610af780cfd93b1b9868bc7bc7a7e68f0ee73131c9e656cdab5d30bea0329277a59e5a51cdd6314591ea28508fbad9e6ff4b6de64e1861df0

    • \Windows\SysWOW64\CTOGAA\HSA.exe

      Filesize

      1.5MB

      MD5

      865b02aa4fb68ac150953986e6f63f1c

      SHA1

      214190642d67f02c349e68f3f3c6ef0e9c2212d7

      SHA256

      fac58547e80a1b9598261b6d2aa5175653831e507c57b6860bc5d04d2e754dff

      SHA512

      473dc55a8a8f11d8445cef9cd8cabf8a9b227a6e47994ecfe9c86d41062641668d858e61b7ade1ad2801c5daa13d0630159b7ad241379e111c83564030c0a40e

    • \Windows\SysWOW64\iexpIore.exe

      Filesize

      900KB

      MD5

      1fa7d6fb2e718e5e86ae5779270652da

      SHA1

      d04d45dec75b82464959221ef7fa090e06983b84

      SHA256

      9078e7e373e46910c806e2783504e3bf423dc3b71252e72c16487388ff804342

      SHA512

      ca4ca291ebf63f3dd1a73f8c2d3b6144ef056a3d8a4489d3d56151828912f51db306273b04ceccedcb21a51a286980199b98da83c2c88944d26f930de57ed545

    • memory/1420-17-0x000000002FD81000-0x000000002FD82000-memory.dmp

      Filesize

      4KB

    • memory/1420-21-0x000000005FFF0000-0x0000000060000000-memory.dmp

      Filesize

      64KB

    • memory/2372-16-0x0000000000400000-0x000000000042C000-memory.dmp

      Filesize

      176KB