Analysis

  • max time kernel
    134s
  • max time network
    125s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    06-10-2024 18:54

General

  • Target

    19471f98e68f19bce203dfc964eaaadb_JaffaCakes118.exe

  • Size

    1.2MB

  • MD5

    19471f98e68f19bce203dfc964eaaadb

  • SHA1

    c2f4eeb37a05f4e43b6ea825df5afb96bb0dbf5b

  • SHA256

    73a92df3abe0565f65eb72f7d82999007741bb1eff7ca081dd6e784b346bb976

  • SHA512

    d96396ccfd4002d46106b769883f7dba4a1a3a09a6c489b1ee703c73137817bfd5c1361e1a1afdc55de99b42f4727f4b9568f2da0af899da5a3c8959730dad3c

  • SSDEEP

    24576:euIIABU/pT/luS5EEdbb40C82oX3PWcy/4PMn7S+06/FDJU5ve:euINuRT/ltHZbV2oWcy/97SH2DQe

Malware Config

Signatures

  • Ardamax

    A keylogger first seen in 2013.

  • Ardamax main executable 1 IoCs
  • Modifies WinLogon for persistence 2 TTPs 1 IoCs
  • Checks computer location settings 2 TTPs 2 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 1 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Drops file in System32 directory 7 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Checks processor information in registry 2 TTPs 3 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Modifies registry class 1 IoCs
  • Suspicious behavior: AddClipboardFormatListener 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of SetWindowsHookEx 13 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\19471f98e68f19bce203dfc964eaaadb_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\19471f98e68f19bce203dfc964eaaadb_JaffaCakes118.exe"
    1⤵
    • Modifies WinLogon for persistence
    • Checks computer location settings
    • Drops file in System32 directory
    • System Location Discovery: System Language Discovery
    • Modifies registry class
    • Suspicious use of WriteProcessMemory
    PID:3308
    • C:\Windows\SysWOW64\iexpIore.exe
      "C:\Windows\system32\iexpIore.exe"
      2⤵
      • Checks computer location settings
      • Executes dropped EXE
      • Drops file in System32 directory
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:2320
      • C:\Windows\SysWOW64\CTOGAA\HSA.exe
        "C:\Windows\system32\CTOGAA\HSA.exe"
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Adds Run key to start application
        • Drops file in System32 directory
        • System Location Discovery: System Language Discovery
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of SetWindowsHookEx
        PID:4420
    • C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE
      "C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\event 30-04.doc" /o ""
      2⤵
      • Checks processor information in registry
      • Enumerates system info in registry
      • Suspicious behavior: AddClipboardFormatListener
      • Suspicious use of SetWindowsHookEx
      PID:880

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\TCDCEDA.tmp\gb.xsl

    Filesize

    262KB

    MD5

    51d32ee5bc7ab811041f799652d26e04

    SHA1

    412193006aa3ef19e0a57e16acf86b830993024a

    SHA256

    6230814bf5b2d554397580613e20681752240ab87fd354ececf188c1eabe0e97

    SHA512

    5fc5d889b0c8e5ef464b76f0c4c9e61bda59b2d1205ac9417cc74d6e9f989fb73d78b4eb3044a1a1e1f2c00ce1ca1bd6d4d07eeadc4108c7b124867711c31810

  • C:\Users\Admin\AppData\Local\Temp\event 30-04.doc

    Filesize

    154KB

    MD5

    0401d564ef74d730cffbaaca249dce70

    SHA1

    4287c7f00ef70b4acd8d05f808cdadc8786fbf21

    SHA256

    b71f365fef94334e7893288c3a5fbc3bf2510eb6f549d62679f370fccafcd55b

    SHA512

    1e0613829bc121d18917d7f261f3d0b9b465149c27a4d7432087b5af2ee7eb63ebb2ce2079f41542d58ff50c7f9aebef0a524a9f1bbc53dcde49497df705febf

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\fb3b0dbfee58fac8.customDestinations-ms

    Filesize

    2KB

    MD5

    20945a697499f0c3b186ea8a2e870c86

    SHA1

    274a0e1005bfda021c8be4a9137d20251d8a4590

    SHA256

    c1333798720a623e39050a451c935c77bb369dc35e090c0e78a7c3dc46832175

    SHA512

    dd080307e20fa278c070f0d283c9ee17440527aa307f503c4fe7c58f4b631498ef7697d2be0d828f9cddb31ed8e63d5d5c3eddbaded176f7cd786adf8e23c08b

  • C:\Windows\SysWOW64\CTOGAA\HSA.001

    Filesize

    61KB

    MD5

    4eb04b9187bbf3e3c33bf95e74eb6262

    SHA1

    ca5dcaea5ef4ba48c0bb06635c0b5abed4f0f342

    SHA256

    cf84d5704b350beaf1f2b46dc44bd372141d7554a8958ce22c0a84a3f21f2fe7

    SHA512

    aeaa608cd4f66ba817a7e8698d17f9801c9cedf99875decff39bc18cebdec3947f02566bdf21d9096e5a6a6b740717ab06d46a2a9605bf8e8fa0fee12fe17e81

  • C:\Windows\SysWOW64\CTOGAA\HSA.002

    Filesize

    43KB

    MD5

    1aed6fee0870288cdb607393fc2f33a1

    SHA1

    584fd8d5ffbced19dd09b8b71cee9026c0ac65c6

    SHA256

    02c4eef7045896258d00077e123719aa256c606f4e38c417965ba5f64d48e180

    SHA512

    15e5b7843b07bcb4a638057b05712c66b285d70ace24ab3a4c125d24d538ace20cfac179accefa417d7790f7a095327affd3cd73d9eacaa632356f95a9fde3b8

  • C:\Windows\SysWOW64\CTOGAA\HSA.004

    Filesize

    1KB

    MD5

    779ff99404e8b8d81c658a4e22e677c2

    SHA1

    33482d87aff5e13f8d03994cc7b75111fdc4ef48

    SHA256

    5b9e83a776ae17d5c5feeb695aa7d73e9cf50ef44edb7803e2ef0caf7303366d

    SHA512

    2f1526f051d8094610af780cfd93b1b9868bc7bc7a7e68f0ee73131c9e656cdab5d30bea0329277a59e5a51cdd6314591ea28508fbad9e6ff4b6de64e1861df0

  • C:\Windows\SysWOW64\CTOGAA\HSA.exe

    Filesize

    1.5MB

    MD5

    865b02aa4fb68ac150953986e6f63f1c

    SHA1

    214190642d67f02c349e68f3f3c6ef0e9c2212d7

    SHA256

    fac58547e80a1b9598261b6d2aa5175653831e507c57b6860bc5d04d2e754dff

    SHA512

    473dc55a8a8f11d8445cef9cd8cabf8a9b227a6e47994ecfe9c86d41062641668d858e61b7ade1ad2801c5daa13d0630159b7ad241379e111c83564030c0a40e

  • C:\Windows\SysWOW64\iexpIore.exe

    Filesize

    900KB

    MD5

    1fa7d6fb2e718e5e86ae5779270652da

    SHA1

    d04d45dec75b82464959221ef7fa090e06983b84

    SHA256

    9078e7e373e46910c806e2783504e3bf423dc3b71252e72c16487388ff804342

    SHA512

    ca4ca291ebf63f3dd1a73f8c2d3b6144ef056a3d8a4489d3d56151828912f51db306273b04ceccedcb21a51a286980199b98da83c2c88944d26f930de57ed545

  • memory/880-33-0x00007FFEB0430000-0x00007FFEB0440000-memory.dmp

    Filesize

    64KB

  • memory/880-36-0x00007FFEB0430000-0x00007FFEB0440000-memory.dmp

    Filesize

    64KB

  • memory/880-34-0x00007FFEB0430000-0x00007FFEB0440000-memory.dmp

    Filesize

    64KB

  • memory/880-35-0x00007FFEB0430000-0x00007FFEB0440000-memory.dmp

    Filesize

    64KB

  • memory/880-41-0x00007FFEAE180000-0x00007FFEAE190000-memory.dmp

    Filesize

    64KB

  • memory/880-42-0x00007FFEAE180000-0x00007FFEAE190000-memory.dmp

    Filesize

    64KB

  • memory/880-32-0x00007FFEB0430000-0x00007FFEB0440000-memory.dmp

    Filesize

    64KB

  • memory/3308-25-0x0000000000400000-0x000000000042C000-memory.dmp

    Filesize

    176KB