Analysis

  • max time kernel
    149s
  • max time network
    153s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    08-10-2024 11:02

General

  • Target

    212f470ff29e79332f622b7417b6795b_JaffaCakes118.exe

  • Size

    273KB

  • MD5

    212f470ff29e79332f622b7417b6795b

  • SHA1

    db26c7ffe58d29725f00abe8f4b2e464b1a875d1

  • SHA256

    e4764c8c8cfb26192cb174f1d9405fb27981f171fca54dc358b3f1aca8578ad3

  • SHA512

    914bb8b77888852faa2c96f9a24ae9d2c178e502e1210f9e87a3330fcc2bf58b1a4548fe70db002d69b97e5ec936c8566f09e3956e9184e1a6e900caccc2a9cd

  • SSDEEP

    6144:4rQ6NkJpBTqVKrjNNwR9h0DRINA9jxJ1ba/SqDUvayw/:4rQZJpE+Aw71QDUC5

Malware Config

Signatures

  • Ardamax

    A keylogger first seen in 2013.

  • Ardamax main executable 1 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 4 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Drops file in System32 directory 7 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of SetWindowsHookEx 5 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\212f470ff29e79332f622b7417b6795b_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\212f470ff29e79332f622b7417b6795b_JaffaCakes118.exe"
    1⤵
    • Checks computer location settings
    • Loads dropped DLL
    • Drops file in System32 directory
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:2452
    • C:\Windows\SysWOW64\Sys32\BETG.exe
      "C:\Windows\system32\Sys32\BETG.exe"
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Adds Run key to start application
      • Drops file in System32 directory
      • System Location Discovery: System Language Discovery
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of SetWindowsHookEx
      PID:4228

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\@901A.tmp

    Filesize

    4KB

    MD5

    2bbb6ffc878515a79478917c5af03a9c

    SHA1

    52532ea393f3a623c05b2cd72a205da41f152c29

    SHA256

    23c8cc69783ab663e036fb0d15c01b3863ff898d5534fa1d02f16c291863f3a5

    SHA512

    be8846674af43f20501e6fe59fbd369d7393e79970ab1a4fc7c516c491939f575c5e07a1cd284287e8663d1ca2f4e6663839a79f798a7453ecd30bb0fbdcc464

  • C:\Users\Admin\AppData\Local\Temp\explorer.exe

    Filesize

    1KB

    MD5

    0a0dcefcdf5e8431961dc6461a430e63

    SHA1

    f024475f917667f6f44ce6b7275ab67d386d8c64

    SHA256

    d0c2387f31c03a6593ac8151143aed4fdfcf9cfe4708f9444cc0ac00f25dbcc5

    SHA512

    27b2b39ba903ae86312540e9fb7c575e3527e0a197af98badb16b996527ac4aeb3e9d99b32231b18c8176629a469932b90567c3744ddce115c7e2480ba3aba4a

  • C:\Windows\SysWOW64\Sys32\BETG.001

    Filesize

    502B

    MD5

    22f7a14dd559a3fd9835ecbe097468a3

    SHA1

    18b1f4febd480e6a808276c33e38db7ce25af287

    SHA256

    ad313e3df9398a096c21cec9cf814936dca1e2f492fb05513887649f07f19144

    SHA512

    6e58f86cb3f9bb9d21c75f78a78259338ab757b6a232f235b1df8eb8d3e585c85c05a55fe38e629eb789329f94791a6e8eabe78f79ca3c1844e858583212ee0e

  • C:\Windows\SysWOW64\Sys32\BETG.006

    Filesize

    7KB

    MD5

    a08026db7b86f2ba69f6317a4a66778b

    SHA1

    6afe5979a1ef3ee8b94b6ef4a6bf8a70d641bf62

    SHA256

    90c1300aaa05d24a32f9d01824c611742a10c2bb3e0450504b62282ab658e2f5

    SHA512

    059d6abdb37800f7673d116a0e9a4d2f3e8e7d955a402ef91ca97cf24f3c29121dc36c54599511ac0e04cd2b1467e30fb7b2563e42e2fe43e71560816902207e

  • C:\Windows\SysWOW64\Sys32\BETG.007

    Filesize

    5KB

    MD5

    49e240cd2e8fe880e177e208aaf8feea

    SHA1

    54e9ee5a7523148542113ee654f00ea13d3ca3d7

    SHA256

    f1b86ba7a2c3aa753966cc67bc5efb4e4badb670b6a0e56ffcfdcbbc379108fc

    SHA512

    e92efd1d0ab3249d6c93b32af0885e22726421055bff36dcf64d307ef2f8aaf2dd06c221342bd5e2a1fadb5d61ac284cd39750cdf1134fd530ba9ff1744d965f

  • C:\Windows\SysWOW64\Sys32\BETG.exe

    Filesize

    477KB

    MD5

    db4d88b22f173a37c34477abeea6a789

    SHA1

    11c42d2d445c01a408ad947d48927fe2b370aa8c

    SHA256

    251cd62057ee822ad0139fddadd88945ef0951af715eea17ac5faa4b25e17a55

    SHA512

    67501ecf3b474536c3ae0cf68d49672b108b3b509a229f2a8bd4126e2f67228c93e2bbb78379de7dac3bbff6f7495d1d1aeffebb3fa5f8c7a0e29eaac4bce23e

  • memory/4228-28-0x0000000000A60000-0x0000000000A61000-memory.dmp

    Filesize

    4KB

  • memory/4228-32-0x0000000000A60000-0x0000000000A61000-memory.dmp

    Filesize

    4KB