Analysis

  • max time kernel
    120s
  • max time network
    120s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    09-10-2024 02:23

General

  • Target

    2921d545258105bed4f82e815201051e_JaffaCakes118.exe

  • Size

    478KB

  • MD5

    2921d545258105bed4f82e815201051e

  • SHA1

    55ef1a551875ed0816612fa5ee776f0cbc3bfb00

  • SHA256

    063578f02f438cc15d8be2d46636f4754959c2552c9ce2fe4436b6fe6d222953

  • SHA512

    953d6e75172703e97bb7c14198225cd7838d66da5e41f4e4059278383aeb997721ee1b656cf4fb0d33203ea731e35989ee87555a91cf67ae5ed1d4792ccc38d8

  • SSDEEP

    12288:PdeOmafA+k8RE3RtGTpdRq7mxqtTeRQP1HESfc7auB:gOmIHe3RtGzNxqtyROJESMB

Malware Config

Signatures

  • Ardamax

    A keylogger first seen in 2013.

  • Ardamax main executable 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 5 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Drops file in System32 directory 6 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of SetWindowsHookEx 5 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2921d545258105bed4f82e815201051e_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\2921d545258105bed4f82e815201051e_JaffaCakes118.exe"
    1⤵
    • Loads dropped DLL
    • Drops file in System32 directory
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:2240
    • C:\Windows\SysWOW64\Sys32\JITX.exe
      "C:\Windows\system32\Sys32\JITX.exe"
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Adds Run key to start application
      • Drops file in System32 directory
      • System Location Discovery: System Language Discovery
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of SetWindowsHookEx
      PID:784

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Windows\SysWOW64\Sys32\AKV.exe

    Filesize

    389KB

    MD5

    53a578b112aeb18c5993556d4440ade1

    SHA1

    e51f2fcc784def3cc5ff594edfee5e25f1e9818c

    SHA256

    9170ccd49c118818a83d6ec5264e58519a986671828a144b70d9f601afd29156

    SHA512

    31357e35a4d31483951a7fbd0d774dffd880c8451e2410226dcfb8f8b1c24422febba81ae91aa2e5bb482bc0e662060f772417239e7e7a11c3c36ff8d716f352

  • C:\Windows\SysWOW64\Sys32\JITX.001

    Filesize

    518B

    MD5

    ff10776e73e28696fa2d2b8f8d854ab7

    SHA1

    6bfc8e6d9aff9e9553209466c15e71da2d769563

    SHA256

    2568d67d4c672379e872b6d2510425960d29c9908e3bb4724d5e2ef86c42fe73

    SHA512

    a4a0d104d1118771f3f5dc8a2f47a38b57c34bcaad367f548b1e68af7283836b20b347dbec1ec8da4a8567439d2a974549171e4de38c68ea31ed02d12080e967

  • C:\Windows\SysWOW64\Sys32\JITX.006

    Filesize

    7KB

    MD5

    504f5a7e8447c65bc2218bb3d47c309b

    SHA1

    5d2d703cfa8b1c0fab1b13b01e2250e246e2eb44

    SHA256

    81f383d6a9a90d1587af3f2903d9fd4ce4b4843aa285928ba731a3ee8f60c39f

    SHA512

    b90427bc146e30a5db47aaea4d7ac559db679f64ce490eb2195106acbc3d266442d71a7c0b00762203010436ed86bc84ef59bc3269b7611f9a6b5025fc85190b

  • C:\Windows\SysWOW64\Sys32\JITX.007

    Filesize

    5KB

    MD5

    22e9e9b13c2c676bec39178311d55253

    SHA1

    da60379e518feeb798005065dcf626a74afe1848

    SHA256

    3a77698cfcbbc40473f163c76838e6509c52bd6ffb97ba9d144ccd25ef5c7e14

    SHA512

    1d3b7eb4dcaa969a49786f1f55caa731e2e82dc79896985d50aa225fd7071bef521a6d85f56ee249db518cf0fc4a53f942299328bf54862307f742d3a6ca3dcc

  • \Users\Admin\AppData\Local\Temp\@9859.tmp

    Filesize

    3KB

    MD5

    14c3321783fac66161b308d34c5b0eac

    SHA1

    021b4f77e27d6e0b032158936a752e27cdde09fa

    SHA256

    09e6cfa1698ed3cd3592fa4ed36eb970fa599cb86ce6975f5ef90dfbaf6a2f21

    SHA512

    9ba6f2992164e7e98084e3c3b5a4cd231edeca22b784d01e5e98078ed19a1114ba9f837aa77ec3303bfcff6fa6a7a3b4588ee6e3a444eb35fc5e8c1d732825ad

  • \Windows\SysWOW64\Sys32\JITX.exe

    Filesize

    475KB

    MD5

    9c3ff825312190802dc56c7b0d0ccebd

    SHA1

    58e200c00382b3d13c81c9e829da065ed45f5928

    SHA256

    e55fbc08da9dc8bfb13b1d649e117540ee2c416a678eafa40e49088c2864dcc4

    SHA512

    513f6e3ab1bc31d01c1730c04313a39df5f9a5e30db70699df0507fff4c82f36706a637d32f532985e551a5a835682ebdc077560fee2f9741cba7767a86b7968

  • memory/784-24-0x00000000001E0000-0x00000000001E1000-memory.dmp

    Filesize

    4KB

  • memory/784-27-0x00000000001E0000-0x00000000001E1000-memory.dmp

    Filesize

    4KB