Analysis

  • max time kernel
    141s
  • max time network
    126s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    09-10-2024 04:22

General

  • Target

    2abbe2435b80358655c93cb5a388b790_JaffaCakes118.exe

  • Size

    652KB

  • MD5

    2abbe2435b80358655c93cb5a388b790

  • SHA1

    5002eca05b476d2e38f75a6ae19e88e4cc11c7d8

  • SHA256

    9bacf2080d71c340c34b0865b33795925da1d52f96786160cd56e64e5503ab6c

  • SHA512

    f7aadb2aa71eaf7a63501131a54db264ab8f7d87cfd98a6e04ecd21a26cb7189f134b297a9b02da27f8cff9fa205c1d7d774f6317f7df7cb8947404c31340d4e

  • SSDEEP

    12288:cyKlsEr9jVYSBPcZFwcomlgz4cJdiXG5akRXYcFTI5vjCXK4COYO93W:cfjVYSheomqz/5PRIcFTyvtfO8

Malware Config

Signatures

  • Ardamax

    A keylogger first seen in 2013.

  • Ardamax main executable 1 IoCs
  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 9 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Drops file in System32 directory 6 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies registry class 36 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of SetWindowsHookEx 5 IoCs
  • Suspicious use of WriteProcessMemory 17 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2abbe2435b80358655c93cb5a388b790_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\2abbe2435b80358655c93cb5a388b790_JaffaCakes118.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2916
    • C:\Users\Admin\AppData\Local\Temp\Install.exe
      "C:\Users\Admin\AppData\Local\Temp\Install.exe"
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Drops file in System32 directory
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:2288
      • C:\Windows\SysWOW64\28463\HSSA.exe
        "C:\Windows\system32\28463\HSSA.exe"
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Adds Run key to start application
        • Drops file in System32 directory
        • System Location Discovery: System Language Discovery
        • Modifies registry class
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of SetWindowsHookEx
        PID:2788
    • C:\Windows\Microsoft.NET\Framework64\v2.0.50727\dw20.exe
      dw20.exe -x -s 820
      2⤵
        PID:540

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\Install.exe

      Filesize

      566KB

      MD5

      b997c994107d7baf8a7d8fbb3f1ef7dd

      SHA1

      45142ece4bd25e6ac168b887e93a1db24806e38c

      SHA256

      f4668858f4903a233df2cb99b2a0361ffb8af050c5f123f7416e2fb385c7fdfe

      SHA512

      34f3a36a1a8cc6b4753847f1cd27dcc400ace0a5c886c3f8bf172c21fc09e6972a143b6132eb85ce1a15cbbe4e049657c7386a70d6e9c3a3a532558dafdfaf57

    • C:\Windows\SysWOW64\28463\HSSA.001

      Filesize

      392B

      MD5

      49b382a62195b68b25479db35af024ef

      SHA1

      0bec0529ae83d1588937d63ec26e36353eb89955

      SHA256

      935a6a6d394347e7dfba4a19547fe94398a502af964ef741510f5dbedb01b625

      SHA512

      70952ad186f4624569fc6d5e4e779ab085602e43463bef4b98128f9e651e7deb41888b1daa4de0d86e24880d4bd01512996d682ee471eb0efd387bdf4482225a

    • C:\Windows\SysWOW64\28463\HSSA.006

      Filesize

      8KB

      MD5

      31854a50b294dd312eb7fa9eb1c99537

      SHA1

      e0b1682a001e15d0e0e1c1ca732cafb5c80b3160

      SHA256

      2fe2d55aae2deef38a37c9679d74ecf05699d6919760794f69583b43b7fe308c

      SHA512

      0482a4981ba242d4e931bd8b9eb5d606492cffb7609fb69fb349ed19c7a9e36a7e240e5ebe759505d253c5e72fb771612a76419c36fb035987a166569a5111c2

    • C:\Windows\SysWOW64\28463\HSSA.007

      Filesize

      5KB

      MD5

      603451f504bedb28c3a7bae4c89abf24

      SHA1

      cbfe12186b54663f60663c349739c7a49950c44e

      SHA256

      e4d6577ea390274308877284b6d0cd6672aeb0e76c9c9847ac59c0964f050d13

      SHA512

      136e28e288b3ce26b37c82b078a3440e3232c0f874d7d33e8e6fb6eadfd0024b9009448500c716523b81f142fa3bebf7d11f1dd3e8e6143867b06335eb5f9612

    • C:\Windows\SysWOW64\28463\key.bin

      Filesize

      105B

      MD5

      27c90d4d9b049f4cd00f32ed1d2e5baf

      SHA1

      338a3ea8f1e929d8916ece9b6e91e697eb562550

      SHA256

      172d6f21165fb3ca925e5b000451fd8946920206f7438018c28b158b90cf5ffb

      SHA512

      d73dadb3cf74c647ce5bad5b87d3fb42a212defcba8afb8cf962020b61a0369c0a2b1005797583daf1f1ae88b29b7288bc544a53d643f3519cf604aa0ffd6dae

    • \Users\Admin\AppData\Local\Temp\@BE02.tmp

      Filesize

      4KB

      MD5

      f1cf9fcbddeadabb738de497ffefdced

      SHA1

      7385a7c87e245da89cc5ef8f9295678c1566f25d

      SHA256

      086083bc73b14286f9c3c29df8b8dc6f014d8b084267fbaeee0af56344d1f779

      SHA512

      3a3b9d279b4c131ef3f358e0163f60ec9e60160a2cc45488adb915fea6642f3df5d35da2ccb6983d790401d237fbc808829f42c42ef958e7a0eac98fc33bb3f6

    • \Windows\SysWOW64\28463\HSSA.exe

      Filesize

      648KB

      MD5

      ce568bcaf7285124f764aff92f5079d4

      SHA1

      886f698e2239cf615f12b503853a5fa28c53aefc

      SHA256

      59d7d6de8a9e2d5535703d22c36888889530fd011d7f71cf034e93e36e7527af

      SHA512

      9f6e3496930cb5dd9c9403acc865bc94f63f64af49a27ffeedbc9d9082d50bff4a7a772bb98d4a2719f0ecae144393de9cc273ba83ae00abe347b0be0d7c9866

    • memory/2788-43-0x0000000000400000-0x00000000004DF000-memory.dmp

      Filesize

      892KB

    • memory/2788-34-0x0000000000950000-0x0000000000A2F000-memory.dmp

      Filesize

      892KB

    • memory/2788-33-0x0000000000950000-0x0000000000A2F000-memory.dmp

      Filesize

      892KB

    • memory/2788-32-0x0000000000400000-0x00000000004DF000-memory.dmp

      Filesize

      892KB

    • memory/2788-45-0x0000000000950000-0x0000000000A2F000-memory.dmp

      Filesize

      892KB

    • memory/2788-49-0x0000000000400000-0x00000000004DF000-memory.dmp

      Filesize

      892KB

    • memory/2916-0-0x000007FEF5FDE000-0x000007FEF5FDF000-memory.dmp

      Filesize

      4KB

    • memory/2916-3-0x0000000000760000-0x0000000000770000-memory.dmp

      Filesize

      64KB

    • memory/2916-2-0x000007FEF5D20000-0x000007FEF66BD000-memory.dmp

      Filesize

      9.6MB

    • memory/2916-41-0x000007FEF5D20000-0x000007FEF66BD000-memory.dmp

      Filesize

      9.6MB

    • memory/2916-42-0x000007FEF5FDE000-0x000007FEF5FDF000-memory.dmp

      Filesize

      4KB

    • memory/2916-46-0x000007FEF5D20000-0x000007FEF66BD000-memory.dmp

      Filesize

      9.6MB