Analysis

  • max time kernel
    121s
  • max time network
    125s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    09-10-2024 08:10

General

  • Target

    2dacbdfe164e8058e19f47adb34c7952_JaffaCakes118.exe

  • Size

    1.0MB

  • MD5

    2dacbdfe164e8058e19f47adb34c7952

  • SHA1

    2424eb596ea4ea068dbc7ed0a92b8832b25f1cdc

  • SHA256

    519f9e2b62195e69015ba75647abb6f68c3a212ac158326373181c2ee0582938

  • SHA512

    8459608c2b60bf55ae926372208ec3953293fb613c53c8a5126aa64a666660d8cff074795ff8d051dbf18bd41bfc03379eb9eb1b44d810dad5db7310c8f174fe

  • SSDEEP

    24576:hbPTZuhrv2964f6EgrppvKx9s8wJIRkhbI0:h7TZuhi9Llkp4x9s8wti

Malware Config

Signatures

  • Ardamax

    A keylogger first seen in 2013.

  • Ardamax main executable 1 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Drops file in System32 directory 6 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies registry class 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of SetWindowsHookEx 5 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2dacbdfe164e8058e19f47adb34c7952_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\2dacbdfe164e8058e19f47adb34c7952_JaffaCakes118.exe"
    1⤵
    • Checks computer location settings
    • Loads dropped DLL
    • Drops file in System32 directory
    • System Location Discovery: System Language Discovery
    • Modifies registry class
    • Suspicious use of WriteProcessMemory
    PID:3816
    • C:\Windows\SysWOW64\HVSMTG\LIQ.exe
      "C:\Windows\system32\HVSMTG\LIQ.exe"
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Adds Run key to start application
      • Drops file in System32 directory
      • System Location Discovery: System Language Discovery
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of SetWindowsHookEx
      PID:2320
  • C:\Windows\system32\OpenWith.exe
    C:\Windows\system32\OpenWith.exe -Embedding
    1⤵
    • Modifies registry class
    • Suspicious use of SetWindowsHookEx
    PID:1500

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Windows\SysWOW64\HVSMTG\AKV.exe

    Filesize

    449KB

    MD5

    c9c6aba587fe42be25665749af41b886

    SHA1

    00a21ba1606bfdc82d28f6446098e7f449c25380

    SHA256

    ca69b6956a1d6008375b891f38325dce4ce53714eac11d6813ccf3c966b77256

    SHA512

    30bac4fd9675b08da828b54a479d83f2878acbb6c6a04d6d5a4b51a9932193ad82a2a8dde801549f915d821b3c43ec785a436de8cebd0f3e502c352d85919533

  • C:\Windows\SysWOW64\HVSMTG\LIQ.001

    Filesize

    61KB

    MD5

    95b07437917e9503258bb0be7ed990c9

    SHA1

    33ac620bc8ce3e81003f0ed8b2d86bbb78b0627a

    SHA256

    d2d7d89210612058fc0e25c006741b43470abe49e0cc6814ad74167e0360b082

    SHA512

    0f416247527c4c111a173aead637f69ca834d6839edb3cd4b5ea51341b968c6d33ac95e7c0efcca50ae600a45c4c87fd73d975dbb976300c8c6e9c8022df4916

  • C:\Windows\SysWOW64\HVSMTG\LIQ.002

    Filesize

    43KB

    MD5

    67d88bedc71d3d792be6670c1ef430f3

    SHA1

    b17be4fbdab99d43947eebf89a571c54dff378ee

    SHA256

    9854dc77f77358bdb1cdb66eaccb30c5ab7d0012628753a177018577e493ea85

    SHA512

    891e09ac0b7c2f996fd4c2349bcd15f7aee21f9e0c5ba19a5ca3b6783190d9bcd6890544ecc77faeb129ebffec23f2c951ffd5b68d61c2841754c7e5189276ae

  • C:\Windows\SysWOW64\HVSMTG\LIQ.004

    Filesize

    696B

    MD5

    b110d448903177ac7aba5b0477e0797d

    SHA1

    169333e673ba47e8c25e57f652344fd8d91d6fca

    SHA256

    7275903cddb0507bd20307a5c0d03ccdba757b6ec21c7caf925767693a02ba72

    SHA512

    f070050cdad722d45d6cd67cb98b05ecb0696f421e67c3b1290e8232fa8903bb79d4f5850cf2f666636aed74dac762a0fa22dbf73c7c0adf1973ec81aa2a8c65

  • C:\Windows\SysWOW64\HVSMTG\LIQ.exe

    Filesize

    1.4MB

    MD5

    0df9e23abc4065b8bb5d05dfbd763846

    SHA1

    4009325028ba008fe8c8cc45f58964a7b88aab26

    SHA256

    bae7e866a2a189073427edbaf6f0e1576b439356c6216a717452039f63b3b35b

    SHA512

    38ec2de32b0965a6596f1f43e7baafa2567600a123d5e59b5018aec10b0cc9f34e326bb48aeba4bb7ad07f352e8ba244da46212ba4256c9b99fa5c1ba25fe814

  • memory/2320-17-0x0000000000B10000-0x0000000000B11000-memory.dmp

    Filesize

    4KB

  • memory/2320-21-0x0000000000B10000-0x0000000000B11000-memory.dmp

    Filesize

    4KB