Analysis

  • max time kernel
    135s
  • max time network
    131s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    19-10-2024 17:46

General

  • Target

    5ddeb9d68b02871cb6cc2eec6a05a9dc_JaffaCakes118.exe

  • Size

    1.2MB

  • MD5

    5ddeb9d68b02871cb6cc2eec6a05a9dc

  • SHA1

    6aa8e62f9c14616c9440c3f3cadbcf29b575364b

  • SHA256

    249302da00ebf44fda53d5441bf6d41ca5da11c6536f473d531cd7159ac852aa

  • SHA512

    2b6634fc6c71837f0674e3e8bb066fdb377468301d37c6ff60cf36160b9d2ffed87c4d115ed6c509935de75aa6b78b019560dd6dcfa50fc70bc2fdbdabbd0435

  • SSDEEP

    24576:/tTpSpm0+6GDKXKRTBNlhPsSKLZvWE2BnPGtiji3kv5Qua:VT0F1wTuSaZeE2JGiji0hQn

Malware Config

Signatures

  • Ardamax

    A keylogger first seen in 2013.

  • Ardamax main executable 1 IoCs
  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 4 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Drops file in System32 directory 9 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies Internet Explorer settings 1 TTPs 36 IoCs
  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 10 IoCs
  • Suspicious use of WriteProcessMemory 16 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\5ddeb9d68b02871cb6cc2eec6a05a9dc_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\5ddeb9d68b02871cb6cc2eec6a05a9dc_JaffaCakes118.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1960
    • C:\Users\Admin\AppData\Local\Temp\explore.exe
      "C:\Users\Admin\AppData\Local\Temp\explore.exe"
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Drops file in System32 directory
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:2940
      • C:\Windows\SysWOW64\YSKIKU\KOX.exe
        "C:\Windows\system32\YSKIKU\KOX.exe"
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Adds Run key to start application
        • Drops file in System32 directory
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of SetWindowsHookEx
        PID:844
      • C:\Program Files\Internet Explorer\iexplore.exe
        "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\google_transparent.gif
        3⤵
        • Modifies Internet Explorer settings
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:1624
        • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
          "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1624 CREDAT:275457 /prefetch:2
          4⤵
          • Loads dropped DLL
          • System Location Discovery: System Language Discovery
          • Modifies Internet Explorer settings
          • Suspicious use of SetWindowsHookEx
          PID:2964

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    5675bfc08876a94f49f22290f26feeba

    SHA1

    2f247e04b6706fec3b1c828890d957a1d0b449e0

    SHA256

    437079497b662dca971a6ece71a031b20beec0d87b05a846c2a434c18cd54f9f

    SHA512

    296dee1c1c96f58fe694d45fd287275cadb891a24a2ea976183be6f5a469ec19043644243bde36780998547558a9d1c625f00edda50aa8660de448be5d43b58c

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    12daa7548d961ce293f4137481acc371

    SHA1

    56a2088b3221cca6254427611a41ae90878aeaa5

    SHA256

    4937892e2436974fdd3b3a912737dfbd336e60d3cf71de37a5e10ef186dd7abc

    SHA512

    c04a5224a49ad8b389fa6032234641e3cdbb0e0cac1f74604977fc8f58997efcd085ff9632b5e409008c743d57a6317871882b78ca18e675b5b49294e60f3d1e

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    6bd9d744061bacc824fedbb7c50b349c

    SHA1

    cd53b36bd2ce668b4091777295690321a14ca301

    SHA256

    dcf357ebf5203068e73aed7c2e7d4403ad8b49a4e8f4bdda30e9d6602e45b3fa

    SHA512

    1f8ca91e29aff26c5c5ea3fa95178b6acc22d3c073284c3dc4fa193d1333d60bfda22cad9538135002f6041f8532fab1af1eaafc7acccc91e07d2f9ce904881f

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    e53e6db1e51748e8358e8ed716be58f4

    SHA1

    3ece4a92f3a3f0a39f0d50e61204ab4b887d92fb

    SHA256

    d2151c825b413c86fd361f641ad95879f50987af44da72fc3335ffdd824d6883

    SHA512

    f7cd026b7c0612018561209609e82b992e7043fdd79f01f473b5667513c93342e037e3cfd23ebd508d6ea7ec6ee0eb345dbd4b324f851558c836a2c47fd2acd3

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    0cbea02505ea4b27d0c75ee751357de3

    SHA1

    8ebc4f9a7af77b63069ab15ffcbfa299ada9141a

    SHA256

    d07d0ceb3c3a7336f375d51b175eac0071f44a07145139f85bbcf4edfbc9ff1e

    SHA512

    29dce48de3bbad96b8c345813bb55bf52809fc4f4f7e2835728322f2b6f905e4db37ab20d8779d11a9fc177f84e2c81fc83ef4d67544680cf700969f52c909c1

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    c5a141f723458d00282b032aec91a8a6

    SHA1

    a1dba4b451f796446d1bfd2683e042d437436a3a

    SHA256

    f0116aea06a63271d7acf5e45c4109b5690a9b33778963a62d96bb560d66ba6c

    SHA512

    b1de7e9ba117cf4c5dfc330bd6f9060c3f7af534fbbc41d1783ca177a33ff81a24cbe090ee420a405d0d681cba7b703f8b0b3d33547e1effe4f7e7e03b48d004

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    24c6aa95fd9ff6a1c15148820f99c47b

    SHA1

    0c06e09d966f838a455d6f85c18d0e5735f372bf

    SHA256

    3558aedbb1da470fd55742a64c79816458c64be7e7298091d4b5d29d5608f7aa

    SHA512

    00a772be95771d4078b8602961eb4f992d7c345e88ec3641f88333db52dc0876263f6b130355f2eae8e675c8eb5a2c9bf427e16b4ce56ad81ae0a97d6b51d6ed

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    24e591c086476ae99b42a5d77e160600

    SHA1

    7ec89b8743e1075babddb3b76c1a8235fa51a2c2

    SHA256

    dd1e4fc5feab5c4ba9817e5af031682dc8f3009032286a209b503f6ea67580b6

    SHA512

    dc18a8655422d8a86988fb3ce3aab1f52bbe8fbe85d427778e8e8354adcc42bccae83068b8b3937b4276ef5a784d8023a508ddc9b0c161a8cb12f50085ee0339

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    f4aa4998d2662edffb35c582c77f264b

    SHA1

    ad2695eb2773dd1c55139c4987c2ddc69e967210

    SHA256

    987382497dda13ef35a06d88c35a46923ed11781050062f31dd60ea03f43cc81

    SHA512

    e7519016c7e788aa7584d99fd94623406fa99690f0e17f24ed197eba471a32c9030eba1e091c62137f35fb6cdd54be40509217256ddc196db9aaaa5017478d35

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    3b55eb42e4426ced606377abaa4c0acc

    SHA1

    5c1ce09cb57dd2c170bd64fe031ba3ac2fbcee13

    SHA256

    e7ddc25d9121c1d305926ac8b49ceb6b7081d2419948896eea5c6fd10dcc5479

    SHA512

    b2be8a039dd4e01f88f868be15f9a4c17ac641100c8668050b816dacc33691a93d0577a0bf918631d47f9553c8544f8e9280b0376becf572e0d65448b0afe646

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    9ddc5472d91218f8f9b25efb4a902b69

    SHA1

    224e521f043cf758944cddc764061abd78b4d9ae

    SHA256

    3ac36297f4a50901ff06933c985925c707a51535877f0c030aae8d0a24a66334

    SHA512

    ba0e1db2a82f519890c025aaa09c64095d8ecda7c1da3e8af706c167502d3a5cbd1f3cde7706d4cbf3e21f57340ee55b24778657ce70b90af71b14c4166e9996

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    7a119c2cecefbce0615dd1cdda0a838a

    SHA1

    b423b4e38ca5ba04f1f66ee7a371929dd20466cf

    SHA256

    a84ddce4de5e763fefd3b2135081de1fe863dcb8af4b740f5993b0dc58a1c310

    SHA512

    f929e12761e6fc36e352abdbcafe75be6ad055394f897d2eb357cc4df73f137f194c14203cb57e77ec2d6314dc2a349d0f958329aff0f65d0e6044c3c62b4360

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    03dd43a34dec352794991879902c4149

    SHA1

    a409bc1a40619e1838d52d90ab8cf14b5ea64215

    SHA256

    2b97882757d4042d287159d884be102fb1520b9faba4afdfba80b15d53fbda80

    SHA512

    d514357859ec0b03c0e6de2038b45a2ca7131742d03822a25c42784977d7f23d23b18a74066ef84ded36c6cdcba721a1b4159672d126a19c6ea60fc26674986f

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    fbab0f512906c489cf3cb64e26ac39ba

    SHA1

    af3a6a1b0d55d017718c09df4ccdcc69034c88da

    SHA256

    61a9ef74d75288785f197cee0ca319998f191eb0b6b92b79b4c61f53781ae024

    SHA512

    37b0ea4d9df2c730113b95282ce81e80f7dcbb8d114b4193e6d490e8b58ee01a111120f53ec56c29b8c8d493dcfdc04949ca8f2b9c0c2cf77e1cc3b367da7d9e

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    5d9dbb4361c655c8646a9f7fb44830f0

    SHA1

    689f1390ca325cfaa3697baa5e418c11c0248029

    SHA256

    739d3a6c7871419a4771fc93a311d62c16af4171a509293cead6853df4c4a64e

    SHA512

    e7da80f019667734cc7b7ac6e35281bf9f4949b86562c67172a715cc8262ab0ea53086d6c36383230a1322155ccbcd9179638f904287e3bcf48417f8d50c087e

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    b4b12915e491ce937da2529edfd23d38

    SHA1

    30d447476e46b4a6e09e61b33f490cc9c0e175c8

    SHA256

    d2a99810bbab8a132b72bbf225bffb60799180d9f6c29e062c88ec7bf086ad53

    SHA512

    ea6e160e8a18ff63e4ce5615c99742110089d5276b19ca3364dd80fdce211a7783aa45a5ba380a759126b907aa562b14668cd5a9868ddadddfcc34692c838789

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    a856b726bac1ed7efe16741fe2263815

    SHA1

    287d3a389c89bdeaecfd21e3f3b4e4f2a4819169

    SHA256

    41082e8787feeaa39a930424b4e1d26c10f2760e0c9a66ea16d6a00c3c3b9a1c

    SHA512

    ebc12ab84f7a6c0f3021bb1d34fefaf8fff7883a4830fe5f1e41354ac3a58f7e236ebf2c0efbe5e8aba20dcc3c6e417982f7c61671c74cb56c3b408333e39053

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    f04386df0b9d12e3852816f6e498240b

    SHA1

    df0ba8c30672df3ed6cd221f3568478224e533e8

    SHA256

    071427ec17d412939129245799c2de98a11372a76a76facc380a6996a0c9a08d

    SHA512

    78e5e469d51fbd53ae92d2f00dcddfae6ea9155ed03cbc1ee44fedbea73b8a0986eaaca43c509ea97fd906c6f6325865573144764fd26dc6d7b36de15464b601

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    b998080a8bf9fdf3f8806134abb3bbaf

    SHA1

    cafef3d66eda9c0796be8dc6df42115a7f4c7d26

    SHA256

    52927d2c1ae66180d59cb217684c91e198b5f03205f9e2727219e899babf431c

    SHA512

    928dc067f8be9a26226d2fb693f633ff5a25922676a5fdf0b64f9b07c8ea5d3f15b65c2df6f5ed9af773c150c65ed405af030e6509cf6d89f5401d05cf0e330c

  • C:\Users\Admin\AppData\Local\Temp\CabEB5A.tmp

    Filesize

    70KB

    MD5

    49aebf8cbd62d92ac215b2923fb1b9f5

    SHA1

    1723be06719828dda65ad804298d0431f6aff976

    SHA256

    b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

    SHA512

    bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

  • C:\Users\Admin\AppData\Local\Temp\TarEBBC.tmp

    Filesize

    181KB

    MD5

    4ea6026cf93ec6338144661bf1202cd1

    SHA1

    a1dec9044f750ad887935a01430bf49322fbdcb7

    SHA256

    8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

    SHA512

    6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b

  • C:\Users\Admin\AppData\Local\Temp\explore.exe

    Filesize

    1.2MB

    MD5

    2fd30798987ce0f50d4878c6345b2e79

    SHA1

    fdeb2f45da823345391a51c6007623ab119f487b

    SHA256

    cbf4779ccc484c0335137024b8a5e6670516db2e5da454818c5329919c434142

    SHA512

    f6a978f42c15063aee0022364a9ee3cc495fac879c54b8ffa5d104f93c174d05b5a5facc8346ef781f868f78b7a44a6ed06fe847e51d7f60bca3a80f9b9ef148

  • C:\Users\Admin\AppData\Local\Temp\google_transparent.gif

    Filesize

    1KB

    MD5

    26480db25dd9bdca4e51cec6353a58f2

    SHA1

    b9582b76a53371bda0e5404dfdd708b1a5d7c5cb

    SHA256

    4f3709a793e0938efdf67da9f184c1cffda07f5553f0e4ca8cf41b2de65c67b2

    SHA512

    d0128611b814a6bf65abbee5c28a5a1151f629020b520b83c85830a5a568c95c0e0d3a5cd145040ee7855114a5f348c2de6895df591b1175ed9b2ba55919bc05

  • C:\Windows\SysWOW64\YSKIKU\AKV.exe

    Filesize

    456KB

    MD5

    51507d91d43683b9c4b8fafeb4d888f8

    SHA1

    ead2f68338da7af4720378cd46133589fc9405ba

    SHA256

    71b3aecefd36e4855a369019ac5871c544d39f8889d23cd455466a24cdecce6b

    SHA512

    a5a7ff3f8ffb72719b7e2c9dc2719c99ea32bd68994918ea027c0d7d54cfe0c80bfd34486dd8d3cdd390376bc4c8d1f7d97de4b98b7d39a3e10c3e2682c07d1c

  • C:\Windows\SysWOW64\YSKIKU\KOX.001

    Filesize

    61KB

    MD5

    383d5f5d4240d590e7dec3f7312a4ac7

    SHA1

    f6bcade8d37afb80cf52a89b3e84683f4643fbce

    SHA256

    7e87f6817b17a75106d34ce9884c40ddfb381bf8f2013930916498d1df0a6422

    SHA512

    e652c41ec95d653940b869426bc2cbd8e5b3159110ffaab7d623e23eebe1f34ca65be6a9a9cdcd5f41aec7567469d6b4d6362d24ae92267cddb8940e1265806a

  • C:\Windows\SysWOW64\YSKIKU\KOX.002

    Filesize

    43KB

    MD5

    93df156c4bd9d7341f4c4a4847616a69

    SHA1

    c7663b32c3c8e247bc16b51aff87b45484652dc1

    SHA256

    e55b6eabf0f99b90bd4cf3777c25813bded7b6fc5c9955188c8aa5224d299c3e

    SHA512

    ed2e98c5fd1f0d49e5bac8baa515d489c89f8d42772ae05e4b7a32da8f06d511adad27867034ca0865beae9f78223e95c7d0f826154fc663f2fab9bd61e36e35

  • C:\Windows\SysWOW64\YSKIKU\KOX.004

    Filesize

    1KB

    MD5

    62000c3c0c763b032a13bfd240c9b449

    SHA1

    149b03cac928398795f3152ce03e82c284f390f3

    SHA256

    db2b5bd4e4cb02e15b2eda82ff815569f4fa42516bc3ee6e5e9036529e0966db

    SHA512

    59c767ca518099b765caefaeca93e5706332f2511db93e976908bf806707f424ef0de9cafb61afcb0107264d3d06cac83751831a3f6b8ad2c82fe44c0f9a632a

  • C:\Windows\SysWOW64\YSKIKU\KOX.exe

    Filesize

    1.7MB

    MD5

    3cd29c0df98a7aeb69a9692843ca3edb

    SHA1

    7c86aea093f1979d18901bd1b89a2b02a60ac3e2

    SHA256

    5a37cd66508fa3fc85ae547de3498e709bd45167cb57f5e9b271dc3a1cb71a32

    SHA512

    e78f3206b1878e8db1766d4038a375bbebcbcdb8d1b0a0cb9b0dc72c54881392b9c27e2864ad9118702da58f203f13e0ad5d230980ad1ef2370391a2c4acffc9

  • C:\Windows\SysWOW64\YSKIKU\Oct_19_2024__17_46_27.006

    Filesize

    331B

    MD5

    e2a9dfd628996b542ce226dfe0fabd86

    SHA1

    f371054567a0c3001bbda44f1c0969562b0c7311

    SHA256

    1f31b5e63b7b4211bc3fcd45e15553fd99cc9f9731f69978d99c4d4ee27e5d8d

    SHA512

    5a4e1d71eb678ce8b8fc18cd284b01d916bb7936793c88d33ee73511c34a99930784d32cc301911d260d6a038e5c860d2a2dad58fb7e06dac1076310889f413c

  • memory/1960-0-0x000007FEF61FE000-0x000007FEF61FF000-memory.dmp

    Filesize

    4KB

  • memory/1960-1-0x000007FEF5F40000-0x000007FEF68DD000-memory.dmp

    Filesize

    9.6MB

  • memory/1960-2-0x000007FEF5F40000-0x000007FEF68DD000-memory.dmp

    Filesize

    9.6MB

  • memory/1960-3-0x000007FEF5F40000-0x000007FEF68DD000-memory.dmp

    Filesize

    9.6MB

  • memory/1960-15-0x000007FEF5F40000-0x000007FEF68DD000-memory.dmp

    Filesize

    9.6MB