Analysis

  • max time kernel
    141s
  • max time network
    125s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    19-10-2024 17:46

General

  • Target

    5ddeb9d68b02871cb6cc2eec6a05a9dc_JaffaCakes118.exe

  • Size

    1.2MB

  • MD5

    5ddeb9d68b02871cb6cc2eec6a05a9dc

  • SHA1

    6aa8e62f9c14616c9440c3f3cadbcf29b575364b

  • SHA256

    249302da00ebf44fda53d5441bf6d41ca5da11c6536f473d531cd7159ac852aa

  • SHA512

    2b6634fc6c71837f0674e3e8bb066fdb377468301d37c6ff60cf36160b9d2ffed87c4d115ed6c509935de75aa6b78b019560dd6dcfa50fc70bc2fdbdabbd0435

  • SSDEEP

    24576:/tTpSpm0+6GDKXKRTBNlhPsSKLZvWE2BnPGtiji3kv5Qua:VT0F1wTuSaZeE2JGiji0hQn

Malware Config

Signatures

  • Ardamax

    A keylogger first seen in 2013.

  • Ardamax main executable 1 IoCs
  • Checks computer location settings 2 TTPs 2 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 3 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Drops file in System32 directory 9 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies Internet Explorer settings 1 TTPs 41 IoCs
  • Modifies registry class 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 10 IoCs
  • Suspicious use of WriteProcessMemory 11 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\5ddeb9d68b02871cb6cc2eec6a05a9dc_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\5ddeb9d68b02871cb6cc2eec6a05a9dc_JaffaCakes118.exe"
    1⤵
    • Checks computer location settings
    • Suspicious use of WriteProcessMemory
    PID:1056
    • C:\Users\Admin\AppData\Local\Temp\explore.exe
      "C:\Users\Admin\AppData\Local\Temp\explore.exe"
      2⤵
      • Checks computer location settings
      • Executes dropped EXE
      • Drops file in System32 directory
      • System Location Discovery: System Language Discovery
      • Modifies registry class
      • Suspicious use of WriteProcessMemory
      PID:848
      • C:\Windows\SysWOW64\YSKIKU\KOX.exe
        "C:\Windows\system32\YSKIKU\KOX.exe"
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Adds Run key to start application
        • Drops file in System32 directory
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of SetWindowsHookEx
        PID:5096
      • C:\Program Files\Internet Explorer\iexplore.exe
        "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\google_transparent.gif
        3⤵
        • Modifies Internet Explorer settings
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:4892
        • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
          "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:4892 CREDAT:17410 /prefetch:2
          4⤵
          • Loads dropped DLL
          • System Location Discovery: System Language Discovery
          • Modifies Internet Explorer settings
          • Suspicious use of SetWindowsHookEx
          PID:5116

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\XH3Z2ZON\suggestions[1].en-US

    Filesize

    17KB

    MD5

    5a34cb996293fde2cb7a4ac89587393a

    SHA1

    3c96c993500690d1a77873cd62bc639b3a10653f

    SHA256

    c6a5377cbc07eece33790cfc70572e12c7a48ad8296be25c0cc805a1f384dbad

    SHA512

    e1b7d0107733f81937415104e70f68b1be6fd0ca65dccf4ff72637943d44278d3a77f704aedff59d2dbc0d56a609b2590c8ec0dd6bc48ab30f1dad0c07a0a3ee

  • C:\Users\Admin\AppData\Local\Temp\explore.exe

    Filesize

    1.2MB

    MD5

    2fd30798987ce0f50d4878c6345b2e79

    SHA1

    fdeb2f45da823345391a51c6007623ab119f487b

    SHA256

    cbf4779ccc484c0335137024b8a5e6670516db2e5da454818c5329919c434142

    SHA512

    f6a978f42c15063aee0022364a9ee3cc495fac879c54b8ffa5d104f93c174d05b5a5facc8346ef781f868f78b7a44a6ed06fe847e51d7f60bca3a80f9b9ef148

  • C:\Users\Admin\AppData\Local\Temp\google_transparent.gif

    Filesize

    1KB

    MD5

    26480db25dd9bdca4e51cec6353a58f2

    SHA1

    b9582b76a53371bda0e5404dfdd708b1a5d7c5cb

    SHA256

    4f3709a793e0938efdf67da9f184c1cffda07f5553f0e4ca8cf41b2de65c67b2

    SHA512

    d0128611b814a6bf65abbee5c28a5a1151f629020b520b83c85830a5a568c95c0e0d3a5cd145040ee7855114a5f348c2de6895df591b1175ed9b2ba55919bc05

  • C:\Windows\SysWOW64\YSKIKU\AKV.exe

    Filesize

    456KB

    MD5

    51507d91d43683b9c4b8fafeb4d888f8

    SHA1

    ead2f68338da7af4720378cd46133589fc9405ba

    SHA256

    71b3aecefd36e4855a369019ac5871c544d39f8889d23cd455466a24cdecce6b

    SHA512

    a5a7ff3f8ffb72719b7e2c9dc2719c99ea32bd68994918ea027c0d7d54cfe0c80bfd34486dd8d3cdd390376bc4c8d1f7d97de4b98b7d39a3e10c3e2682c07d1c

  • C:\Windows\SysWOW64\YSKIKU\KOX.001

    Filesize

    61KB

    MD5

    383d5f5d4240d590e7dec3f7312a4ac7

    SHA1

    f6bcade8d37afb80cf52a89b3e84683f4643fbce

    SHA256

    7e87f6817b17a75106d34ce9884c40ddfb381bf8f2013930916498d1df0a6422

    SHA512

    e652c41ec95d653940b869426bc2cbd8e5b3159110ffaab7d623e23eebe1f34ca65be6a9a9cdcd5f41aec7567469d6b4d6362d24ae92267cddb8940e1265806a

  • C:\Windows\SysWOW64\YSKIKU\KOX.002

    Filesize

    43KB

    MD5

    93df156c4bd9d7341f4c4a4847616a69

    SHA1

    c7663b32c3c8e247bc16b51aff87b45484652dc1

    SHA256

    e55b6eabf0f99b90bd4cf3777c25813bded7b6fc5c9955188c8aa5224d299c3e

    SHA512

    ed2e98c5fd1f0d49e5bac8baa515d489c89f8d42772ae05e4b7a32da8f06d511adad27867034ca0865beae9f78223e95c7d0f826154fc663f2fab9bd61e36e35

  • C:\Windows\SysWOW64\YSKIKU\KOX.004

    Filesize

    1KB

    MD5

    62000c3c0c763b032a13bfd240c9b449

    SHA1

    149b03cac928398795f3152ce03e82c284f390f3

    SHA256

    db2b5bd4e4cb02e15b2eda82ff815569f4fa42516bc3ee6e5e9036529e0966db

    SHA512

    59c767ca518099b765caefaeca93e5706332f2511db93e976908bf806707f424ef0de9cafb61afcb0107264d3d06cac83751831a3f6b8ad2c82fe44c0f9a632a

  • C:\Windows\SysWOW64\YSKIKU\KOX.exe

    Filesize

    1.7MB

    MD5

    3cd29c0df98a7aeb69a9692843ca3edb

    SHA1

    7c86aea093f1979d18901bd1b89a2b02a60ac3e2

    SHA256

    5a37cd66508fa3fc85ae547de3498e709bd45167cb57f5e9b271dc3a1cb71a32

    SHA512

    e78f3206b1878e8db1766d4038a375bbebcbcdb8d1b0a0cb9b0dc72c54881392b9c27e2864ad9118702da58f203f13e0ad5d230980ad1ef2370391a2c4acffc9

  • C:\Windows\SysWOW64\YSKIKU\Oct_19_2024__17_46_27.006

    Filesize

    331B

    MD5

    b310b907b30f58acdf9664d97967ddfe

    SHA1

    ae37aae52e4ce8d9c78ab2396277b777cd331f22

    SHA256

    1a3a87cbaca2d823eabd4ff83af21219800bcb9ba65995c93dc4b42c94dc0a72

    SHA512

    14ccce232b18937483a6529a2180db2b19fab5d874493bcd2e81a754a4c77e43f256e076420272d3d97fb403a3aa18f0d4a8fc68d09a1e6ca3858ce3eb77eaf1

  • memory/1056-4-0x000000001BDE0000-0x000000001BE7C000-memory.dmp

    Filesize

    624KB

  • memory/1056-18-0x00007FFA28900000-0x00007FFA292A1000-memory.dmp

    Filesize

    9.6MB

  • memory/1056-8-0x00007FFA28900000-0x00007FFA292A1000-memory.dmp

    Filesize

    9.6MB

  • memory/1056-7-0x000000001BF40000-0x000000001BF8C000-memory.dmp

    Filesize

    304KB

  • memory/1056-6-0x0000000000E20000-0x0000000000E28000-memory.dmp

    Filesize

    32KB

  • memory/1056-5-0x00007FFA28900000-0x00007FFA292A1000-memory.dmp

    Filesize

    9.6MB

  • memory/1056-0-0x00007FFA28BB5000-0x00007FFA28BB6000-memory.dmp

    Filesize

    4KB

  • memory/1056-3-0x000000001B7E0000-0x000000001BCAE000-memory.dmp

    Filesize

    4.8MB

  • memory/1056-2-0x00007FFA28900000-0x00007FFA292A1000-memory.dmp

    Filesize

    9.6MB

  • memory/1056-1-0x000000001B220000-0x000000001B2C6000-memory.dmp

    Filesize

    664KB