Analysis

  • max time kernel
    119s
  • max time network
    121s
  • platform
    windows7_x64
  • resource
    win7-20241023-en
  • resource tags

    arch:x64arch:x86image:win7-20241023-enlocale:en-usos:windows7-x64system
  • submitted
    24-10-2024 20:08

General

  • Target

    74d8a2d88572e34b7af2ab623cadf49a_JaffaCakes118.exe

  • Size

    2.0MB

  • MD5

    74d8a2d88572e34b7af2ab623cadf49a

  • SHA1

    10cc10249395ab40fccacbf7bdb8d499eee7fc75

  • SHA256

    6c66f3a11f7877469bcc764c8d87173708ee866eb5dfb9459f4144c4874d6c1f

  • SHA512

    e127d16c920d49d542c279aa31e9645863b629a7c32daacbb595a61f5de8bef53305bf1dba801ffea5d0d1a3700e9f25e3a66e5079d7462dc30d21c86a4e2b65

  • SSDEEP

    49152:KHLa3ZVW4zUFJNQ6TvNXj5CYOGHSUKdiEbn:Kr0bzWdvNlCW7KR

Malware Config

Signatures

  • Ardamax

    A keylogger first seen in 2013.

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 3 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Indicator Removal: File Deletion 1 TTPs

    Adversaries may delete files left behind by the actions of their intrusion activity.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 4 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of SetWindowsHookEx 8 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\74d8a2d88572e34b7af2ab623cadf49a_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\74d8a2d88572e34b7af2ab623cadf49a_JaffaCakes118.exe"
    1⤵
    • Loads dropped DLL
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:2128
    • C:\ProgramData\FYRMHI\OWW.exe
      "C:\ProgramData\FYRMHI\OWW.exe"
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Adds Run key to start application
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious behavior: GetForegroundWindowSpam
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:844
      • C:\Windows\SysWOW64\cmd.exe
        "C:\Windows\system32\cmd.exe" /c del C:\PROGRA~3\FYRMHI\OWW.exe > nul
        3⤵
        • System Location Discovery: System Language Discovery
        PID:544
    • C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe
      "C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\vila_casa.pdf"
      2⤵
      • Loads dropped DLL
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: GetForegroundWindowSpam
      • Suspicious use of SetWindowsHookEx
      PID:2364

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\ProgramData\FYRMHI\OWW.00

    Filesize

    1KB

    MD5

    0a67f1b5575775a7504f6db2582c5482

    SHA1

    d536dd8bc64aeff5b352e275abfc9c1fac19f0ef

    SHA256

    752a6d372c08db03be236ab6516749a811e39689b72910e73681b6312d44c5e4

    SHA512

    451d5af401394d94f0de1930685a010a20eca544acd69448bde0cbb7252cd08afc31c88fa3d45f7a19b064df47e4e84fce724f8833f5ecdc9263b757f623009c

  • C:\ProgramData\FYRMHI\OWW.02

    Filesize

    55KB

    MD5

    a5d03fa42bbc61b83633f48e116a0903

    SHA1

    22ff92cd0f3db35a912f4e0f611eff0acff3e436

    SHA256

    7593171136ad95f1692d9fe06dcba7c909e59ccc079eabc1df99ba9e35b38f77

    SHA512

    ad5c1f85f17d3f4a807b796c3e0caddf01472bc76200357c9f8468d68f6865e6d1e4e52c0fa8d4417c17f0238f62ced6e072cf58caa1256ac7faa86a71db3778

  • C:\ProgramData\FYRMHI\OWW.exe

    Filesize

    2.3MB

    MD5

    9649f77f9b5174f577a7f0916ff795e8

    SHA1

    574e0d09a7b8fd06e7c7e6fe08de0a5651f06319

    SHA256

    1a03ec1a99b3d4d541f2297f49a8b7d9d0a940eb6df204c26c42d3b85bd8bc95

    SHA512

    21172db0b423b85ddd6e366e2dbc22ed8194993071fa916be8535865928d929231c374cffe16508fc445de6951f04364bedd5ae55f150266a2695fb36aa5a453

  • C:\Users\Admin\AppData\Local\Temp\vila_casa.pdf

    Filesize

    64KB

    MD5

    400bb1b0a19647324cb760c48902ce8e

    SHA1

    fa03440af75e09fd43617bd940a6c6e8439b88a7

    SHA256

    ae4a66bd85638fa8159e0d4e892b1217d8cbf770d03d7264c432530829b8d918

    SHA512

    bd0ec287b8102338b37f6a75b73e2701434f613f921560b266a0c8820a103aa5bea7c83463a82ff12cd27d351b938c813515b8537f447d7b81a89dec554b3ff1

  • C:\Users\Admin\AppData\Roaming\Adobe\Acrobat\9.0\SharedDataEvents

    Filesize

    3KB

    MD5

    7027f3e7e2397820a05be868ed5c3454

    SHA1

    b417ceca2989e37f6b9b89d5a60f8311d4adfbaf

    SHA256

    6ad0343dab514326ab44e456866ccb202b350103913b6307fe46728de3a64471

    SHA512

    2c14c4f8ec582a7873820f6b07f8182fb7d4f7547375d610aae40eb9b2f3262468820e7b24d22147f43682cf3a24258ea2267b76f1ab9d09d04a68aee5297053

  • \ProgramData\FYRMHI\OWW.01

    Filesize

    79KB

    MD5

    2d3d2d84ad552e325b9fc05088717816

    SHA1

    77dc93e499e89fc37c53d7d3a3004e7b7bd16567

    SHA256

    e638b13e4020b3679e9fa140867c8709481da2fe355577c09be548a59b936358

    SHA512

    4e63941c1e7474e55fecd2901c30916bbb95531996bf912b883ff72f70d9c34bc6abb58fba3166997b2156db73874d4280f873f4f2e54273af43a3ba1dfd3f79

  • memory/844-20-0x0000000000400000-0x0000000000682000-memory.dmp

    Filesize

    2.5MB

  • memory/844-21-0x0000000000400000-0x0000000000682000-memory.dmp

    Filesize

    2.5MB

  • memory/844-19-0x0000000000360000-0x0000000000379000-memory.dmp

    Filesize

    100KB

  • memory/844-22-0x0000000000400000-0x0000000000682000-memory.dmp

    Filesize

    2.5MB

  • memory/844-17-0x0000000000400000-0x0000000000682000-memory.dmp

    Filesize

    2.5MB

  • memory/844-13-0x0000000000401000-0x0000000000402000-memory.dmp

    Filesize

    4KB

  • memory/844-44-0x0000000000400000-0x0000000000682000-memory.dmp

    Filesize

    2.5MB

  • memory/2128-0-0x0000000000D11000-0x0000000000D12000-memory.dmp

    Filesize

    4KB

  • memory/2128-15-0x0000000000D10000-0x0000000000F17000-memory.dmp

    Filesize

    2.0MB

  • memory/2128-2-0x0000000000D10000-0x0000000000F17000-memory.dmp

    Filesize

    2.0MB

  • memory/2128-1-0x0000000000D10000-0x0000000000F17000-memory.dmp

    Filesize

    2.0MB

  • memory/2364-24-0x0000000000260000-0x0000000000279000-memory.dmp

    Filesize

    100KB