Analysis

  • max time kernel
    122s
  • max time network
    128s
  • platform
    windows7_x64
  • resource
    win7-20241010-en
  • resource tags

    arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system
  • submitted
    29-10-2024 00:28

General

  • Target

    7b3b6d0f461c023b5e98b7fc0c3945a1_JaffaCakes118.exe

  • Size

    163KB

  • MD5

    7b3b6d0f461c023b5e98b7fc0c3945a1

  • SHA1

    e39af91eb316b1053ded0978d6366976e54e5892

  • SHA256

    803cadabc649c4a225fb0176a93e265a1ec4ca97a0b20a545087a2755dfd89f2

  • SHA512

    371271c376a6b567fcb38b19bb30479599cb1dc31260b6faca50cf3ae90b87d00a037ff01200d1c70dc65016c5042dbde6468e7175f982779172463aaec43477

  • SSDEEP

    3072:LCNmpyGkNdVux3lCi/BTrN5fmQczJrORqRjetDcnUvUgIk4Tj:kmpyGkNqdRrfmdJ/9GYnpk4Tj

Malware Config

Signatures

  • Ardamax

    A keylogger first seen in 2013.

  • Ardamax family
  • Ardamax main executable 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 3 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Drops file in System32 directory 5 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\7b3b6d0f461c023b5e98b7fc0c3945a1_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\7b3b6d0f461c023b5e98b7fc0c3945a1_JaffaCakes118.exe"
    1⤵
    • Loads dropped DLL
    • Drops file in System32 directory
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:2872
    • C:\Windows\SysWOW64\system32.exe
      "C:\Windows\system32\system32.exe"
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Drops file in System32 directory
      • System Location Discovery: System Language Discovery
      PID:2060

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Windows\SysWOW64\system32.001

    Filesize

    2KB

    MD5

    971b7ea62dd8f6305c8fac47dd60b8f3

    SHA1

    9bc950078ef82fa02358250e4b264546ba1f8625

    SHA256

    d3b79fc2c937d59459b2ab6ea28574b46c5c4c8879ce9cf70426f4375b606cda

    SHA512

    b491a627af210d3dc0771571adc0522f03eedebf34b6a7f5238df9e8a3e528a504833aad1c4b95cb1dd01ad6e75f43c3efe9719640815189c629e2467f2fba95

  • C:\Windows\SysWOW64\system32.exe

    Filesize

    274KB

    MD5

    c33abe6c3c8b935fa45226c1467e78c4

    SHA1

    634f54548daafc9258fc211c65e26406f66de201

    SHA256

    7975addf3af8ce986baaa5b977f5539653738f93444e1562ec9fce453dd1d371

    SHA512

    d08ebc621436057a549ea7f38047b6fd09b466ae01efc56928f7b7a9b80243831139a838f02de0a46b8866241a2f04b2ae1053e09b89ee973d8c49b87f9d14b1

  • \Users\Admin\AppData\Local\Temp\@315D.tmp

    Filesize

    4KB

    MD5

    45d47de748454b62b019b1deb97b9263

    SHA1

    159af46897bc8b3beb9df9900ec4ee4f62e84e61

    SHA256

    8a606741d8dd0fb17a6f4ec49b31c410e52de207bde429df1cbf6b50c5c6c051

    SHA512

    31934d4e14bc7314551c8ae9a87cc31afe0fceadb13b9e6ecc40c7180530f6f1a932c05d426284b24a5f00ef96f50a821b132710cdf0feb856e112d6446caaa8

  • memory/2060-19-0x00000000001C0000-0x00000000001C1000-memory.dmp

    Filesize

    4KB