General

  • Target

    7d7715a391c5dd4718048bbadffda620_JaffaCakes118

  • Size

    2.2MB

  • Sample

    241030-b22paasncv

  • MD5

    7d7715a391c5dd4718048bbadffda620

  • SHA1

    e01cf1c5aa1592ede3dfca9e613d2d01c5564d5e

  • SHA256

    71b031d1bff5d1394daf263de1117f5a01e26a5fa394575b57db2f6a1aefc077

  • SHA512

    f6be5139cf2f3556f4a9aad68a31713b642e14b42599fc37c6fb6a325c0ae461f5979583d0449360e4ed0a60e524c493f74ccbd331a8e7ab66276192f494fe2e

  • SSDEEP

    49152:HGrTXhr4Ks3yUy2eBt4z2pFRWMv65dg1mUTG1RH26D6ABgGxv:HCUKrUyvUcFRRnIyG1NEAv

Malware Config

Targets

    • Target

      7d7715a391c5dd4718048bbadffda620_JaffaCakes118

    • Size

      2.2MB

    • MD5

      7d7715a391c5dd4718048bbadffda620

    • SHA1

      e01cf1c5aa1592ede3dfca9e613d2d01c5564d5e

    • SHA256

      71b031d1bff5d1394daf263de1117f5a01e26a5fa394575b57db2f6a1aefc077

    • SHA512

      f6be5139cf2f3556f4a9aad68a31713b642e14b42599fc37c6fb6a325c0ae461f5979583d0449360e4ed0a60e524c493f74ccbd331a8e7ab66276192f494fe2e

    • SSDEEP

      49152:HGrTXhr4Ks3yUy2eBt4z2pFRWMv65dg1mUTG1RH26D6ABgGxv:HCUKrUyvUcFRRnIyG1NEAv

    • Ardamax

      A keylogger first seen in 2013.

    • Ardamax family

    • Ardamax main executable

    • Identifies VirtualBox via ACPI registry values (likely anti-VM)

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Identifies Wine through registry keys

      Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.

    • Loads dropped DLL

    • Unexpected DNS network traffic destination

      Network traffic to other servers than the configured DNS servers was detected on the DNS port.

    • Adds Run key to start application

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Writes to the Master Boot Record (MBR)

      Bootkits write to the MBR to gain persistence at a level below the operating system.

    • Drops file in System32 directory

    • Suspicious use of NtSetInformationThreadHideFromDebugger

MITRE ATT&CK Enterprise v15

Tasks