Analysis

  • max time kernel
    148s
  • max time network
    148s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    30-10-2024 01:39

General

  • Target

    7d7715a391c5dd4718048bbadffda620_JaffaCakes118.exe

  • Size

    2.2MB

  • MD5

    7d7715a391c5dd4718048bbadffda620

  • SHA1

    e01cf1c5aa1592ede3dfca9e613d2d01c5564d5e

  • SHA256

    71b031d1bff5d1394daf263de1117f5a01e26a5fa394575b57db2f6a1aefc077

  • SHA512

    f6be5139cf2f3556f4a9aad68a31713b642e14b42599fc37c6fb6a325c0ae461f5979583d0449360e4ed0a60e524c493f74ccbd331a8e7ab66276192f494fe2e

  • SSDEEP

    49152:HGrTXhr4Ks3yUy2eBt4z2pFRWMv65dg1mUTG1RH26D6ABgGxv:HCUKrUyvUcFRRnIyG1NEAv

Malware Config

Signatures

  • Ardamax

    A keylogger first seen in 2013.

  • Ardamax family
  • Ardamax main executable 1 IoCs
  • Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 1 IoCs
  • Executes dropped EXE 2 IoCs
  • Identifies Wine through registry keys 2 TTPs 1 IoCs

    Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.

  • Loads dropped DLL 6 IoCs
  • Unexpected DNS network traffic destination 12 IoCs

    Network traffic to other servers than the configured DNS servers was detected on the DNS port.

  • Adds Run key to start application 2 TTPs 1 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Writes to the Master Boot Record (MBR) 1 TTPs 1 IoCs

    Bootkits write to the MBR to gain persistence at a level below the operating system.

  • Drops file in System32 directory 6 IoCs
  • Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies system certificate store 2 TTPs 4 IoCs
  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of SetWindowsHookEx 48 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\7d7715a391c5dd4718048bbadffda620_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\7d7715a391c5dd4718048bbadffda620_JaffaCakes118.exe"
    1⤵
    • Loads dropped DLL
    • Drops file in System32 directory
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:2068
    • C:\Windows\SysWOW64\VKEERT\OXM.exe
      "C:\Windows\system32\VKEERT\OXM.exe"
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Adds Run key to start application
      • Drops file in System32 directory
      • System Location Discovery: System Language Discovery
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of SetWindowsHookEx
      PID:2804
    • C:\Users\Admin\AppData\Local\Temp\u1008.exe
      "C:\Users\Admin\AppData\Local\Temp\u1008.exe"
      2⤵
      • Identifies VirtualBox via ACPI registry values (likely anti-VM)
      • Executes dropped EXE
      • Identifies Wine through registry keys
      • Loads dropped DLL
      • Writes to the Master Boot Record (MBR)
      • Suspicious use of NtSetInformationThreadHideFromDebugger
      • System Location Discovery: System Language Discovery
      • Modifies system certificate store
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of SetWindowsHookEx
      PID:2756

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    a40cbdb1d4092d730721780c97f3e801

    SHA1

    7407ac29532cd1873a165fe9d3f53f7cb7d8a3d6

    SHA256

    5fd448c4156f9f435c4604f368564269e77bac8edff84e019c30e7b42200eeef

    SHA512

    1249ce2e91af3f77b397c16c4ee6be8dc87483165199ec5f740c810d4b7f90e203ce6bfd1a60e881ce3a5136524dc4d1a4fe5abaa7f91dca318b7f2660ca2a11

  • C:\Users\Admin\AppData\Local\Temp\Cab6B72.tmp

    Filesize

    70KB

    MD5

    49aebf8cbd62d92ac215b2923fb1b9f5

    SHA1

    1723be06719828dda65ad804298d0431f6aff976

    SHA256

    b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

    SHA512

    bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

  • C:\Users\Admin\AppData\Local\Temp\Tar8396.tmp

    Filesize

    181KB

    MD5

    4ea6026cf93ec6338144661bf1202cd1

    SHA1

    a1dec9044f750ad887935a01430bf49322fbdcb7

    SHA256

    8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

    SHA512

    6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b

  • C:\Windows\SysWOW64\VKEERT\AKV.exe

    Filesize

    456KB

    MD5

    45a56a60fc710085ef72a86ae4de2a44

    SHA1

    91133410b770cfc8433b976aa44fc34346e614e6

    SHA256

    82d3a18d8121ad32e61d0c1fc1dabb2073d21ce82431c9d1259e2589aad373e2

    SHA512

    c4322b3b668efd8858ce71e1d80e25f21f75b39d4331d8c88050a8f484e524eac58226dfdbeb89fe569e89a6e93fcbb3300d537666126eb3fbf4fe54136aabbf

  • C:\Windows\SysWOW64\VKEERT\OXM.001

    Filesize

    60KB

    MD5

    5b79ad0d1d30119158b5ab4147edbd96

    SHA1

    6f802d57d49d7063e40b7bebafa8fb1051e0a907

    SHA256

    4ccebd38ac000cbc33a6cfc2e87e900ef64ba4b978f3facfdb5870e217ac3ff7

    SHA512

    497e3eff3c7356cf12efd153b651d1a1ef2cb07302eb5b71dcff0d6732e5273bcff5f82897dff85cdaae0bc159fa9c4588e3bc90ab12521532675bf116757c6b

  • C:\Windows\SysWOW64\VKEERT\OXM.002

    Filesize

    43KB

    MD5

    af3efaa90f29f6506693136ae1674fc7

    SHA1

    897aea8f6df7e29d43954512fc390b97c0eb4550

    SHA256

    4658d92f74df5ee142c08157985e25e41f74aaaa4256df9dfc9a011b7c3f0f44

    SHA512

    1a87ce2d0767204b1d636ce70c083c71f5cfa064680218906ff86c233968baca7ef605f2b1d9bfaf8326a8cbff7074ace766604b283c1a2b50d5788038dc9863

  • C:\Windows\SysWOW64\VKEERT\OXM.004

    Filesize

    1KB

    MD5

    025af52aa3c7e64bf1acc045a4dfab6e

    SHA1

    f9e7fd1e3cff2ec34497cd4cf929452eff5f6dce

    SHA256

    bdb25abcd63860479fd62c0494e8a7cae48be91d365efc208941cdcb3fa25db4

    SHA512

    13f57511f72c1769c326478e52d033506e1865c7c27100b5143ec8d28152010ffc14e44e0f3478b2d1dc556e4862b5d9113e21a3516fd39c5af1cf4e06ac8ccc

  • \Users\Admin\AppData\Local\Temp\u1008.exe

    Filesize

    1.1MB

    MD5

    b2d30ed05e7a230b1d6254666234d51f

    SHA1

    3efa10b5724887b0dee11b7f9948232517050d6d

    SHA256

    977ad551cf91339042406eccbed808a0ebe0f693f82e0dd90ea266430d772198

    SHA512

    f21f88b744def8244b4680236909d7ef051425c0bd18bc05951d8f16470e2103e4be140c5b4b264e41abaa51e519d3b426d4d7268453df0d731a86eea7b3d11b

  • \Windows\SysWOW64\VKEERT\OXM.exe

    Filesize

    1.7MB

    MD5

    78dd492b06d03744d1954781d33775ca

    SHA1

    ef9462193e6ba7be64458ea1be6afcaeadc574b1

    SHA256

    c0664f94e9b2a7817f79b9457c31e524ef72ed7c073e79546d67e857b4637ede

    SHA512

    f88734970018f46b8c4ce350cccf577ac056957e933deb493becbc30b7165834ca68db423850220f8944b364dc97e1423247192faf4f3e4db85cf25c4576eef9

  • memory/2068-26-0x00000000038F0000-0x0000000003EF9000-memory.dmp

    Filesize

    6.0MB

  • memory/2756-28-0x0000000000400000-0x0000000000A09000-memory.dmp

    Filesize

    6.0MB

  • memory/2756-70-0x0000000000400000-0x0000000000A09000-memory.dmp

    Filesize

    6.0MB

  • memory/2756-37-0x0000000000400000-0x0000000000A09000-memory.dmp

    Filesize

    6.0MB

  • memory/2756-38-0x0000000000400000-0x0000000000A09000-memory.dmp

    Filesize

    6.0MB

  • memory/2756-127-0x0000000000400000-0x0000000000A09000-memory.dmp

    Filesize

    6.0MB

  • memory/2756-53-0x0000000000400000-0x0000000000A09000-memory.dmp

    Filesize

    6.0MB

  • memory/2756-29-0x0000000077980000-0x0000000077982000-memory.dmp

    Filesize

    8KB

  • memory/2756-66-0x0000000000400000-0x0000000000A09000-memory.dmp

    Filesize

    6.0MB

  • memory/2756-69-0x0000000000400000-0x0000000000A09000-memory.dmp

    Filesize

    6.0MB

  • memory/2756-36-0x0000000000400000-0x0000000000A09000-memory.dmp

    Filesize

    6.0MB

  • memory/2756-71-0x0000000000400000-0x0000000000A09000-memory.dmp

    Filesize

    6.0MB

  • memory/2756-80-0x0000000000400000-0x0000000000A09000-memory.dmp

    Filesize

    6.0MB

  • memory/2756-82-0x0000000000400000-0x0000000000A09000-memory.dmp

    Filesize

    6.0MB

  • memory/2756-83-0x0000000000400000-0x0000000000A09000-memory.dmp

    Filesize

    6.0MB

  • memory/2756-126-0x0000000000400000-0x0000000000A09000-memory.dmp

    Filesize

    6.0MB

  • memory/2756-124-0x0000000000400000-0x0000000000A09000-memory.dmp

    Filesize

    6.0MB

  • memory/2756-125-0x0000000000400000-0x0000000000A09000-memory.dmp

    Filesize

    6.0MB

  • memory/2804-16-0x0000000000230000-0x0000000000231000-memory.dmp

    Filesize

    4KB

  • memory/2804-35-0x0000000000230000-0x0000000000231000-memory.dmp

    Filesize

    4KB