Analysis

  • max time kernel
    149s
  • max time network
    152s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    02-11-2024 15:21

General

  • Target

    86258ec2b0f4deed7884bafb13fc14ff_JaffaCakes118.exe

  • Size

    1.1MB

  • MD5

    86258ec2b0f4deed7884bafb13fc14ff

  • SHA1

    f6d38d10e26435bf8b9ad4c85264f8eac2e3747c

  • SHA256

    662430432d7d3b5dbbe4617e35a62f1c5d936a503a9fb40f6813acab471c2f19

  • SHA512

    253ed313ca4a8f3fd90bca1707a660b70ec5a9071aa13bbce833a54dcf19586e919812b6e0996b5881c8882ea5b8e31c24c9ad560ba2c617636561f6f028e2a4

  • SSDEEP

    24576:LesT4eB1GjMWN7jMWNpIAUl2W8QLL3/3poVA7geYdBp0Ky1Qb8PqmbR:L3T4eBQjMWN7jMWNBq/L3hJsp0Ky1Qb+

Malware Config

Signatures

  • Ardamax

    A keylogger first seen in 2013.

  • Ardamax family
  • Ardamax main executable 1 IoCs
  • Checks computer location settings 2 TTPs 2 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Indicator Removal: File Deletion 1 TTPs

    Adversaries may delete files left behind by the actions of their intrusion activity.

  • Drops file in System32 directory 5 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies Internet Explorer settings 1 TTPs 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of SetWindowsHookEx 3 IoCs
  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\86258ec2b0f4deed7884bafb13fc14ff_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\86258ec2b0f4deed7884bafb13fc14ff_JaffaCakes118.exe"
    1⤵
    • Checks computer location settings
    • Drops file in System32 directory
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:1188
    • C:\Windows\SysWOW64\TJDVPB\KXL.exe
      "C:\Windows\system32\TJDVPB\KXL.exe"
      2⤵
      • Checks computer location settings
      • Executes dropped EXE
      • Loads dropped DLL
      • Adds Run key to start application
      • Drops file in System32 directory
      • System Location Discovery: System Language Discovery
      • Modifies Internet Explorer settings
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:968
      • C:\Windows\SysWOW64\cmd.exe
        "C:\Windows\system32\cmd.exe" /c del C:\Windows\SysWOW64\TJDVPB\KXL.exe > nul
        3⤵
        • System Location Discovery: System Language Discovery
        PID:4512

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Windows\SysWOW64\TJDVPB\KXL.001

    Filesize

    60KB

    MD5

    4d27afcd3bc55a673ac837b0843ae3a6

    SHA1

    84ba0f52ca5dce772e72eefc91db9dbf92ea3af9

    SHA256

    bd16730cf1ad55455d3e01528db4112250d304bbe51f726eb7b9548b08abb6cd

    SHA512

    b032514230a06b6c56f21511c397e1c15e150cad34e7dd9521d1e937f2ad4246deb64f5a62fe1a13baa472730f81c86cc49db629c763a7d831995a6f872d718f

  • C:\Windows\SysWOW64\TJDVPB\KXL.002

    Filesize

    42KB

    MD5

    e79dd15e468db97575743ccc5d3ff8d2

    SHA1

    bf39037ad7e0c8834c9d71fb6461e217dda3d58e

    SHA256

    6ca86deb3f23decc00de2e3aee0544164e7de527781c714591377a9428c7257e

    SHA512

    1fe7e2ce5ba62dbe04e2ee5da5aa874506066711f270e624ff471b68e7c44ec16fb0751e074d15488a9680ee03350f0ac1e58626d44400727b62ed77427a80a8

  • C:\Windows\SysWOW64\TJDVPB\KXL.004

    Filesize

    608B

    MD5

    c9b0c01fce3d66c53763d368ef7374e0

    SHA1

    3916c47d06952ae27ef81d7dafd140271186ae3c

    SHA256

    44e20b5eab8e2f5386ec82717f58a042c5cdfb16a5d9ceab1bc488373fb9badd

    SHA512

    618d6f4999f03d64cccb875b048f2dba28882beb2d1cebe18ca2dd38de5e2fe196ed70e95496bf7a195deddfa370530568a5e24f4722744d6d84833acb6b0f46

  • C:\Windows\SysWOW64\TJDVPB\KXL.exe

    Filesize

    1.4MB

    MD5

    3e0f8d178e37f27c9a7bebd425a71822

    SHA1

    0dab0ca8e4d7741f4a53901b906566a06f83b33f

    SHA256

    187df1cefc9dbc3a7d6febdc4ad03cac8e15fcae8078605d632771606c5d7c3b

    SHA512

    684b7418c603008f0247023b57156cc83eecd3cb0a094a55bd12ca33bbb622c12f09539c2be0a2be4716c5b33b1859901251cce3ea81092549290b705afec023

  • memory/968-14-0x0000000000640000-0x0000000000641000-memory.dmp

    Filesize

    4KB

  • memory/968-16-0x0000000000640000-0x0000000000641000-memory.dmp

    Filesize

    4KB