General

  • Target

    a65e24c98e44f7450eb3ae136485a988_JaffaCakes118

  • Size

    806KB

  • Sample

    241127-g38f4s1pgx

  • MD5

    a65e24c98e44f7450eb3ae136485a988

  • SHA1

    8ea188043dba6646e78917c8cbc91088ac6ea71a

  • SHA256

    aa21e278cfe50b94220a21c2dd7b8d3a243d47dfdb8d01492cc97bcbbe48d2c4

  • SHA512

    52135e70319c4e75b2da13ada324eeba1de67cf6f39d36f50f629a963172f408b31299f9e6da856f8026f14a75dcc42032d88949d83b565ef5fdfd35d6df2e82

  • SSDEEP

    12288:53TdtLW5WIj1YSSdFxsBSXyMzBUWb9lx/9AgHLo8OW+rB:RDsj1dEcBcJ9nPx/igrp+

Malware Config

Targets

    • Target

      a65e24c98e44f7450eb3ae136485a988_JaffaCakes118

    • Size

      806KB

    • MD5

      a65e24c98e44f7450eb3ae136485a988

    • SHA1

      8ea188043dba6646e78917c8cbc91088ac6ea71a

    • SHA256

      aa21e278cfe50b94220a21c2dd7b8d3a243d47dfdb8d01492cc97bcbbe48d2c4

    • SHA512

      52135e70319c4e75b2da13ada324eeba1de67cf6f39d36f50f629a963172f408b31299f9e6da856f8026f14a75dcc42032d88949d83b565ef5fdfd35d6df2e82

    • SSDEEP

      12288:53TdtLW5WIj1YSSdFxsBSXyMzBUWb9lx/9AgHLo8OW+rB:RDsj1dEcBcJ9nPx/igrp+

    • Ardamax

      A keylogger first seen in 2013.

    • Ardamax family

    • Ardamax main executable

    • Modifies WinLogon for persistence

    • Disables RegEdit via registry modification

    • Disables Task Manager via registry modification

    • ASPack v2.12-2.42

      Detects executables packed with ASPack v2.12-2.42

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • AutoIT Executable

      AutoIT scripts compiled to PE executables.

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks