Analysis

  • max time kernel
    120s
  • max time network
    135s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    28-11-2024 04:13

General

  • Target

    aaf11c607e397a85d59396aa21777722_JaffaCakes118.exe

  • Size

    1.3MB

  • MD5

    aaf11c607e397a85d59396aa21777722

  • SHA1

    a3fdec1003e1df0dd291385cd9a9a1b0ba8d89d2

  • SHA256

    47a28d14f1f0b01e2a230e9f675c4ff12485d455ded2ba67cf439b07bda0587a

  • SHA512

    0dbdca04543e491c0197a988389b35f134a7c20630680c546bceb879b1812de0c204d8a899d9eb85f84c5d405391a9e3fa19ff8c0f6d35b2956704ae2eda5c5e

  • SSDEEP

    24576:N7tBhSAl0ziX6Pfhym1l7tLyt5kmmxtBhEqcKh1PZ6ShSe4A0WSAqx/0E:zBhEziX6Pp51NckmmxbhEqcOcShAbWSW

Malware Config

Signatures

  • Ardamax

    A keylogger first seen in 2013.

  • Ardamax family
  • Ardamax main executable 1 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 2 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Drops file in System32 directory 5 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of SetWindowsHookEx 5 IoCs
  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\aaf11c607e397a85d59396aa21777722_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\aaf11c607e397a85d59396aa21777722_JaffaCakes118.exe"
    1⤵
    • Checks computer location settings
    • Drops file in System32 directory
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:2176
    • C:\Windows\SysWOW64\NNBWPN\UMI.exe
      "C:\Windows\system32\NNBWPN\UMI.exe"
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Adds Run key to start application
      • Drops file in System32 directory
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of SetWindowsHookEx
      PID:3608
    • C:\Users\Admin\AppData\Local\Temp\Brutt_black.exe
      "C:\Users\Admin\AppData\Local\Temp\Brutt_black.exe"
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • System Location Discovery: System Language Discovery
      • Suspicious use of SetWindowsHookEx
      PID:3760

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\ProgramData\jI82l\PCGWIN32.LI5

    Filesize

    2KB

    MD5

    daf4a95c180217d73389d60fdb7f4269

    SHA1

    f06d00c95f6157eefc77fa8ebe506c3ee07bf551

    SHA256

    f210ff731a4be3ca6ad94aca301f1f0ed758e1e7d1ce4e279abd323788079aaa

    SHA512

    70a021464fd04d12ef304f8d107886bc5978210b3312cae79502e96344ac976ac71a1f8697ea3aa86836436b7f8beedd7897bc7bb808fdc9c7a2bfbc92da04db

  • C:\Users\Admin\AppData\Local\Temp\Brutt_black.exe

    Filesize

    288KB

    MD5

    c4441008b01e5767f4725e4e5e017827

    SHA1

    cd52d966bbdca8f6c3149e6789a3ac1df361613a

    SHA256

    7172e0ab039aecb4f7b1b1a09b4c9a04f455a9155d4251a5df2f849161bd3f15

    SHA512

    44b55aa2719d3b8bbcbf8ee74a76058424d44d16ac87b0869b73b1677b98dbb5dd8f36421069b0b05796a34415230d91099537780f3d73f307bf770b82c8520d

  • C:\Windows\SysWOW64\NNBWPN\UMI.001

    Filesize

    61KB

    MD5

    d373bbf76430957bcd2e57b0c9282478

    SHA1

    060e94a44aae965fc871ef99ef72e2903c18a812

    SHA256

    6b417853ea93c6b973d0fb5d12cce6136dcf57b97c8566087c6d8b2b22b499e6

    SHA512

    dc6a7d2e28d169b1c3ed5d8004bb25e4f6ba0cf71f69b8d74204d531f17d3f16b838df0bc699a9c4f4addf979676fffe0fc92f16035f7a5ee774593f9f24249a

  • C:\Windows\SysWOW64\NNBWPN\UMI.002

    Filesize

    44KB

    MD5

    78d9c23d5e387c983ec0f9d1cd5e7a3c

    SHA1

    3568035056154177c2f182c0fcb52b5aad99b817

    SHA256

    14099ac39320e34d4924d349da7ee737a764587f24e913a13fbe08d1f9afb82a

    SHA512

    5c0d169434ad2800cc82ef4b6ec3b25c765fdd4314988754c1eec57405cfbdde2c47632a333aacfb80563f427bdd2f567ac291865052f14d9d99f8ca042acdeb

  • C:\Windows\SysWOW64\NNBWPN\UMI.004

    Filesize

    1KB

    MD5

    a15b457e9901ed60dd6a0856be71211c

    SHA1

    72bb38c34a8b5494cbbe2b77f99848d1e6382e49

    SHA256

    df694154dcec562e89221d61bb441975ff8196f159b87339b1557f5d46d901e5

    SHA512

    9edde12eba74028d1e09f1651af5043582670fcb3c9d332542d15e9082a16569f266e032c066323d6deae23e15f2b7a8287d48cef8bb92c55b94a6f3c1726286

  • C:\Windows\SysWOW64\NNBWPN\UMI.exe

    Filesize

    1.7MB

    MD5

    0c3ef1e16d7066db155af6503190886c

    SHA1

    d606edb9f5c1a6b421eac400e545dbcb78c19353

    SHA256

    8f571c7d18ad3f2facf0662ee183a0ccd42fd1bcdb2cb544ab8bae8411acaa01

    SHA512

    6275471d26b86f2212123aafceccf4a636b29d8e0b635f0a265d0fb99ff04cc282e03d174c37f6eb8ec5c8fc82fb73ca6a97192e6049a9d36f6070969d234da3

  • memory/2176-0-0x0000000000720000-0x0000000000869000-memory.dmp

    Filesize

    1.3MB

  • memory/2176-34-0x0000000000720000-0x0000000000869000-memory.dmp

    Filesize

    1.3MB

  • memory/3608-39-0x00000000005D0000-0x00000000005D1000-memory.dmp

    Filesize

    4KB

  • memory/3608-43-0x00000000005D0000-0x00000000005D1000-memory.dmp

    Filesize

    4KB