Analysis

  • max time kernel
    140s
  • max time network
    120s
  • platform
    windows7_x64
  • resource
    win7-20240708-en
  • resource tags

    arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system
  • submitted
    07/12/2024, 00:30

General

  • Target

    cfccfbe9ab6445941858985f799b3394_JaffaCakes118.exe

  • Size

    498KB

  • MD5

    cfccfbe9ab6445941858985f799b3394

  • SHA1

    14ccd9f95a53370c8b63740b81490d3edf6c3948

  • SHA256

    810e9b511db1b633000325ef4cc4d53e8f206b2fd10aab9d7a0c94d9fc5b6b74

  • SHA512

    06f13b54fd1900cc82c5fc0dba692fa29c0127ed4a5aede3c7a437e1cbc603eb9a8ce7dab1d9cf2391a2c4a823f98165aa36b187f25385f8ee0b6a3d5a58c4ea

  • SSDEEP

    12288:Hm9tXxVmqzFDsxT3wxaHWBlzjqK/9g+FZkoUMFb4qevW1+EaoqYVr:0loTgzFVg+FnX9jevW1+Eaov9

Malware Config

Signatures

  • Ardamax

    A keylogger first seen in 2013.

  • Ardamax family
  • Ardamax main executable 1 IoCs
  • Modifies firewall policy service 3 TTPs 2 IoCs
  • Detected Nirsoft tools 7 IoCs

    Free utilities often used by attackers which can steal passwords, product keys, etc.

  • NirSoft MailPassView 2 IoCs

    Password recovery tool for various email clients

  • Executes dropped EXE 8 IoCs
  • Loads dropped DLL 13 IoCs
  • Reads user/profile data of web browsers 3 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Accesses Microsoft Outlook accounts 1 TTPs 1 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • UPX packed file 9 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Windows directory 4 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 8 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of AdjustPrivilegeToken 4 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 32 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\cfccfbe9ab6445941858985f799b3394_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\cfccfbe9ab6445941858985f799b3394_JaffaCakes118.exe"
    1⤵
    • Loads dropped DLL
    • Drops file in Windows directory
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:2180
    • C:\Windows\system32XDMB.exe
      "C:\Windows\system32XDMB.exe"
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • System Location Discovery: System Language Discovery
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of SetWindowsHookEx
      PID:2404
    • C:\Users\Admin\AppData\Local\Temp\Cod4Bot.exe
      "C:\Users\Admin\AppData\Local\Temp\Cod4Bot.exe"
      2⤵
      • Modifies firewall policy service
      • Executes dropped EXE
      • Loads dropped DLL
      • System Location Discovery: System Language Discovery
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:2072
      • C:\Users\Admin\AppData\Local\Temp\pspv.exe
        "C:\Users\Admin\AppData\Local\Temp\pspv.exe" /shtml "C:\Users\Admin\AppData\Local\Temp\Protected Storage Passwords.htm""
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        PID:2900
      • C:\Users\Admin\AppData\Local\Temp\mailpv.exe
        "C:\Users\Admin\AppData\Local\Temp\mailpv.exe" /shtml "C:\Users\Admin\AppData\Local\Temp\Mail Passwords.htm""
        3⤵
        • Executes dropped EXE
        • Accesses Microsoft Outlook accounts
        • System Location Discovery: System Language Discovery
        PID:2688
      • C:\Users\Admin\AppData\Local\Temp\mspass.exe
        "C:\Users\Admin\AppData\Local\Temp\mspass.exe" /shtml "C:\Users\Admin\AppData\Local\Temp\Messengers Passwords.htm""
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious use of AdjustPrivilegeToken
        PID:800
      • C:\Users\Admin\AppData\Local\Temp\dialupass2.exe
        "C:\Users\Admin\AppData\Local\Temp\dialupass2.exe" /shtml "C:\Users\Admin\AppData\Local\Temp\DialUp Passwords.htm""
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        PID:2700
      • C:\Users\Admin\AppData\Local\Temp\netpass.exe
        "C:\Users\Admin\AppData\Local\Temp\netpass.exe" /shtml "C:\Users\Admin\AppData\Local\Temp\Network Passwords.htm""
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious use of AdjustPrivilegeToken
        PID:2680
      • C:\Users\Admin\AppData\Local\Temp\FF.exe
        C:\Users\Admin\AppData\Local\Temp\FF.exe "C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\bz1ih2a5.default-release"
        3⤵
        • Executes dropped EXE
        PID:1896

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\Cod4Bot.exe

    Filesize

    388KB

    MD5

    b15b2b263ef15f5e78c02cf35c575576

    SHA1

    9fc4f74b102fafc0ce082f17a02b5eddaea60922

    SHA256

    94aac2eca506edf021e28db99fbe4198b254501b050419bb526354327dc73cad

    SHA512

    403e6771a60038d14fd1c5265f9b1df4ce1f247d5ff89f17be3ef46fe9b2c21a1c94e3e48c20f4522776f8bef966c6a9800fc2249ac9b71ba8968104f7233f56

  • C:\Users\Admin\AppData\Local\Temp\DialUp Passwords.htm

    Filesize

    460B

    MD5

    8a83f57d4efce4941647c65f50402368

    SHA1

    d5d0e9c550adf30427f13f02a5d71b5e324185db

    SHA256

    58cdc619d8718e92c4ce6f2871bac0908d6e0abde1bdee6f01145605add5868d

    SHA512

    39e0d81d127c9de4e298de7087974c91ae9d959ecfe2cc04c59354986473153ce2416d9436023f7071e3e2cdaefdc81315495b0c7224cc2e7782813d37cd5cf4

  • C:\Users\Admin\AppData\Local\Temp\DialUp Passwords.htm

    Filesize

    462B

    MD5

    fdd01f6d5ec3537bfbcab43b324585f8

    SHA1

    8b823c8c5aaf09d4a2ac5279361521e5c654087d

    SHA256

    de8fcd3c1fd421ba39962ad8f4547e9d6da55e120f9634f35db37e3af379f190

    SHA512

    639e2d81f696a0bcf865d0041906915fc33039e183691c9e7bce9c1f096f9b3842d413513f28083ee8cc5748c7d7805f67715589ec0366a53c2886ce89949395

  • C:\Users\Admin\AppData\Local\Temp\Mail Passwords.htm

    Filesize

    336B

    MD5

    25fb4c842c7e30f6ad092986b30b103a

    SHA1

    cc655df179645e51102b3d8bde8a46bcd2135c67

    SHA256

    f461c35280314981fae8fab1eed0a44571b7597f8a13804b767e7688a2ef2c32

    SHA512

    02bc56f2038742be15176d9c3e47aa1e0391444d029de8ae518c3c7235eaee14eb4f7ccac3d4bb521e043806226aa90d91936c8ac4a7b2d60db99d20b3213e32

  • C:\Users\Admin\AppData\Local\Temp\Messengers Passwords.htm

    Filesize

    317B

    MD5

    33f76e1392fb33e7b971f2abdd92253f

    SHA1

    6a1af8d3db013b3e99fed379aa8c8edf61243548

    SHA256

    0bb24b498f828782dbcd8abe7ec1bd53ba0c9b62218f326d3d8af9a73bdd9ec7

    SHA512

    02bfecef09b6ae4c803ef7183f0865aaa169f709b7afd02382ce41934fdc7881939212df2aa1466c45cafb60f962606d25662b16509e25d81756ae3db61a5674

  • C:\Users\Admin\AppData\Local\Temp\Network Passwords.htm

    Filesize

    636B

    MD5

    ea2e05e5648f4b027cd9db313612bb4a

    SHA1

    b6aa304b9f4d99dfc7230e8f64b6cc558e15f166

    SHA256

    5f2526aef4823ecb0a3c246f5b5d3dfda365bc3282f4e5edff4872c05a174376

    SHA512

    c44fb78a12a0ae092b48f86e624aa714667d085f9a4ffa084eb237d8975f517aa68f824051b3eb13b67f346f0246f4f2a37c391bcd5fed50e4477d820dae15e8

  • C:\Users\Admin\AppData\Local\Temp\Protected Storage Passwords.htm

    Filesize

    327B

    MD5

    3ad04fdbe1e605527f6bd2f1cf584557

    SHA1

    46d1d2c15d1ec4351c6298dd9ead633b435df3ec

    SHA256

    0e16624dd8b2ae6f391fb36dd65f6c674f748bc4cfb4c8d684a66819ed50c240

    SHA512

    891b33482e5f4c71759680b64080a39ed90f20d13c153cc7d32edfa0f1a0670cac3904a7dfb1cdfa27ce5b84715208fecedc4ff485250f39140e975d23d1a96a

  • C:\Windows\system32XDMB.001

    Filesize

    404B

    MD5

    2f06d7370e0c512f891c19a2974c8521

    SHA1

    ac9ce73fcec8e58426fe5c3194ec025772e95b9c

    SHA256

    f3ce4bb0022a82ae742edecce267d7501d58c8333f402f4e72bb55be64697d3e

    SHA512

    c9946b3158ef35b43317e5a0652199364e777af51f07a9dec1f82ff605fb624f0c982a573788ac5533caf45f21702774af49f6a791e3757691c60abb3a48c3d8

  • C:\Windows\system32XDMB.006

    Filesize

    7KB

    MD5

    32dd7b4bc8b6f290b0ece3cc1c011c96

    SHA1

    b979683868b399c6a6204ebaed9fc9c784a0429a

    SHA256

    6dcce9bbba5c2de47eea3abf7597a9c4fb2e4d358efc3752fa65c169cccfa2a1

    SHA512

    9e0d720799fe816f7d09c8a722b762203b6f12a8625c1c93cd640219ecc35969bd641b4d9e6dc04ab6f95ceb73235a438eb7d48ee9402118db3618b5760551ea

  • C:\Windows\system32XDMB.007

    Filesize

    5KB

    MD5

    e8155b68775ed29590e14df80fdc0e9f

    SHA1

    ed449da02e648a524004c265f3c37496d2f07f1f

    SHA256

    b39ba894b0a9a3201461ddd9ee9b297928e793dff221a47f019e75c11df631f3

    SHA512

    b14e00c46cf9bed0aca0f85775f624ff064f2d2afe1fa68b61bee5729db73cf9a8eced669c52d7cbb9504ff1b369a9a16a0f36c71a70c13c0bd1eaf5e07ccc11

  • C:\Windows\system32XDMB.exe

    Filesize

    471KB

    MD5

    3c06bbc025b61d2182ef5573f2852bda

    SHA1

    ebc1464c00b13fb5b3f80a59c80b595020e1fe7c

    SHA256

    e7f64e7215284cdeb8ef1eba28733f7aeae7f6977f82809d8de1e76a2e249085

    SHA512

    9d839ada211b85fc1efb1fe7bb3ce66fcf0e8069221d958234649c2ac5dc0f1bd06f1a016f9c727077af36fb46cac5409be9c8a8201d17f689c6b473aa01acdc

  • \Users\Admin\AppData\Local\Temp\@8E1C.tmp

    Filesize

    4KB

    MD5

    d9e02f226fc338d14df200ba9a700625

    SHA1

    414f134a16a309b31e418ed9e08c0c48aaf6e2bc

    SHA256

    8165757efb79acceb9fd0bfae6b2c19b8f087cc0461abb17941d460dbdf2e260

    SHA512

    13c73381602fe2593312d41ab4bc5cd5f922ac651f9e71e3fe3c58e7f0c5c73ecc9d79d61ec46f33a0a81cf73373421eeb510bd99650c0f53af30974ed61b8ca

  • \Users\Admin\AppData\Local\Temp\FF.exe

    Filesize

    40KB

    MD5

    7701a23d89ceb84b58eb3e527ad08af9

    SHA1

    9544c9dde88d4f2ec6d94408c68d411d35e17de3

    SHA256

    1b333043fad01bc85a8d91d840eca642a414c8757222ba3ff9a9a6a4a07f5ef0

    SHA512

    61997d04c40bb07160630bd8226c3822017e99d4f897d443b961c5848c0403cab0d27c23a463de722879ee1ca5cb48e8419284b2b5606312c3a8a6e65ff25bac

  • \Users\Admin\AppData\Local\Temp\dialupass2.exe

    Filesize

    75KB

    MD5

    d4292602e6d519e75ca60db02cbe0a43

    SHA1

    8cf54e9e5e3c7b904c8c796a9e2de38b988e747a

    SHA256

    fc1bc82ad3fb64775ce9abd481f58efd58c7b0a8e017efe6b52067c578919a51

    SHA512

    c4801bb034a8a8794546c73cbfebce220a2486675abd3e825f36665deaf28e4213aa1932778e27492949e1c68e4b61f6f9d4efcaaa58e7d62c3c728f277e7922

  • \Users\Admin\AppData\Local\Temp\mailpv.exe

    Filesize

    46KB

    MD5

    6f2c09baafc0d31f1ce0994f8f2d5048

    SHA1

    84573202cf87bbc995bb43be4b5cb41434aab059

    SHA256

    3098abdb835e9b266dad36173c20572edc44cd21501607622eb548787b3d54f5

    SHA512

    74bc6ab413d493d5210f7e7980bf2a020c3fed2fd2bafdb6563d041840550410db68bdf267576cacc5bc677f490f8d9189148ea87301777b56a9dd4ef1d749ae

  • \Users\Admin\AppData\Local\Temp\mspass.exe

    Filesize

    58KB

    MD5

    7cfb71efaa32f1fb654517aa1f4812f2

    SHA1

    b603236f708f15ac037ab2ddaf794c643482a873

    SHA256

    c2af90d91be1fee339be6e1fd60ce293e72cf6231b25dc29b67648fc3d046322

    SHA512

    5a6c1be82cc5f1f4de519bbfb7dc24adaa60493a8e8310be74803c3f0d98451345e6fbe8fdaa3da480c687d53dcf2b01d54ce96a2c519f3539e4be9465cdd636

  • \Users\Admin\AppData\Local\Temp\netpass.exe

    Filesize

    37KB

    MD5

    22f0f0aa39ff8dbcd3973c58ce7cc2c6

    SHA1

    f0ad2f34164702711fd73bdb6c2d870e0c8ab9f8

    SHA256

    aeecd4e8fc92ae0aa8d915d775aa872a7c4487420aabed7b6e27a762572eae92

    SHA512

    9387da7e7aa9ecb41bc096edd70fbaca8b398de318f98972dee2765d311502b687f2c364ff0ae20a2e60d568bdaf7bacb34e73b6dec0a9edf97b2a6366c478b0

  • \Users\Admin\AppData\Local\Temp\pspv.exe

    Filesize

    51KB

    MD5

    35861f4ea9a8ecb6c357bdb91b7df804

    SHA1

    836cb49c8d08d5e305ab8976f653b97f1edba245

    SHA256

    64788b6f74875aed53ca80669b06f407e132d7be49586925dbb3dcde56cbca9c

    SHA512

    0fdfe62c86c8601bb98991149eea51ddf91b812ad2c2d45e53aaf1f36a09d00aaf02fc3d183179cf5367fda09d6f62d36c0187da2dfa5e08df4c07cf634690be

  • memory/800-83-0x0000000000400000-0x0000000000423000-memory.dmp

    Filesize

    140KB

  • memory/2072-78-0x0000000003F70000-0x0000000003F93000-memory.dmp

    Filesize

    140KB

  • memory/2072-77-0x0000000003F70000-0x0000000003F93000-memory.dmp

    Filesize

    140KB

  • memory/2072-125-0x0000000010000000-0x0000000010006000-memory.dmp

    Filesize

    24KB

  • memory/2072-60-0x0000000000810000-0x000000000082D000-memory.dmp

    Filesize

    116KB

  • memory/2072-126-0x0000000000240000-0x0000000000246000-memory.dmp

    Filesize

    24KB

  • memory/2072-55-0x0000000000810000-0x000000000082D000-memory.dmp

    Filesize

    116KB

  • memory/2072-104-0x0000000000810000-0x0000000000829000-memory.dmp

    Filesize

    100KB

  • memory/2072-31-0x000000007751F000-0x0000000077520000-memory.dmp

    Filesize

    4KB

  • memory/2404-37-0x00000000001E0000-0x00000000001E1000-memory.dmp

    Filesize

    4KB

  • memory/2404-26-0x00000000001E0000-0x00000000001E1000-memory.dmp

    Filesize

    4KB

  • memory/2404-128-0x0000000000550000-0x0000000000556000-memory.dmp

    Filesize

    24KB

  • memory/2404-127-0x0000000010000000-0x0000000010006000-memory.dmp

    Filesize

    24KB

  • memory/2680-107-0x0000000000400000-0x0000000000419000-memory.dmp

    Filesize

    100KB

  • memory/2680-110-0x0000000000400000-0x0000000000419000-memory.dmp

    Filesize

    100KB

  • memory/2688-62-0x0000000000400000-0x000000000041D000-memory.dmp

    Filesize

    116KB

  • memory/2688-67-0x0000000000400000-0x000000000041D000-memory.dmp

    Filesize

    116KB

  • memory/2700-98-0x0000000010000000-0x0000000010006000-memory.dmp

    Filesize

    24KB

  • memory/2700-99-0x0000000000230000-0x0000000000236000-memory.dmp

    Filesize

    24KB