Analysis

  • max time kernel
    148s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    07/12/2024, 00:30 UTC

General

  • Target

    cfccfbe9ab6445941858985f799b3394_JaffaCakes118.exe

  • Size

    498KB

  • MD5

    cfccfbe9ab6445941858985f799b3394

  • SHA1

    14ccd9f95a53370c8b63740b81490d3edf6c3948

  • SHA256

    810e9b511db1b633000325ef4cc4d53e8f206b2fd10aab9d7a0c94d9fc5b6b74

  • SHA512

    06f13b54fd1900cc82c5fc0dba692fa29c0127ed4a5aede3c7a437e1cbc603eb9a8ce7dab1d9cf2391a2c4a823f98165aa36b187f25385f8ee0b6a3d5a58c4ea

  • SSDEEP

    12288:Hm9tXxVmqzFDsxT3wxaHWBlzjqK/9g+FZkoUMFb4qevW1+EaoqYVr:0loTgzFVg+FnX9jevW1+Eaov9

Malware Config

Signatures

  • Ardamax

    A keylogger first seen in 2013.

  • Ardamax family
  • Ardamax main executable 1 IoCs
  • Modifies firewall policy service 3 TTPs 4 IoCs
  • Detected Nirsoft tools 6 IoCs

    Free utilities often used by attackers which can steal passwords, product keys, etc.

  • NirSoft MailPassView 2 IoCs

    Password recovery tool for various email clients

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 8 IoCs
  • Loads dropped DLL 10 IoCs
  • Reads user/profile data of web browsers 3 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Accesses Microsoft Outlook accounts 1 TTPs 1 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • UPX packed file 8 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Windows directory 4 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 9 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious use of AdjustPrivilegeToken 4 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 24 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\cfccfbe9ab6445941858985f799b3394_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\cfccfbe9ab6445941858985f799b3394_JaffaCakes118.exe"
    1⤵
    • Checks computer location settings
    • Loads dropped DLL
    • Drops file in Windows directory
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:2968
    • C:\Windows\system32XDMB.exe
      "C:\Windows\system32XDMB.exe"
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Adds Run key to start application
      • System Location Discovery: System Language Discovery
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of SetWindowsHookEx
      PID:1696
    • C:\Users\Admin\AppData\Local\Temp\Cod4Bot.exe
      "C:\Users\Admin\AppData\Local\Temp\Cod4Bot.exe"
      2⤵
      • Modifies firewall policy service
      • Executes dropped EXE
      • Loads dropped DLL
      • System Location Discovery: System Language Discovery
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:3572
      • C:\Users\Admin\AppData\Local\Temp\pspv.exe
        "C:\Users\Admin\AppData\Local\Temp\pspv.exe" /shtml "C:\Users\Admin\AppData\Local\Temp\Protected Storage Passwords.htm""
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        PID:3980
      • C:\Users\Admin\AppData\Local\Temp\mailpv.exe
        "C:\Users\Admin\AppData\Local\Temp\mailpv.exe" /shtml "C:\Users\Admin\AppData\Local\Temp\Mail Passwords.htm""
        3⤵
        • Executes dropped EXE
        • Accesses Microsoft Outlook accounts
        • System Location Discovery: System Language Discovery
        PID:3696
      • C:\Users\Admin\AppData\Local\Temp\mspass.exe
        "C:\Users\Admin\AppData\Local\Temp\mspass.exe" /shtml "C:\Users\Admin\AppData\Local\Temp\Messengers Passwords.htm""
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:892
      • C:\Users\Admin\AppData\Local\Temp\dialupass2.exe
        "C:\Users\Admin\AppData\Local\Temp\dialupass2.exe" /shtml "C:\Users\Admin\AppData\Local\Temp\DialUp Passwords.htm""
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • System Location Discovery: System Language Discovery
        PID:1348
      • C:\Users\Admin\AppData\Local\Temp\netpass.exe
        "C:\Users\Admin\AppData\Local\Temp\netpass.exe" /shtml "C:\Users\Admin\AppData\Local\Temp\Network Passwords.htm""
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:2452
      • C:\Users\Admin\AppData\Local\Temp\FF.exe
        C:\Users\Admin\AppData\Local\Temp\FF.exe "C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\y0bypz8z.default-release"
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        PID:3868

Network

  • flag-us
    DNS
    209.205.72.20.in-addr.arpa
    Remote address:
    8.8.8.8:53
    Request
    209.205.72.20.in-addr.arpa
    IN PTR
    Response
  • flag-us
    DNS
    globaniom.redirectme.net
    Cod4Bot.exe
    Remote address:
    8.8.8.8:53
    Request
    globaniom.redirectme.net
    IN A
    Response
  • flag-us
    DNS
    95.221.229.192.in-addr.arpa
    Remote address:
    8.8.8.8:53
    Request
    95.221.229.192.in-addr.arpa
    IN PTR
    Response
  • flag-us
    DNS
    228.249.119.40.in-addr.arpa
    Remote address:
    8.8.8.8:53
    Request
    228.249.119.40.in-addr.arpa
    IN PTR
    Response
  • flag-us
    DNS
    13.86.106.20.in-addr.arpa
    Remote address:
    8.8.8.8:53
    Request
    13.86.106.20.in-addr.arpa
    IN PTR
    Response
  • flag-us
    DNS
    56.163.245.4.in-addr.arpa
    Remote address:
    8.8.8.8:53
    Request
    56.163.245.4.in-addr.arpa
    IN PTR
    Response
  • flag-us
    DNS
    18.31.95.13.in-addr.arpa
    Remote address:
    8.8.8.8:53
    Request
    18.31.95.13.in-addr.arpa
    IN PTR
    Response
  • flag-us
    DNS
    195.22.101.95.in-addr.arpa
    Remote address:
    8.8.8.8:53
    Request
    195.22.101.95.in-addr.arpa
    IN PTR
    Response
    195.22.101.95.in-addr.arpa
    IN PTR
    a95-101-22-195deploystaticakamaitechnologiescom
  • flag-us
    DNS
    85.49.80.91.in-addr.arpa
    Remote address:
    8.8.8.8:53
    Request
    85.49.80.91.in-addr.arpa
    IN PTR
    Response
No results found
  • 8.8.8.8:53
    209.205.72.20.in-addr.arpa
    dns
    72 B
    158 B
    1
    1

    DNS Request

    209.205.72.20.in-addr.arpa

  • 8.8.8.8:53
    globaniom.redirectme.net
    dns
    Cod4Bot.exe
    70 B
    130 B
    1
    1

    DNS Request

    globaniom.redirectme.net

  • 8.8.8.8:53
    95.221.229.192.in-addr.arpa
    dns
    73 B
    144 B
    1
    1

    DNS Request

    95.221.229.192.in-addr.arpa

  • 8.8.8.8:53
    228.249.119.40.in-addr.arpa
    dns
    73 B
    159 B
    1
    1

    DNS Request

    228.249.119.40.in-addr.arpa

  • 8.8.8.8:53
    13.86.106.20.in-addr.arpa
    dns
    71 B
    157 B
    1
    1

    DNS Request

    13.86.106.20.in-addr.arpa

  • 8.8.8.8:53
    56.163.245.4.in-addr.arpa
    dns
    71 B
    157 B
    1
    1

    DNS Request

    56.163.245.4.in-addr.arpa

  • 8.8.8.8:53
    18.31.95.13.in-addr.arpa
    dns
    70 B
    144 B
    1
    1

    DNS Request

    18.31.95.13.in-addr.arpa

  • 8.8.8.8:53
    195.22.101.95.in-addr.arpa
    dns
    72 B
    137 B
    1
    1

    DNS Request

    195.22.101.95.in-addr.arpa

  • 8.8.8.8:53
    85.49.80.91.in-addr.arpa
    dns
    70 B
    145 B
    1
    1

    DNS Request

    85.49.80.91.in-addr.arpa

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\@7DDB.tmp

    Filesize

    4KB

    MD5

    d9e02f226fc338d14df200ba9a700625

    SHA1

    414f134a16a309b31e418ed9e08c0c48aaf6e2bc

    SHA256

    8165757efb79acceb9fd0bfae6b2c19b8f087cc0461abb17941d460dbdf2e260

    SHA512

    13c73381602fe2593312d41ab4bc5cd5f922ac651f9e71e3fe3c58e7f0c5c73ecc9d79d61ec46f33a0a81cf73373421eeb510bd99650c0f53af30974ed61b8ca

  • C:\Users\Admin\AppData\Local\Temp\Cod4Bot.exe

    Filesize

    388KB

    MD5

    b15b2b263ef15f5e78c02cf35c575576

    SHA1

    9fc4f74b102fafc0ce082f17a02b5eddaea60922

    SHA256

    94aac2eca506edf021e28db99fbe4198b254501b050419bb526354327dc73cad

    SHA512

    403e6771a60038d14fd1c5265f9b1df4ce1f247d5ff89f17be3ef46fe9b2c21a1c94e3e48c20f4522776f8bef966c6a9800fc2249ac9b71ba8968104f7233f56

  • C:\Users\Admin\AppData\Local\Temp\DialUp Passwords.htm

    Filesize

    462B

    MD5

    fdd01f6d5ec3537bfbcab43b324585f8

    SHA1

    8b823c8c5aaf09d4a2ac5279361521e5c654087d

    SHA256

    de8fcd3c1fd421ba39962ad8f4547e9d6da55e120f9634f35db37e3af379f190

    SHA512

    639e2d81f696a0bcf865d0041906915fc33039e183691c9e7bce9c1f096f9b3842d413513f28083ee8cc5748c7d7805f67715589ec0366a53c2886ce89949395

  • C:\Users\Admin\AppData\Local\Temp\FF.exe

    Filesize

    40KB

    MD5

    7701a23d89ceb84b58eb3e527ad08af9

    SHA1

    9544c9dde88d4f2ec6d94408c68d411d35e17de3

    SHA256

    1b333043fad01bc85a8d91d840eca642a414c8757222ba3ff9a9a6a4a07f5ef0

    SHA512

    61997d04c40bb07160630bd8226c3822017e99d4f897d443b961c5848c0403cab0d27c23a463de722879ee1ca5cb48e8419284b2b5606312c3a8a6e65ff25bac

  • C:\Users\Admin\AppData\Local\Temp\Mail Passwords.htm

    Filesize

    336B

    MD5

    25fb4c842c7e30f6ad092986b30b103a

    SHA1

    cc655df179645e51102b3d8bde8a46bcd2135c67

    SHA256

    f461c35280314981fae8fab1eed0a44571b7597f8a13804b767e7688a2ef2c32

    SHA512

    02bc56f2038742be15176d9c3e47aa1e0391444d029de8ae518c3c7235eaee14eb4f7ccac3d4bb521e043806226aa90d91936c8ac4a7b2d60db99d20b3213e32

  • C:\Users\Admin\AppData\Local\Temp\Messengers Passwords.htm

    Filesize

    317B

    MD5

    33f76e1392fb33e7b971f2abdd92253f

    SHA1

    6a1af8d3db013b3e99fed379aa8c8edf61243548

    SHA256

    0bb24b498f828782dbcd8abe7ec1bd53ba0c9b62218f326d3d8af9a73bdd9ec7

    SHA512

    02bfecef09b6ae4c803ef7183f0865aaa169f709b7afd02382ce41934fdc7881939212df2aa1466c45cafb60f962606d25662b16509e25d81756ae3db61a5674

  • C:\Users\Admin\AppData\Local\Temp\Network Passwords.htm

    Filesize

    636B

    MD5

    d7237ce4faa3da0ecadebd0631a37090

    SHA1

    bac8b5dde291d7b1e018dd5e623cc3caf7991ee2

    SHA256

    935b7d73e4777244016a9e0da4e39ba8d909d356dea6a902eaf4aec720576df5

    SHA512

    2486622203e1a1797216b0777ba5c21cbe4a8e3c5dbb70b8fc91bec68742bd860d1780c2533eddb8501d9e7b5e646e366d87c1f755d6612c812ade29626c1786

  • C:\Users\Admin\AppData\Local\Temp\Protected Storage Passwords.htm

    Filesize

    327B

    MD5

    3ad04fdbe1e605527f6bd2f1cf584557

    SHA1

    46d1d2c15d1ec4351c6298dd9ead633b435df3ec

    SHA256

    0e16624dd8b2ae6f391fb36dd65f6c674f748bc4cfb4c8d684a66819ed50c240

    SHA512

    891b33482e5f4c71759680b64080a39ed90f20d13c153cc7d32edfa0f1a0670cac3904a7dfb1cdfa27ce5b84715208fecedc4ff485250f39140e975d23d1a96a

  • C:\Users\Admin\AppData\Local\Temp\dialupass2.exe

    Filesize

    75KB

    MD5

    d4292602e6d519e75ca60db02cbe0a43

    SHA1

    8cf54e9e5e3c7b904c8c796a9e2de38b988e747a

    SHA256

    fc1bc82ad3fb64775ce9abd481f58efd58c7b0a8e017efe6b52067c578919a51

    SHA512

    c4801bb034a8a8794546c73cbfebce220a2486675abd3e825f36665deaf28e4213aa1932778e27492949e1c68e4b61f6f9d4efcaaa58e7d62c3c728f277e7922

  • C:\Users\Admin\AppData\Local\Temp\mailpv.exe

    Filesize

    46KB

    MD5

    6f2c09baafc0d31f1ce0994f8f2d5048

    SHA1

    84573202cf87bbc995bb43be4b5cb41434aab059

    SHA256

    3098abdb835e9b266dad36173c20572edc44cd21501607622eb548787b3d54f5

    SHA512

    74bc6ab413d493d5210f7e7980bf2a020c3fed2fd2bafdb6563d041840550410db68bdf267576cacc5bc677f490f8d9189148ea87301777b56a9dd4ef1d749ae

  • C:\Users\Admin\AppData\Local\Temp\mspass.exe

    Filesize

    58KB

    MD5

    7cfb71efaa32f1fb654517aa1f4812f2

    SHA1

    b603236f708f15ac037ab2ddaf794c643482a873

    SHA256

    c2af90d91be1fee339be6e1fd60ce293e72cf6231b25dc29b67648fc3d046322

    SHA512

    5a6c1be82cc5f1f4de519bbfb7dc24adaa60493a8e8310be74803c3f0d98451345e6fbe8fdaa3da480c687d53dcf2b01d54ce96a2c519f3539e4be9465cdd636

  • C:\Users\Admin\AppData\Local\Temp\netpass.exe

    Filesize

    37KB

    MD5

    22f0f0aa39ff8dbcd3973c58ce7cc2c6

    SHA1

    f0ad2f34164702711fd73bdb6c2d870e0c8ab9f8

    SHA256

    aeecd4e8fc92ae0aa8d915d775aa872a7c4487420aabed7b6e27a762572eae92

    SHA512

    9387da7e7aa9ecb41bc096edd70fbaca8b398de318f98972dee2765d311502b687f2c364ff0ae20a2e60d568bdaf7bacb34e73b6dec0a9edf97b2a6366c478b0

  • C:\Users\Admin\AppData\Local\Temp\pspv.exe

    Filesize

    51KB

    MD5

    35861f4ea9a8ecb6c357bdb91b7df804

    SHA1

    836cb49c8d08d5e305ab8976f653b97f1edba245

    SHA256

    64788b6f74875aed53ca80669b06f407e132d7be49586925dbb3dcde56cbca9c

    SHA512

    0fdfe62c86c8601bb98991149eea51ddf91b812ad2c2d45e53aaf1f36a09d00aaf02fc3d183179cf5367fda09d6f62d36c0187da2dfa5e08df4c07cf634690be

  • C:\Windows\system32XDMB.001

    Filesize

    404B

    MD5

    2f06d7370e0c512f891c19a2974c8521

    SHA1

    ac9ce73fcec8e58426fe5c3194ec025772e95b9c

    SHA256

    f3ce4bb0022a82ae742edecce267d7501d58c8333f402f4e72bb55be64697d3e

    SHA512

    c9946b3158ef35b43317e5a0652199364e777af51f07a9dec1f82ff605fb624f0c982a573788ac5533caf45f21702774af49f6a791e3757691c60abb3a48c3d8

  • C:\Windows\system32XDMB.006

    Filesize

    7KB

    MD5

    32dd7b4bc8b6f290b0ece3cc1c011c96

    SHA1

    b979683868b399c6a6204ebaed9fc9c784a0429a

    SHA256

    6dcce9bbba5c2de47eea3abf7597a9c4fb2e4d358efc3752fa65c169cccfa2a1

    SHA512

    9e0d720799fe816f7d09c8a722b762203b6f12a8625c1c93cd640219ecc35969bd641b4d9e6dc04ab6f95ceb73235a438eb7d48ee9402118db3618b5760551ea

  • C:\Windows\system32XDMB.007

    Filesize

    5KB

    MD5

    e8155b68775ed29590e14df80fdc0e9f

    SHA1

    ed449da02e648a524004c265f3c37496d2f07f1f

    SHA256

    b39ba894b0a9a3201461ddd9ee9b297928e793dff221a47f019e75c11df631f3

    SHA512

    b14e00c46cf9bed0aca0f85775f624ff064f2d2afe1fa68b61bee5729db73cf9a8eced669c52d7cbb9504ff1b369a9a16a0f36c71a70c13c0bd1eaf5e07ccc11

  • C:\Windows\system32XDMB.exe

    Filesize

    471KB

    MD5

    3c06bbc025b61d2182ef5573f2852bda

    SHA1

    ebc1464c00b13fb5b3f80a59c80b595020e1fe7c

    SHA256

    e7f64e7215284cdeb8ef1eba28733f7aeae7f6977f82809d8de1e76a2e249085

    SHA512

    9d839ada211b85fc1efb1fe7bb3ce66fcf0e8069221d958234649c2ac5dc0f1bd06f1a016f9c727077af36fb46cac5409be9c8a8201d17f689c6b473aa01acdc

  • memory/892-71-0x0000000000400000-0x0000000000423000-memory.dmp

    Filesize

    140KB

  • memory/1696-18-0x0000000000670000-0x0000000000671000-memory.dmp

    Filesize

    4KB

  • memory/1696-108-0x0000000000670000-0x0000000000671000-memory.dmp

    Filesize

    4KB

  • memory/2452-95-0x0000000000400000-0x0000000000419000-memory.dmp

    Filesize

    100KB

  • memory/2452-101-0x0000000000400000-0x0000000000419000-memory.dmp

    Filesize

    100KB

  • memory/3696-62-0x0000000000400000-0x000000000041D000-memory.dmp

    Filesize

    116KB

  • memory/3696-58-0x0000000000400000-0x000000000041D000-memory.dmp

    Filesize

    116KB

We care about your privacy.

This website stores cookies on your computer. These cookies are used to improve your website experience and provide more personalized services to you, both on this website and through other media. To find out more about the cookies we use, see our Privacy Policy.