Analysis

  • max time kernel
    120s
  • max time network
    121s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    07-12-2024 20:39

General

  • Target

    d385095950c0469946c0d3ede9859a35_JaffaCakes118.exe

  • Size

    1.2MB

  • MD5

    d385095950c0469946c0d3ede9859a35

  • SHA1

    aa895808025b0be5a73ae8d489c9536033b263bb

  • SHA256

    c34b02197afb6505004c5c258bd2c5013b431cf245f8763bbb6c4217a9c8e13a

  • SHA512

    9446cee99737fe488bec33baeabec5c28c6a50f0987875875e3ff359b2a5eb55b6d576915ac2b733d3e6fdeef75f914e70c547257da65bd59210dee984671b1b

  • SSDEEP

    24576:4t4mTIKXyRUCMu1Oo1IFznRupktQVnbvwbuk1ImVG4pln3gBd29fUv/4gAL:4ttTIKCR3siktQRS5XlwgUv/z

Malware Config

Signatures

  • Ardamax

    A keylogger first seen in 2013.

  • Ardamax family
  • Ardamax main executable 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Drops file in System32 directory 5 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of SetWindowsHookEx 4 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\d385095950c0469946c0d3ede9859a35_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\d385095950c0469946c0d3ede9859a35_JaffaCakes118.exe"
    1⤵
    • Loads dropped DLL
    • Drops file in System32 directory
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:2416
    • C:\Windows\SysWOW64\JBBWSO\KKG.exe
      "C:\Windows\system32\JBBWSO\KKG.exe"
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Adds Run key to start application
      • Drops file in System32 directory
      • System Location Discovery: System Language Discovery
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of SetWindowsHookEx
      PID:2336

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Windows\SysWOW64\JBBWSO\KKG.001

    Filesize

    60KB

    MD5

    a0e52185446a908d52d822b0bb8c2112

    SHA1

    c8c2da5c2b140b01ba837cf385d452c08e43be18

    SHA256

    ae3211346da187dab804d037aa0fbbf6e1f103af005643cfe46f02bf1da2b993

    SHA512

    75d94285b322332ad0c221f8c1686b6ba6fe84ae5d289df059dfb31929fc1c1605794e9411d734013a3f9f66817be18a980dd517beec8e0b45e9dfc59da34786

  • C:\Windows\SysWOW64\JBBWSO\KKG.002

    Filesize

    43KB

    MD5

    aa19ffd6cd58b081109fd1d307d1f9c5

    SHA1

    13f86d496127ef3c6066ead3cb89d71fb9c748f4

    SHA256

    9b03cd394efeffa914fb095c23596d1fba87d4437d3229c8dca536881a4920b2

    SHA512

    b18c334ad6708aa93dcf86d749b0971f26b0627744872ec22ecba83dbe9962b18a2739c34fc1c3a16d87dfd8a126282923956cfe430aa8dda263511868509d37

  • C:\Windows\SysWOW64\JBBWSO\KKG.004

    Filesize

    1KB

    MD5

    a1e3378ae76cc2b3b4d4ddadafe397e4

    SHA1

    d59b5d3cf1bc0518166544cd33d39bf87581a870

    SHA256

    b9bea98ab8cf31d61e73a5981aa9eb452bb860c45901a4692dbaa3bc4d61458b

    SHA512

    0dbe79c3ca7c1d076687d8458a36b49c9a6edb89499d82782112ec4df8c0d090916fcb18867c17d51efdcc2eb86174072025f7633acec083657b02edef7f3474

  • \Windows\SysWOW64\JBBWSO\KKG.exe

    Filesize

    1.7MB

    MD5

    34b3619a56a670342c773cee6ebae01d

    SHA1

    8528631520e56d2ec7d6838965185a71cbb43d2f

    SHA256

    9e233be19677930f0a1182be94d9594b30c33ee4de1a56d606fbcf8033870c49

    SHA512

    a92e73a05430765887c7b71ec6c5b36c5cfc2e9a3ada94fd11adafc14e13c122899fbf545d0ecca7292df6c1ebf885fff7ac890d49d4d9a2bae8afc3e05c8e2b

  • memory/2336-13-0x0000000000230000-0x0000000000231000-memory.dmp

    Filesize

    4KB

  • memory/2336-15-0x0000000000230000-0x0000000000231000-memory.dmp

    Filesize

    4KB