Analysis

  • max time kernel
    142s
  • max time network
    140s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    10-12-2024 06:55

General

  • Target

    dd862858d44add6103c8418cf9ab0ba4_JaffaCakes118.exe

  • Size

    933KB

  • MD5

    dd862858d44add6103c8418cf9ab0ba4

  • SHA1

    b6f7e01f094346b566b287b3f8815aa3175da5d0

  • SHA256

    d69d32aa77b6b5050d0ed6acc792ada048815cb68b94bf537f02f448f257145a

  • SHA512

    c5516321982655557bfd6165fc296033d9ff44b9dc0cf85c18ffdb68a6af8f71bea5d3f4350c9259d94cc0e78653209dd46e937e4eb7876341ff1350b194d093

  • SSDEEP

    24576:zZB2uzn2FiYiQ1e6cCshswP1UeWxt2M9R3ZAtcqUV:zZYuz2wYiC8suFWxt2Mn3ZcIV

Malware Config

Signatures

  • Ardamax

    A keylogger first seen in 2013.

  • Ardamax family
  • Ardamax main executable 1 IoCs
  • Checks computer location settings 2 TTPs 2 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 4 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Drops file in System32 directory 7 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies registry class 33 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of SetWindowsHookEx 5 IoCs
  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\dd862858d44add6103c8418cf9ab0ba4_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\dd862858d44add6103c8418cf9ab0ba4_JaffaCakes118.exe"
    1⤵
    • Checks computer location settings
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:956
    • C:\Users\Admin\AppData\Local\Temp\TibiaMC.exe
      "C:\Users\Admin\AppData\Local\Temp\TibiaMC.exe"
      2⤵
      • Checks computer location settings
      • Executes dropped EXE
      • Loads dropped DLL
      • Drops file in System32 directory
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:3924
      • C:\Windows\SysWOW64\28463\XLDN.exe
        "C:\Windows\system32\28463\XLDN.exe"
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Adds Run key to start application
        • Drops file in System32 directory
        • System Location Discovery: System Language Discovery
        • Modifies registry class
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of SetWindowsHookEx
        PID:2816

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\@A827.tmp

    Filesize

    4KB

    MD5

    d372a0cb21c005b26e1a0b64ec73ff3d

    SHA1

    ecdbc27845aa2c4f5640e08588161fe81957d10f

    SHA256

    c8ed006ecda67e5e4e655f645b86d5c59ba5cf6c4bf71aa037960845344abf57

    SHA512

    89fb94bdc77800352ee96106e3b3170a205e479062fc63e8b0f7fef76a49519f6758a646636ee12f93856095fb9b7c9261e56bb70e4094472d0137fc61f01987

  • C:\Users\Admin\AppData\Local\Temp\TibiaMC.exe

    Filesize

    783KB

    MD5

    7d317cab674e9bd65ec46f8fa6b1f766

    SHA1

    f607724bd3982d5c171896cef94c58240edee8c4

    SHA256

    d78eaed216df170542a3e4f6b582b086f512184ea5072f7c2ebf2baa07c431ee

    SHA512

    4e743b8491fcfc0125f0b2526a4e94c6eec33e4e7a354a227a68eaf1529813b66d64a6923d0c08004cd8d6cb2734023292d2c09fd28b3d34d6b870e6abc3bec3

  • C:\Windows\SysWOW64\28463\AKV.exe

    Filesize

    457KB

    MD5

    84d41e2f2f9dddb3eeb1835c283a2d7f

    SHA1

    4e4e051703d7e5475e71f8ea818d9d6882fcbe83

    SHA256

    206dad55f739fb7be3861d332573cc39e620e553d0e637a1807c9acb4d983a7b

    SHA512

    325f62644f9bc0412b2f8c1decd5be7cdbb6c348b0ca21658f97b44efde7f94ccfa7af9bfebb4c67414cedf79468f74ccf05fd357c76699ffdb4a86068028c20

  • C:\Windows\SysWOW64\28463\XLDN.001

    Filesize

    450B

    MD5

    3e042c26beb272328b6fe56140aaf409

    SHA1

    091a9485b3b6c0fcbad43108409317590fdf41ca

    SHA256

    c4b331e45c3943f7b551609567cf6b8f21683fe29236027ee146533558e1b741

    SHA512

    d97f6b110efcdd507b64e521d93fb31644af6fa13351134d2d704fa02e6206acebd3b28a4c0e532da9c91e138ddd46bcfeb505e7c6643003948e44910618fe13

  • C:\Windows\SysWOW64\28463\XLDN.006

    Filesize

    8KB

    MD5

    23053b1e316c4965e84118c7564bae8d

    SHA1

    75277b63f42edf5596f258958f53b584a52a88a5

    SHA256

    4714d9b2e492a97f6d8f615147e2189a7ed09702627b8783b9351380b1cebe6f

    SHA512

    11c250458b301c99afcd6ead5d3d5f367ade0884dba8accf2c8ead93f83eadb4f8ec7f756aa9767f4877885a0301d5b21f6180a0efbe58649a1d4d9ed995e602

  • C:\Windows\SysWOW64\28463\XLDN.007

    Filesize

    5KB

    MD5

    d1634f55997e7f03ab860e50dd9f0cb6

    SHA1

    6fb3cb0f34750245686ed6d880fa637e6149ea94

    SHA256

    caadc012d814d37d1a7ae1a6741c0a56ba288a0b7731b3ab4019c6e796100036

    SHA512

    931964902fe4eb685f20be69cc85d3c88095138ed4f7788d1dfb2f6d61cdf2c4257eb475476bd6741554eb944f5d7cdead1a864e38dd28113beb84e54f6772da

  • C:\Windows\SysWOW64\28463\XLDN.exe

    Filesize

    646KB

    MD5

    ee9b8abea7a9715d1d119576f3f03e67

    SHA1

    08b7d55a300602a51299d488b4937f9e9c2371e1

    SHA256

    34d9747e63a3390353d8f448b0a319b8b3229a4cc2aa0e0f4330597b04daf3b2

    SHA512

    ae562f5cdd881905d063be09d31dfb3cfd6a7729505ce69b005df7f696ef82acf7f1d4941d3306b0061821861bf1e722f1e5d54cec76f9abfd23d8cfcc1b23aa

  • C:\Windows\SysWOW64\28463\key.bin

    Filesize

    105B

    MD5

    27c90d4d9b049f4cd00f32ed1d2e5baf

    SHA1

    338a3ea8f1e929d8916ece9b6e91e697eb562550

    SHA256

    172d6f21165fb3ca925e5b000451fd8946920206f7438018c28b158b90cf5ffb

    SHA512

    d73dadb3cf74c647ce5bad5b87d3fb42a212defcba8afb8cf962020b61a0369c0a2b1005797583daf1f1ae88b29b7288bc544a53d643f3519cf604aa0ffd6dae

  • memory/956-9-0x0000000000400000-0x000000000042E000-memory.dmp

    Filesize

    184KB

  • memory/2816-34-0x0000000002410000-0x0000000002411000-memory.dmp

    Filesize

    4KB

  • memory/2816-54-0x0000000003270000-0x0000000003271000-memory.dmp

    Filesize

    4KB

  • memory/2816-41-0x0000000003260000-0x0000000003261000-memory.dmp

    Filesize

    4KB

  • memory/2816-40-0x0000000003210000-0x0000000003213000-memory.dmp

    Filesize

    12KB

  • memory/2816-39-0x0000000003220000-0x0000000003221000-memory.dmp

    Filesize

    4KB

  • memory/2816-38-0x00000000023A0000-0x00000000023A1000-memory.dmp

    Filesize

    4KB

  • memory/2816-37-0x00000000023E0000-0x00000000023E1000-memory.dmp

    Filesize

    4KB

  • memory/2816-36-0x0000000002420000-0x0000000002421000-memory.dmp

    Filesize

    4KB

  • memory/2816-35-0x0000000002400000-0x0000000002401000-memory.dmp

    Filesize

    4KB

  • memory/2816-43-0x0000000003260000-0x0000000003261000-memory.dmp

    Filesize

    4KB

  • memory/2816-33-0x00000000023C0000-0x00000000023C1000-memory.dmp

    Filesize

    4KB

  • memory/2816-44-0x0000000003260000-0x0000000003261000-memory.dmp

    Filesize

    4KB

  • memory/2816-47-0x0000000000650000-0x0000000000651000-memory.dmp

    Filesize

    4KB

  • memory/2816-42-0x0000000003260000-0x0000000003261000-memory.dmp

    Filesize

    4KB

  • memory/2816-53-0x0000000002590000-0x0000000002591000-memory.dmp

    Filesize

    4KB

  • memory/2816-52-0x00000000006B0000-0x00000000006B1000-memory.dmp

    Filesize

    4KB

  • memory/2816-51-0x00000000024E0000-0x00000000024E1000-memory.dmp

    Filesize

    4KB

  • memory/2816-50-0x0000000002380000-0x0000000002381000-memory.dmp

    Filesize

    4KB

  • memory/2816-49-0x0000000002430000-0x0000000002431000-memory.dmp

    Filesize

    4KB

  • memory/2816-48-0x0000000003230000-0x0000000003231000-memory.dmp

    Filesize

    4KB

  • memory/2816-45-0x0000000003260000-0x0000000003261000-memory.dmp

    Filesize

    4KB

  • memory/2816-46-0x0000000003260000-0x0000000003261000-memory.dmp

    Filesize

    4KB

  • memory/2816-31-0x00000000009D0000-0x0000000000A2A000-memory.dmp

    Filesize

    360KB

  • memory/2816-29-0x0000000000400000-0x00000000004DF000-memory.dmp

    Filesize

    892KB

  • memory/2816-62-0x0000000000400000-0x00000000004DF000-memory.dmp

    Filesize

    892KB

  • memory/2816-63-0x00000000009D0000-0x0000000000A2A000-memory.dmp

    Filesize

    360KB

  • memory/2816-64-0x0000000003260000-0x0000000003261000-memory.dmp

    Filesize

    4KB

  • memory/2816-68-0x0000000000400000-0x00000000004DF000-memory.dmp

    Filesize

    892KB