Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    93s
  • max time network
    94s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    13/12/2024, 04:05

General

  • Target

    e9cdf3dd25a6e8116699811b85eab09a_JaffaCakes118.exe

  • Size

    807KB

  • MD5

    e9cdf3dd25a6e8116699811b85eab09a

  • SHA1

    54a64e4961c29ea81c3ce7ccf80ff84bb62cc6ae

  • SHA256

    15005ef320ea86fb763689a3fcd28ba4f75c7ed72fba38f4dd3ac18bd3efc687

  • SHA512

    639d728770df671c4780d631004d282705764bd8b2c5f33575171786ff9256efbb1b4f81a7ec61ed1b815eaf1235012adc7fe7d9a68fc3ce9b48cab0d017b4ea

  • SSDEEP

    24576:OTV5ndLUZB/u3VVmpyMBoIxAzEV6JQi0cJUCjJD:QdiB2l0/BNxAYcScJUSt

Malware Config

Signatures

  • Ardamax

    A keylogger first seen in 2013.

  • Ardamax family
  • Ardamax main executable 1 IoCs
  • Checks computer location settings 2 TTPs 2 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 6 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Indicator Removal: File Deletion 1 TTPs

    Adversaries may delete files left behind by the actions of their intrusion activity.

  • Drops file in System32 directory 7 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Program crash 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 4 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies registry class 34 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of SetWindowsHookEx 5 IoCs
  • Suspicious use of WriteProcessMemory 9 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\e9cdf3dd25a6e8116699811b85eab09a_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\e9cdf3dd25a6e8116699811b85eab09a_JaffaCakes118.exe"
    1⤵
    • Checks computer location settings
    • Loads dropped DLL
    • Drops file in System32 directory
    • System Location Discovery: System Language Discovery
    • Modifies registry class
    • Suspicious use of WriteProcessMemory
    PID:4724
    • C:\Windows\SysWOW64\28463\CMJB.exe
      "C:\Windows\system32\28463\CMJB.exe"
      2⤵
      • Checks computer location settings
      • Executes dropped EXE
      • Loads dropped DLL
      • Adds Run key to start application
      • Drops file in System32 directory
      • System Location Discovery: System Language Discovery
      • Modifies registry class
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:1600
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 1600 -s 1128
        3⤵
        • Loads dropped DLL
        • Program crash
        PID:112
      • C:\Windows\SysWOW64\cmd.exe
        "C:\Windows\system32\cmd.exe" /c del C:\Windows\SysWOW64\28463\CMJB.exe > nul
        3⤵
        • System Location Discovery: System Language Discovery
        PID:5076
    • C:\Windows\SysWOW64\NOTEPAD.EXE
      "C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\AppData\Local\Temp\Okuyun..txt
      2⤵
      • Loads dropped DLL
      • System Location Discovery: System Language Discovery
      PID:3864
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 424 -p 1600 -ip 1600
    1⤵
      PID:1816

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\@8C52.tmp

      Filesize

      4KB

      MD5

      cb07753c45624238b4403480372be5db

      SHA1

      10af5bfbed599165d996470278f011728e866df7

      SHA256

      63c3ed8cbe11314a2f2cd6ff50305bad98075be9e09d22e45b47af557a3388e7

      SHA512

      2c72cca45ef924104c6892dd96f2e27a5d43bacc9f3eb0eeee24c871cc1bd1642d77734822d9d934f93a77c884fa1c682cf1ceddffe157a613978d9edd184312

    • C:\Users\Admin\AppData\Local\Temp\Okuyun..txt

      Filesize

      81B

      MD5

      19b2c20900c4b2af43663d2bc42bf6eb

      SHA1

      d50958be7e376036ea3bafc821c9c9f66f124b56

      SHA256

      7eabb00ecd447344d54026a6faed91c6759647c098cb03144c806634958815cd

      SHA512

      7d7c9f069fa3b0b3bf2cca4611f36dd78d048e8cda3b89359f1ebad7e20fd28825ef1ac2fcdeced2694a7d48e5a577f3d3aff9d1b72cb738ae1ec5b08e8b8300

    • C:\Windows\SysWOW64\28463\AKV.exe

      Filesize

      457KB

      MD5

      42e2202ac32edb39ccf9979515018d85

      SHA1

      c1e07fbe2fa759e2775d4dcf7de23a66d2422a1a

      SHA256

      367b4028baf3df4a5f77169bd64c9ef8fd7968a4d6c852ae3f81a726f4b37222

      SHA512

      a97d9e968b1f63dedba74999aabe6fd150aae985c1143d29b183cc0d663a45252c57494c3457136c5e500050c6af6c819f9ba7070b7d62300ede2e9a7c792768

    • C:\Windows\SysWOW64\28463\CMJB.001

      Filesize

      440B

      MD5

      f4325a6b407f5a44e46aaabaf5d86cbf

      SHA1

      dcbeb464607e71049e86f2ae5726984b2db4a459

      SHA256

      4a598cbd435123719e82e136216e1e43d4997d1f5ef8da12d163f85e87ca1cc4

      SHA512

      1f73d17a83b942713c3838b7c71f73d3a9b1a7cb7970a35492e588399ad6ba7cf28da34d79791971084b81d63b2c1583f18d9f7b600fedd79a1c9fee95aa7a0f

    • C:\Windows\SysWOW64\28463\CMJB.006

      Filesize

      8KB

      MD5

      3da3041787b72a7909d9f6184ce6bc5e

      SHA1

      fc7f00b8a1341b5341e2ba6f94ba85364bc90843

      SHA256

      18e06896cc71e99b717cff8d68cba86fea3eba5087b93734f6418e53cadab5b3

      SHA512

      150fa3f8eeec3621ac61eab0da3f2692dd776887ec0c1791404df3dd8784982563496e1e990217a99c4fd53c5d5d68e0574737879b72d78ab737033f1b08560a

    • C:\Windows\SysWOW64\28463\CMJB.007

      Filesize

      5KB

      MD5

      50d0bcf6b5a6b11d9e274ccefba3f02e

      SHA1

      57acf2a1236b7534f2db661a9d95aeadcd41aa2a

      SHA256

      a5e5cf8b3133031f25db37fd13b029cdfc9d1588ca7f68041e52349f46cbbf5c

      SHA512

      c0288f92c75f4a6ea45434e3960a3c5d8ed3d890121a3fd6da2449e1313db523224e301451d85a15ea8ee9b5c2fb3bf294ee90869a4d5608bcf48fa94458e938

    • C:\Windows\SysWOW64\28463\CMJB.exe

      Filesize

      647KB

      MD5

      a7b322839cedf8d56cb0a7dcdb50ab59

      SHA1

      d27855e65f5d9e87666f39d2af694a0d75330a75

      SHA256

      ba7362315c0608c9203c9d607fd85695fbc15f034ea40b3de7dd1abebd5859a3

      SHA512

      86a416ae639ca458e56093d5c04f3406ac0389cf9a1047f714424ba89ffd047ca58e6927bc941d285d4db9e8a95e91e0d578be3038a83945b6af90586ea9f649

    • C:\Windows\SysWOW64\28463\key.bin

      Filesize

      105B

      MD5

      27c90d4d9b049f4cd00f32ed1d2e5baf

      SHA1

      338a3ea8f1e929d8916ece9b6e91e697eb562550

      SHA256

      172d6f21165fb3ca925e5b000451fd8946920206f7438018c28b158b90cf5ffb

      SHA512

      d73dadb3cf74c647ce5bad5b87d3fb42a212defcba8afb8cf962020b61a0369c0a2b1005797583daf1f1ae88b29b7288bc544a53d643f3519cf604aa0ffd6dae

    • memory/1600-31-0x0000000003360000-0x0000000003361000-memory.dmp

      Filesize

      4KB

    • memory/1600-44-0x0000000003370000-0x0000000003371000-memory.dmp

      Filesize

      4KB

    • memory/1600-30-0x0000000003360000-0x0000000003361000-memory.dmp

      Filesize

      4KB

    • memory/1600-33-0x0000000003360000-0x0000000003361000-memory.dmp

      Filesize

      4KB

    • memory/1600-40-0x00000000033A0000-0x00000000033A1000-memory.dmp

      Filesize

      4KB

    • memory/1600-38-0x0000000003350000-0x0000000003352000-memory.dmp

      Filesize

      8KB

    • memory/1600-39-0x00000000033A0000-0x00000000033A1000-memory.dmp

      Filesize

      4KB

    • memory/1600-29-0x00000000024E0000-0x00000000024E1000-memory.dmp

      Filesize

      4KB

    • memory/1600-28-0x0000000002520000-0x0000000002521000-memory.dmp

      Filesize

      4KB

    • memory/1600-27-0x0000000002560000-0x0000000002561000-memory.dmp

      Filesize

      4KB

    • memory/1600-26-0x0000000002540000-0x0000000002541000-memory.dmp

      Filesize

      4KB

    • memory/1600-25-0x0000000002550000-0x0000000002551000-memory.dmp

      Filesize

      4KB

    • memory/1600-24-0x0000000002500000-0x0000000002501000-memory.dmp

      Filesize

      4KB

    • memory/1600-34-0x0000000003360000-0x0000000003361000-memory.dmp

      Filesize

      4KB

    • memory/1600-45-0x0000000000AB0000-0x0000000000AB1000-memory.dmp

      Filesize

      4KB

    • memory/1600-32-0x0000000003360000-0x0000000003361000-memory.dmp

      Filesize

      4KB

    • memory/1600-43-0x0000000000610000-0x0000000000611000-memory.dmp

      Filesize

      4KB

    • memory/1600-42-0x0000000003360000-0x0000000003361000-memory.dmp

      Filesize

      4KB

    • memory/1600-35-0x0000000003360000-0x0000000003361000-memory.dmp

      Filesize

      4KB

    • memory/1600-36-0x0000000003350000-0x0000000003351000-memory.dmp

      Filesize

      4KB

    • memory/1600-21-0x00000000022D0000-0x000000000232A000-memory.dmp

      Filesize

      360KB

    • memory/1600-18-0x0000000000400000-0x00000000004DF000-memory.dmp

      Filesize

      892KB

    • memory/1600-54-0x0000000000400000-0x00000000004DF000-memory.dmp

      Filesize

      892KB

    • memory/1600-55-0x00000000022D0000-0x000000000232A000-memory.dmp

      Filesize

      360KB

    • memory/1600-56-0x0000000003350000-0x0000000003351000-memory.dmp

      Filesize

      4KB

    • memory/1600-57-0x00000000033A0000-0x00000000033A1000-memory.dmp

      Filesize

      4KB

    • memory/1600-58-0x0000000000400000-0x00000000004DF000-memory.dmp

      Filesize

      892KB

    • memory/1600-61-0x0000000000400000-0x00000000004DF000-memory.dmp

      Filesize

      892KB

    • memory/1600-65-0x0000000000400000-0x00000000004DF000-memory.dmp

      Filesize

      892KB

    • memory/1600-66-0x00000000022D0000-0x000000000232A000-memory.dmp

      Filesize

      360KB