Analysis

  • max time kernel
    117s
  • max time network
    118s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    15-12-2024 09:19

General

  • Target

    f354530a499a1fa8bd988253e16f3f1d_JaffaCakes118.exe

  • Size

    328KB

  • MD5

    f354530a499a1fa8bd988253e16f3f1d

  • SHA1

    ac99cbb7ddcc51c3a05d83b8a6a29d8dd83283b5

  • SHA256

    ed32c74397f0db5108f589fd0c253bdc9a8f0e30a86cb4c868e45b9ebc5d65ac

  • SHA512

    c4bfe9eb4da20cf0bbf9e949e584ecd54bc3dcd90a557ba678f3cbef6282955fb88836ced64cf4886e184d8712aa2d3299e0a2faf8d314b2d730d98a7cc48d71

  • SSDEEP

    6144:hjCDcp+tffoycg8bQoRhYTXnyO3Qz/2yczRmzDO:VCDPFCp8z/3Q/lrzC

Malware Config

Signatures

  • Ardamax

    A keylogger first seen in 2013.

  • Ardamax family
  • Ardamax main executable 2 IoCs
  • Deletes itself 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Drops file in Windows directory 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Opens file in notepad (likely ransom note) 1 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\f354530a499a1fa8bd988253e16f3f1d_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\f354530a499a1fa8bd988253e16f3f1d_JaffaCakes118.exe"
    1⤵
    • Drops file in Windows directory
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:2132
    • C:\Windows\SysWOW64\NOTEPAD.EXE
      "C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\AppData\Local\Temp\f354530a499a1fa8bd988253e16f3f1d_JaffaCakes118.txt
      2⤵
      • System Location Discovery: System Language Discovery
      • Opens file in notepad (likely ransom note)
      PID:2444
    • C:\Windows\qservice.exe
      C:\Windows\qservice.exe /start
      2⤵
      • Executes dropped EXE
      PID:2540
    • C:\Windows\SysWOW64\cmd.exe
      cmd /c C:\Users\Admin\AppData\Local\Temp\F35453~1.EXE.bat
      2⤵
      • Deletes itself
      • System Location Discovery: System Language Discovery
      PID:2852

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\F35453~1.EXE.bat

    Filesize

    133B

    MD5

    341907586c6c33e9ef34abd0e2479ded

    SHA1

    fe9875bbfc751dcd168ad9e227ec231f43739561

    SHA256

    5b68f8391bf0d4849e7134972b011b5c62de09a4fd6e3d0b017cc944b6b4ee4b

    SHA512

    ffc58a5c2faec62aa3f9091b40a4fef81a2a6ab49b13430593251bf3e0bce9aea93f6969e432a2a7862cfb7bec10446bad21667f043499e184a3fd3a7128bf41

  • C:\Users\Admin\AppData\Local\Temp\f354530a499a1fa8bd988253e16f3f1d_JaffaCakes118.txt

    Filesize

    133B

    MD5

    3b6e988425b2e96322ad1afad26c3ed7

    SHA1

    a2461f1a9970c3d6d05355f436540afbe03d4cd6

    SHA256

    6a36cf8641928bc27352d72a2c6d8e4dac2096f704d040dd040bb1c846098644

    SHA512

    a49399e8a3229de39919111bd439b8b86ef40dad172bf5ec6ea3275feedf31113e24feab18b83c440796b57b56c3c178173d077701a97fa2e781d34e8e529822

  • C:\Windows\qservice.exe

    Filesize

    328KB

    MD5

    f354530a499a1fa8bd988253e16f3f1d

    SHA1

    ac99cbb7ddcc51c3a05d83b8a6a29d8dd83283b5

    SHA256

    ed32c74397f0db5108f589fd0c253bdc9a8f0e30a86cb4c868e45b9ebc5d65ac

    SHA512

    c4bfe9eb4da20cf0bbf9e949e584ecd54bc3dcd90a557ba678f3cbef6282955fb88836ced64cf4886e184d8712aa2d3299e0a2faf8d314b2d730d98a7cc48d71

  • memory/2132-0-0x0000000013140000-0x0000000013162000-memory.dmp

    Filesize

    136KB

  • memory/2132-11-0x0000000000370000-0x0000000000392000-memory.dmp

    Filesize

    136KB

  • memory/2132-10-0x0000000000370000-0x0000000000392000-memory.dmp

    Filesize

    136KB

  • memory/2132-14-0x0000000013140000-0x0000000013162000-memory.dmp

    Filesize

    136KB

  • memory/2132-25-0x0000000013140000-0x0000000013162000-memory.dmp

    Filesize

    136KB

  • memory/2540-12-0x0000000013140000-0x0000000013162000-memory.dmp

    Filesize

    136KB

  • memory/2540-16-0x0000000013140000-0x0000000013162000-memory.dmp

    Filesize

    136KB