Analysis

  • max time kernel
    95s
  • max time network
    142s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    03-01-2025 15:32

General

  • Target

    JaffaCakes118_6da4f18dbb94bbe6c7472f2709a58df0.exe

  • Size

    660KB

  • MD5

    6da4f18dbb94bbe6c7472f2709a58df0

  • SHA1

    4bb3ff58cea6e46bc5ac4f8d4d7a4faa61a18cb6

  • SHA256

    8d4f6885f05bcea6497b46d3294ef57d180848a07e0bcb3e6153da4673345609

  • SHA512

    5f20fb122b1aee03d3ed122981148ad8989a5bb111d45f2b32afe13f3d763cbfa9e9e074c0ef34db84c883921c893cfbc667d35f0db081a7207bb23c9f074272

  • SSDEEP

    12288:ElOmIbyf7CkRWgssPXMdKiFzGqLY/CrhaQRqvLo4DI7/:mIbyf7CkRWgjPXMGqL4Ck8qDoEI7/

Malware Config

Signatures

  • Ardamax

    A keylogger first seen in 2013.

  • Ardamax family
  • Ardamax main executable 1 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 7 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Drops file in System32 directory 6 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of SetWindowsHookEx 5 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_6da4f18dbb94bbe6c7472f2709a58df0.exe
    "C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_6da4f18dbb94bbe6c7472f2709a58df0.exe"
    1⤵
    • Checks computer location settings
    • Loads dropped DLL
    • Drops file in System32 directory
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:3796
    • C:\Windows\SysWOW64\28463\XFUB.exe
      "C:\Windows\system32\28463\XFUB.exe"
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Adds Run key to start application
      • Drops file in System32 directory
      • System Location Discovery: System Language Discovery
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of SetWindowsHookEx
      PID:3296

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\@A50A.tmp

    Filesize

    4KB

    MD5

    27092ec75c1839f36bfe900a38acc484

    SHA1

    fe14b750a0ed653246c5f358891f8c1241913bb2

    SHA256

    e6e29699840ae26c452227f9a1c9fd0e3cda0c2413c4255df9fc066c47af0e07

    SHA512

    815477e8681e38dd3110171adbaf06738eb9d63839671a959a296ec1a1fb17d788682dde5e6a1f0bffa3b4deda4577292ffa37ce10b95ad14276ffcd0795ac0b

  • C:\Windows\SysWOW64\28463\AKV.exe

    Filesize

    394KB

    MD5

    1ec252b02d7f9a8ecff2eaea41c7dea9

    SHA1

    af71670b8e483d800216a3fab74e9306027a0669

    SHA256

    99d086679a6296565ce4a96f3e9be5cc62ea368dd96137fa49d42b41a36ac998

    SHA512

    f8f454d55263c3c74d190ce248338eb967dd5dbaa9e92e361e50fe4bf2cd53980f14975d5798c5574bc29a077529050b11fb5947f75c6d945f02eea6876d514e

  • C:\Windows\SysWOW64\28463\XFUB.001

    Filesize

    504B

    MD5

    c9b8d94d545015f35ec9c9395c8645ff

    SHA1

    3c3aa57229bd1a56cc0729aacae02c58e1b67023

    SHA256

    beee6ce85d5638fe0e8d1091a1a8ce34e44afb6eb3b420eceaf473fe982fa4b4

    SHA512

    d83a3dc19b33600379db4bfc0cd350824e0a76a31fa88c4216a17ef3373aa206fe2e9d3152e1ca937df663ae6103b253f40f1fb28b1dd19595e481d8af46145e

  • C:\Windows\SysWOW64\28463\XFUB.006

    Filesize

    8KB

    MD5

    aae8ccee5d5eed5748d13f474123efea

    SHA1

    6da78da4de3b99a55fad00be2ec53a3ad3bd06ae

    SHA256

    10c464d1675774e0282171555d59fb8975ed6c0e6a781182490f48e66823a5b8

    SHA512

    d370e1ffeeb81b3f07b83a9cf1e3b44635fde7aa6ac999bccafece8091dbf96f0a78257bb0e03b3689dc47fb4e96ec7deac7848a43ddef62afc9b8cc665ee8bd

  • C:\Windows\SysWOW64\28463\XFUB.007

    Filesize

    5KB

    MD5

    40685d22d05d92462a2cfc1bba9a81b7

    SHA1

    f0e19012d0ed000148898b1e1264736bed438da8

    SHA256

    cdca1e5bc4c5129caa8eeddf637c820b6241c8790ce1a341e38e8324ae95afa0

    SHA512

    21961d2dd118b45bde4cf00b4570712791a22769d05afb5b6c54355b0aaee9b7f7de00b357845349ef957807452365134d51e11181d2d45f98ed0cc9402de90b

  • C:\Windows\SysWOW64\28463\XFUB.exe

    Filesize

    473KB

    MD5

    8692671171e5aab4afa159624aaea14b

    SHA1

    3307abb61038c38c2b9b56084b373456fa48fd5d

    SHA256

    02296699dd94db3c4b6b34f6888905c23aa27c3fcaeebe3efe02b312dc7a9536

    SHA512

    d270d0f254362659cd18f971c59a2fbc286f0eacfde99f906707c595013c38b662e238ed48729c28015ee8a30b3bb6f8bdf7a0ab20496ac2fe6f37315254ce97

  • memory/3296-18-0x0000000000400000-0x000000000048C000-memory.dmp

    Filesize

    560KB

  • memory/3296-23-0x0000000000C10000-0x0000000000C11000-memory.dmp

    Filesize

    4KB

  • memory/3296-32-0x0000000000C10000-0x0000000000C11000-memory.dmp

    Filesize

    4KB

  • memory/3296-33-0x0000000000400000-0x000000000048C000-memory.dmp

    Filesize

    560KB