Analysis

  • max time kernel
    119s
  • max time network
    119s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    15-01-2025 04:28

General

  • Target

    JaffaCakes118_4ce57b96f723e34d313907094f504013.exe

  • Size

    552KB

  • MD5

    4ce57b96f723e34d313907094f504013

  • SHA1

    8e65df2348d7851cc7efda99e89ee673a1d3bc45

  • SHA256

    abf3f2c13e0e9ff3ad70b7a2fed26602dd7fdf8247e6fb88d8429464850161f6

  • SHA512

    18779f6ab56a941f3cdabb822e5958b0d49147c9f3fc61b609f27d1bc28554439d74076ee66bff4c3bb503dec43d601c5fe44509cf7a91d87f961ba66f6aa39d

  • SSDEEP

    6144:Eov6OIud0k/Al74xCZU0rJboaJQKLZuGCAJCMfy4OHAuspRP2WoDXZm4zuy8ZvO/:ZbdHfx50+aJQKsXMfhOseDJLzulVCybg

Malware Config

Signatures

  • Ardamax

    A keylogger first seen in 2013.

  • Ardamax family
  • Ardamax main executable 1 IoCs
  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 11 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Drops file in System32 directory 5 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of AdjustPrivilegeToken 19 IoCs
  • Suspicious use of SetWindowsHookEx 5 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_4ce57b96f723e34d313907094f504013.exe
    "C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_4ce57b96f723e34d313907094f504013.exe"
    1⤵
    • Loads dropped DLL
    • Drops file in System32 directory
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:1840
    • C:\Windows\SysWOW64\28463\MYGM.exe
      "C:\Windows\system32\28463\MYGM.exe"
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Adds Run key to start application
      • Drops file in System32 directory
      • System Location Discovery: System Language Discovery
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of SetWindowsHookEx
      PID:3008
    • C:\Users\Admin\AppData\Local\Temp\loader.exe
      "C:\Users\Admin\AppData\Local\Temp\loader.exe"
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • System Location Discovery: System Language Discovery
      • Suspicious use of AdjustPrivilegeToken
      PID:2636

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Windows\SysWOW64\28463\MYGM.001

    Filesize

    382B

    MD5

    b0c0d02a8cbd04cf991f99a32d27b946

    SHA1

    9aadd2151af94a12734555d88fecf16f6e71121c

    SHA256

    5a61c8b52a3cb3c497c712bd20c9f4cd2867f647ba51f73749c0b87246f1c3ce

    SHA512

    7f6960ffb5a5a9d043476fa8caa140ba4df23f790c7ef127c8fcecf4a8f00b3e59006a8df2bf61a291f34a115a0084b4cb608e4e051c1b61f4fe66405d2423d4

  • C:\Windows\SysWOW64\28463\MYGM.006

    Filesize

    8KB

    MD5

    86d96c93965255cef35ca42413188b75

    SHA1

    9d77f203267febe047d049584e5c79f1c1801b2d

    SHA256

    b796bd1f5cdb1d1db91c3aca1ac700c015775b9caf2725fbf4b6089a096f21c5

    SHA512

    2db81080a16494ec549f4f39ee382580ba12cd5cbfe31632c8459ba94d767ce1ad3e9c0e6643f80530ae5e316fc42dca05708eeade7ce3c0341d669325cdb095

  • C:\Windows\SysWOW64\28463\MYGM.007

    Filesize

    5KB

    MD5

    b73942c11844487ca7fc3e78062c8abb

    SHA1

    28f4c4159528ccbe9d83b5cd5e157861d11ff04c

    SHA256

    4ba88f8964ee02a395d88974fd43b05610cf520b4ab40f36b3f98715ce1e0984

    SHA512

    d4c782f5abd91b3396b243345f968eb5a705a7aefeedf92e62047309f7ccf223c0825623c184de66e3667c22eb371f0329be97ea70f6d72b54f98b22042e1f9c

  • \Users\Admin\AppData\Local\Temp\@DF28.tmp

    Filesize

    4KB

    MD5

    9dc64557fcebd521ca4b267da15c2914

    SHA1

    c2247f9e0f0c8d11c7b9ab93f43ed53943d0bdd2

    SHA256

    a49cb9cbab2a60418b2079d4110123682fc980bb6b46ac5ada144797b5fa2cf4

    SHA512

    00241a139ca307c5eb4d89fa8b6296833961091286282c3482746e4a3589ef61e6d007edb6aa6fa1ef812d57bf63a8e495e0db712e17decc77bbae2490cdbe01

  • \Users\Admin\AppData\Local\Temp\loader.exe

    Filesize

    290KB

    MD5

    4f211987b6dfd4c44e91643d5d06f318

    SHA1

    a6cc7a50a28d71ec5a72a3ea5608d5a221d575b5

    SHA256

    78a4cc26a6c9a3ca340d66fa98341e8bad39a0d74fab1325acf34f3fcf7daab4

    SHA512

    36b3d17cc1c11ea46573cdda88e313fc865ac0c2e08857d453e86fa32c3b4c359e29be98d4b1485886d8b997f6549def16e3354d05c2407a6bf80227d0e6749e

  • \Windows\SysWOW64\28463\MYGM.exe

    Filesize

    472KB

    MD5

    324154483b20e6f67a3c1486e3fc7c6a

    SHA1

    d6630eb1d8555b48413434b4a5d54c8de819cbf8

    SHA256

    ded1c934280294375d7b926773511e4d5e6c8dbb22b0dd25a80a6b0b3af065d3

    SHA512

    36349f7c53b9989eac63e8c91b7fb009a5a0dce934242ae5956a5e3d3764949a87296adeba81f3da96b5e035f3755b4dd75de2ffa211b7db296313c52f6d478b

  • memory/1840-36-0x0000000077BDF000-0x0000000077BE0000-memory.dmp

    Filesize

    4KB

  • memory/2636-38-0x0000000077BDF000-0x0000000077BE0000-memory.dmp

    Filesize

    4KB

  • memory/2636-40-0x0000000077BDF000-0x0000000077BE0000-memory.dmp

    Filesize

    4KB

  • memory/2636-42-0x0000000000400000-0x000000000044E000-memory.dmp

    Filesize

    312KB

  • memory/3008-21-0x00000000001E0000-0x00000000001E1000-memory.dmp

    Filesize

    4KB

  • memory/3008-41-0x00000000001E0000-0x00000000001E1000-memory.dmp

    Filesize

    4KB