Analysis

  • max time kernel
    121s
  • max time network
    121s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    17-01-2025 13:51

General

  • Target

    JaffaCakes118_8d8d80c3a9d63e91ec24f67c8d6c6b7a.exe

  • Size

    655KB

  • MD5

    8d8d80c3a9d63e91ec24f67c8d6c6b7a

  • SHA1

    823caf0aeee07a2ee519619df24267d5c79fe64e

  • SHA256

    18d51b0cb9e2bb5bf16f08e8caf9e8499d19d11239350a48325a8340d85dd60c

  • SHA512

    a6b467cd8403eee3ee922beff621b9e327d4c29eb78d4f5741a7136a3850c30734749ffd650c213c80c1b58703ce61952d0540c427eb303fe6d7a0918785c7b7

  • SSDEEP

    12288:SsL+/bmnuDBmaIZumD5YBZq6xGJOpqtAnWGgAIb3NEnCztPvnK3STFiY:/LMY6ma25Y+0Gkp0AWG1Imw83OFb

Malware Config

Signatures

  • Ardamax

    A keylogger first seen in 2013.

  • Ardamax family
  • Ardamax main executable 1 IoCs
  • Executes dropped EXE 10 IoCs
  • Loads dropped DLL 20 IoCs
  • Drops file in System32 directory 8 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of WriteProcessMemory 40 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_8d8d80c3a9d63e91ec24f67c8d6c6b7a.exe
    "C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_8d8d80c3a9d63e91ec24f67c8d6c6b7a.exe"
    1⤵
    • Loads dropped DLL
    • Drops file in System32 directory
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:2248
    • \??\c:\windows\SysWOW64\23048\xecm.exe
      2⤵
      • Executes dropped EXE
      PID:2572
    • \??\c:\windows\SysWOW64\23048\xecm.exe
      2⤵
      • Executes dropped EXE
      PID:2340
    • \??\c:\windows\SysWOW64\23048\xecm.exe
      2⤵
      • Executes dropped EXE
      PID:2256
    • \??\c:\windows\SysWOW64\23048\xecm.exe
      2⤵
      • Executes dropped EXE
      PID:2804
    • \??\c:\windows\SysWOW64\23048\xecm.exe
      2⤵
      • Executes dropped EXE
      PID:2800
    • \??\c:\windows\SysWOW64\23048\xecm.exe
      2⤵
      • Executes dropped EXE
      PID:2236
    • \??\c:\windows\SysWOW64\23048\xecm.exe
      2⤵
      • Executes dropped EXE
      PID:2244
    • \??\c:\windows\SysWOW64\23048\xecm.exe
      2⤵
      • Executes dropped EXE
      PID:2620
    • \??\c:\windows\SysWOW64\23048\xecm.exe
      2⤵
      • Executes dropped EXE
      PID:2764
    • \??\c:\windows\SysWOW64\23048\xecm.exe
      2⤵
      • Executes dropped EXE
      PID:2600

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • \Windows\SysWOW64\23048\xecm.exe

    Filesize

    635KB

    MD5

    0da43e121a8d582e6bf615bdb9eb2e91

    SHA1

    d72ac23cddaf1671490e70653221ea8ea4abc453

    SHA256

    114f29c0a374b8c9cbc30c123d1797487a69d58c003147e7ed4deeaafeac9fff

    SHA512

    963d4acc4671149661d729dacd519024786879d67a8116994c2225694dc9e59ab15070334d497b30b5c8e4fcebc9e395a39d2bd0de8ba1b30668da33f2784d87

  • memory/2248-19-0x0000000001CB0000-0x0000000001D8F000-memory.dmp

    Filesize

    892KB

  • memory/2248-95-0x0000000001CB0000-0x0000000001D8F000-memory.dmp

    Filesize

    892KB

  • memory/2248-88-0x0000000001CB0000-0x0000000001D8F000-memory.dmp

    Filesize

    892KB

  • memory/2248-45-0x0000000001CB0000-0x0000000001D8F000-memory.dmp

    Filesize

    892KB

  • memory/2248-59-0x0000000001CB0000-0x0000000001D8F000-memory.dmp

    Filesize

    892KB

  • memory/2248-97-0x0000000000400000-0x0000000000411000-memory.dmp

    Filesize

    68KB