Analysis

  • max time kernel
    149s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    20-01-2025 07:47

General

  • Target

    JaffaCakes118_e0c4fb2fe31227a5da453bb02a589fba.exe

  • Size

    1.2MB

  • MD5

    e0c4fb2fe31227a5da453bb02a589fba

  • SHA1

    ceacc28e9b878549f6db96cf3dad2949373cc9f6

  • SHA256

    abaa95fa3b6678259ec7df1354fc369794699b8319e37f6d3e5ae19adeac7f6c

  • SHA512

    86924b3af055290859d7d29a402ed13c82400028957988a6af12a1e3601568f2c280836f14f75170116f13414899bf5dca5634665fa4e2bf679e94fcc5179103

  • SSDEEP

    24576:B7mblEFT+c35HxdzEiJFq/5U0cxnG0tiZx3ycyGn/A5sjrVuUxK:BSb1WV3giJFq/qZxnGTxXjrVV

Malware Config

Signatures

  • Ardamax

    A keylogger first seen in 2013.

  • Ardamax family
  • Ardamax main executable 1 IoCs
  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 1 IoCs
  • Uses the VBS compiler for execution 1 TTPs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Drops file in System32 directory 6 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Drops file in Windows directory 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 4 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of SetWindowsHookEx 4 IoCs
  • Suspicious use of WriteProcessMemory 16 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_e0c4fb2fe31227a5da453bb02a589fba.exe
    "C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_e0c4fb2fe31227a5da453bb02a589fba.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of SetThreadContext
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:5004
    • C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe
      C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe
      2⤵
      • Drops file in System32 directory
      • Drops file in Windows directory
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:3948
      • C:\Windows\SysWOW64\JDNQHM\SYM.exe
        "C:\Windows\system32\JDNQHM\SYM.exe"
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Adds Run key to start application
        • Drops file in System32 directory
        • System Location Discovery: System Language Discovery
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of SetWindowsHookEx
        PID:1868
      • C:\Windows\Microsoft.NET\Framework\v2.0.50727\svchost.exe
        "C:\Windows\Microsoft.NET\Framework\v2.0.50727\svchost.exe"
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        PID:368

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Windows\Microsoft.NET\Framework\v2.0.50727\svchost.exe

    Filesize

    14KB

    MD5

    27c6d03bcdb8cfeb96b716f3d8be3e18

    SHA1

    49083ae3725a0488e0a8fbbe1335c745f70c4667

    SHA256

    2910ebc692d833d949bfd56059e8106d324a276d5f165f874f3fb1b6c613cdd5

    SHA512

    1ea76bd898f96603f3aec695eb7bedcef8b4e1b27253ecb98035ac5ea42745c0da6b5523f8848cb0e6acb58710d8f2973368763e7b3895fa28d999552c9030d3

  • C:\Windows\SysWOW64\JDNQHM\AKV.exe

    Filesize

    456KB

    MD5

    21f320807b5479ddb03b1981ca2cc54c

    SHA1

    ae0844c40a3d9027ad0d2a29aa9cb2b1f1ac3c8d

    SHA256

    3d99e3eca8974b98db2e9888c658ba8afbbaed54b2b8e2a925024dca1082e700

    SHA512

    0052c3480f8f627988150de7ac7cb7d63114b290b377da7e9c23a99f390d0a722895966a06caf47a3c6f61dc4721fc514e3e7da0c2c765d67312c245cf0ab04d

  • C:\Windows\SysWOW64\JDNQHM\SYM.001

    Filesize

    60KB

    MD5

    62552c56e9c05aa1112bcf92efa946a2

    SHA1

    b5e08769e234723787587e1b3e781ee62e19b579

    SHA256

    5157138cdbf25cdcf3f085412c8be127199c253e425205a57386434a22ead3c6

    SHA512

    18a399b95baf162b0e34f7fa9b41a0d760958b5adf9d92a4b388794a70efd9a497255ef2cf3c25e794596898e4c7fea47088792d641fad0e65dceb1d6dab974f

  • C:\Windows\SysWOW64\JDNQHM\SYM.002

    Filesize

    43KB

    MD5

    3a7c6b1d26ec2d9d7791acb049d59be9

    SHA1

    4b53f01e2ba102a26f17ff4e537ee6a83562618c

    SHA256

    784a603f8ee0550d5d694d8c384d6b70b6b4997c0840259f3483f295778627ea

    SHA512

    f42b42a66822e9e5975252fb7e65634a646e0397aef4e535b7e9d5d7cef9a8dcd651ebced08afd4b26cce58e4f810c18f6fc0c19530c7d0dcb2f57d07cec6ce6

  • C:\Windows\SysWOW64\JDNQHM\SYM.004

    Filesize

    1KB

    MD5

    e0a8f83d6055c4911daece75bc6c5cfe

    SHA1

    f73c47d2b7f13911447a9f5abb5cd43872868530

    SHA256

    1de057a47ddf6b95c6da1d52934d6eb5e80e6e7c557d135470237ebab0a1824c

    SHA512

    fa6b7366c961f773e2105f96adff59641184fbe7c99aed6377ef9a94f7dc93a3bacc4977547eb5f49325e9a3320f65438c45be1d5a256ed06ea46acbbb4ce1d1

  • C:\Windows\SysWOW64\JDNQHM\SYM.exe

    Filesize

    1.7MB

    MD5

    c6245ca8664ba4c0884e9c5dfb5a5ba9

    SHA1

    b10ec86db035936f2a610acd3594c2cfe414d44e

    SHA256

    be34a2223a8294779aa9dbf8fcbf1434c246756711ee259cfd99378d4f5c1049

    SHA512

    177b2935e6918fdd14ec8e59201e269955de6d65d18f36640356bc8942aae54ffaeffa222358edefcbf1e1a1f47798f50c0fb4217919c3b817bfd82bd0d98c14

  • memory/1868-39-0x0000000000400000-0x00000000005B3000-memory.dmp

    Filesize

    1.7MB

  • memory/1868-41-0x0000000000400000-0x00000000005B3000-memory.dmp

    Filesize

    1.7MB

  • memory/3948-12-0x0000000000400000-0x000000000052B000-memory.dmp

    Filesize

    1.2MB

  • memory/3948-3-0x0000000000400000-0x000000000052B000-memory.dmp

    Filesize

    1.2MB

  • memory/3948-4-0x0000000000400000-0x000000000052B000-memory.dmp

    Filesize

    1.2MB

  • memory/3948-5-0x0000000000400000-0x000000000052B000-memory.dmp

    Filesize

    1.2MB

  • memory/3948-30-0x0000000000400000-0x000000000052B000-memory.dmp

    Filesize

    1.2MB

  • memory/5004-2-0x0000000075480000-0x0000000075A31000-memory.dmp

    Filesize

    5.7MB

  • memory/5004-0-0x0000000075482000-0x0000000075483000-memory.dmp

    Filesize

    4KB

  • memory/5004-1-0x0000000075480000-0x0000000075A31000-memory.dmp

    Filesize

    5.7MB

  • memory/5004-34-0x0000000075480000-0x0000000075A31000-memory.dmp

    Filesize

    5.7MB