Analysis

  • max time kernel
    119s
  • max time network
    120s
  • platform
    windows7_x64
  • resource
    win7-20240708-en
  • resource tags

    arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system
  • submitted
    21-01-2025 10:18

General

  • Target

    JaffaCakes118_03d93bafb2ae535989c49881f2f361cd.exe

  • Size

    291KB

  • MD5

    03d93bafb2ae535989c49881f2f361cd

  • SHA1

    fd450baf1b8f85002ec131dbc751a202ed4b21a5

  • SHA256

    b9f7e35be38d618a7612fdca540a8a76eae5e73ea9d8d17c94e40fbbaf9e04d6

  • SHA512

    0eedff9738ed815c12c2319406b8b65c1ed7843bf466110334357de425f44c0c956ba6c268ba59ca39162ae50949e2c2b2fb3c14ce1c4574daa4893a45c624f0

  • SSDEEP

    6144:zrQ6N34L+7BUXxRTBBZdxPdY62ernqcSF54URZa9MVGVvxNOYIQ:zrQ+4La+XvdB3xPdYujqx5jZa+ovnOYJ

Malware Config

Signatures

  • Ardamax

    A keylogger first seen in 2013.

  • Ardamax family
  • Ardamax main executable 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 5 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Drops file in System32 directory 5 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of SetWindowsHookEx 5 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_03d93bafb2ae535989c49881f2f361cd.exe
    "C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_03d93bafb2ae535989c49881f2f361cd.exe"
    1⤵
    • Loads dropped DLL
    • Drops file in System32 directory
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:2080
    • C:\Windows\SysWOW64\Sys32\QIOU.exe
      "C:\Windows\system32\Sys32\QIOU.exe"
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Adds Run key to start application
      • Drops file in System32 directory
      • System Location Discovery: System Language Discovery
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of SetWindowsHookEx
      PID:2872

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Windows\SysWOW64\Sys32\QIOU.001

    Filesize

    492B

    MD5

    a41d887b866591fcb699c95abdf055a4

    SHA1

    95abca678fa91c9c312f27c330d938c89aef4312

    SHA256

    58a991c248e9fe0532d2fe122fa5dec8ef31f5c5c2f1e043ef2ec30dde33ba56

    SHA512

    89b7a913a3b8c66cb72b322a8bca05684952cdcefa3ca3fa4e038a64f7a92bade4ca265c1c5982a91429ce1584200d29f81e50eed8b85c1ddc4dc48c1c1856a4

  • C:\Windows\SysWOW64\Sys32\QIOU.006

    Filesize

    7KB

    MD5

    a08026db7b86f2ba69f6317a4a66778b

    SHA1

    6afe5979a1ef3ee8b94b6ef4a6bf8a70d641bf62

    SHA256

    90c1300aaa05d24a32f9d01824c611742a10c2bb3e0450504b62282ab658e2f5

    SHA512

    059d6abdb37800f7673d116a0e9a4d2f3e8e7d955a402ef91ca97cf24f3c29121dc36c54599511ac0e04cd2b1467e30fb7b2563e42e2fe43e71560816902207e

  • C:\Windows\SysWOW64\Sys32\QIOU.007

    Filesize

    5KB

    MD5

    49e240cd2e8fe880e177e208aaf8feea

    SHA1

    54e9ee5a7523148542113ee654f00ea13d3ca3d7

    SHA256

    f1b86ba7a2c3aa753966cc67bc5efb4e4badb670b6a0e56ffcfdcbbc379108fc

    SHA512

    e92efd1d0ab3249d6c93b32af0885e22726421055bff36dcf64d307ef2f8aaf2dd06c221342bd5e2a1fadb5d61ac284cd39750cdf1134fd530ba9ff1744d965f

  • \Users\Admin\AppData\Local\Temp\@1FB1.tmp

    Filesize

    4KB

    MD5

    2bbb6ffc878515a79478917c5af03a9c

    SHA1

    52532ea393f3a623c05b2cd72a205da41f152c29

    SHA256

    23c8cc69783ab663e036fb0d15c01b3863ff898d5534fa1d02f16c291863f3a5

    SHA512

    be8846674af43f20501e6fe59fbd369d7393e79970ab1a4fc7c516c491939f575c5e07a1cd284287e8663d1ca2f4e6663839a79f798a7453ecd30bb0fbdcc464

  • \Windows\SysWOW64\Sys32\QIOU.exe

    Filesize

    477KB

    MD5

    db4d88b22f173a37c34477abeea6a789

    SHA1

    11c42d2d445c01a408ad947d48927fe2b370aa8c

    SHA256

    251cd62057ee822ad0139fddadd88945ef0951af715eea17ac5faa4b25e17a55

    SHA512

    67501ecf3b474536c3ae0cf68d49672b108b3b509a229f2a8bd4126e2f67228c93e2bbb78379de7dac3bbff6f7495d1d1aeffebb3fa5f8c7a0e29eaac4bce23e

  • memory/2872-22-0x0000000000250000-0x0000000000251000-memory.dmp

    Filesize

    4KB

  • memory/2872-25-0x0000000000250000-0x0000000000251000-memory.dmp

    Filesize

    4KB