Analysis

  • max time kernel
    147s
  • max time network
    122s
  • platform
    windows7_x64
  • resource
    win7-20241023-en
  • resource tags

    arch:x64arch:x86image:win7-20241023-enlocale:en-usos:windows7-x64system
  • submitted
    21-01-2025 15:06

General

  • Target

    JaffaCakes118_056ec67070913a1cef384248b4ad205d.exe

  • Size

    910KB

  • MD5

    056ec67070913a1cef384248b4ad205d

  • SHA1

    a5bfaa100e418d01ce4bcb5c304f4b6446a20edd

  • SHA256

    c0a8b6643f150f9880906e506d3d3285fa05b4b4f1d50c0fc3aec91d6f713022

  • SHA512

    23455b2f0e8f0d026e2abf8ed9898d2103be7f97da246838c193962e95d10a607ab8955124eb35d5f3981e554c70b53f61a8787f3a541a9081bb9f6f2637d692

  • SSDEEP

    24576:+7s2mwpbYY3/E9lQlUkhRVWh8SWqP3Uv3uPT:+7bpbYqM9S+IA8E31r

Malware Config

Signatures

  • Ardamax

    A keylogger first seen in 2013.

  • Ardamax family
  • Ardamax main executable 1 IoCs
  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 6 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Drops file in System32 directory 10 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies registry class 29 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_056ec67070913a1cef384248b4ad205d.exe
    "C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_056ec67070913a1cef384248b4ad205d.exe"
    1⤵
    • Loads dropped DLL
    • Drops file in System32 directory
    • System Location Discovery: System Language Discovery
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:472
    • C:\Windows\SysWOW64\HelpMe.exe
      C:\Windows\system32\HelpMe.exe
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Drops file in System32 directory
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:2484
      • C:\Windows\SysWOW64\28463\EHMM.exe
        "C:\Windows\system32\28463\EHMM.exe"
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Adds Run key to start application
        • Drops file in System32 directory
        • System Location Discovery: System Language Discovery
        • Modifies registry class
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of SetWindowsHookEx
        PID:2096

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Windows\SysWOW64\28463\AKV.exe

    Filesize

    457KB

    MD5

    32d387217d894806faf6f8ef1b19edc1

    SHA1

    56a7c7d087886dc6ff4fc6e6afcb1f16a3f7441e

    SHA256

    623f80699931ff51a65c868c8c0b4a7ca0f5e7294aa65e5fc7b8006d144237fa

    SHA512

    8688f01c370b5ea6b7a3a8f810a204dbbeadf4240f900f7844d8f862bfd2115fa3a34999df36ed83bd6958bb8383a5e70f999c984ebe9b86cdb6d4bd81a08197

  • C:\Windows\SysWOW64\28463\EHMM.001

    Filesize

    378B

    MD5

    6e55fdd492efac0dae9babfbeeacbc9c

    SHA1

    5544c3fe4b3435ead0af4e31127213f6413e3a7d

    SHA256

    97aef09d18387edf915a6f3dad1510c1e8a2fce86deb01ef9706df89bb1d3c23

    SHA512

    9d0061622a94221e1cedca80803fac4fbec1fed6140d383a61ee9d1a08dff54e29934e135f4cd5a32c0df4f7907b04b3ddcaa7600607e3d5889738bc08198d3b

  • C:\Windows\SysWOW64\28463\EHMM.007

    Filesize

    5KB

    MD5

    64b9577b7fc43cb891865e5a06a2589d

    SHA1

    3ce4d64477d31bcbac456e711f0263672f4d1fd9

    SHA256

    52949d0ae8c840a41254afa02155cf9b6647ac9df13d6a20cbcab787c42ae01f

    SHA512

    1f16f81674d2e6688243280dbabd50ad958061558e71e9d5425011ab943b4073b01e4181abfcb7c5051d7ef0419900acfb14652f4c3ada564e45178b02c4e4f0

  • C:\Windows\SysWOW64\28463\EHMM.009

    Filesize

    1.5MB

    MD5

    8d53c28aa6151ad7c78a20d391379254

    SHA1

    b72d1d2e57768e0fadaca48f55338b34a0940adc

    SHA256

    d73321de5b0f2cd0733c442df197efd52409d4bc61aeb0c681b336b4eb1e613d

    SHA512

    6810116e9fd9fe015fb03a76f49b6982cf285bfb0a36a0ff729ae12b73d9d99f3c7fd2b5e69a45187142f00ff8b0169d34b80994f792bae2d2e3507cf6b5e7dc

  • C:\Windows\SysWOW64\28463\EHMM.exe

    Filesize

    648KB

    MD5

    4c5175d7b877a344e2b864dbd1d8a0ab

    SHA1

    6d8691610ee3d98293eb9b23db7ad8571267e535

    SHA256

    53660357b82c4db447ae1dc50d23d986235616eae3cfffe95550af8499e601da

    SHA512

    54712d8291d52a315ab3b1fb1802f5e9fe31eaafe4bbaee0071ab6ab7bc85fcf825b4213ce040a31792954e227626dd3fc3c0e8510696e53875a0e80ccf50555

  • C:\Windows\SysWOW64\28463\key.bin

    Filesize

    105B

    MD5

    27c90d4d9b049f4cd00f32ed1d2e5baf

    SHA1

    338a3ea8f1e929d8916ece9b6e91e697eb562550

    SHA256

    172d6f21165fb3ca925e5b000451fd8946920206f7438018c28b158b90cf5ffb

    SHA512

    d73dadb3cf74c647ce5bad5b87d3fb42a212defcba8afb8cf962020b61a0369c0a2b1005797583daf1f1ae88b29b7288bc544a53d643f3519cf604aa0ffd6dae

  • \Users\Admin\AppData\Local\Temp\@B348.tmp

    Filesize

    4KB

    MD5

    d5456446c39c8c55dbd2b96fc3db832c

    SHA1

    29170d2a36967d7221f4be4880b91a7ac39694fa

    SHA256

    954225a0073664a8630c6397073d2a95ddc05fc42c6df67fa9c93cd88a3c250d

    SHA512

    73e2e6a7486f9888086821a80f43dedafb36411327b1fa939b7cf10d79d0edbe3b6e8ffc8653dbf7bd91d9f1891cb0a138966b72435008f551610da7906eb508

  • \Windows\SysWOW64\28463\EHMM.006

    Filesize

    8KB

    MD5

    ba8459868e395dec4cc2885877f2b8f2

    SHA1

    11fd7512269764e97fa5a255d2b48b4a38f9c556

    SHA256

    29e51eb35517943254213cb110d750a39de8767d7b5e2e87e53c88ef360a5e25

    SHA512

    6052a789cba2ad980a45d3cdf2e6da8ada4ead32599610c3c03325f2c986e77561eb6507ef3c84085f93c8149cb126fde06aba916dede73868a799491f16a009

  • \Windows\SysWOW64\HelpMe.exe

    Filesize

    786KB

    MD5

    eab6c4cfb81147c07d07ea5575ad6d69

    SHA1

    ba8973e450a6cc4400adc4f62eaaf16c918244f8

    SHA256

    9af810441a451b48f8faef643e2af7c81770c7487154a0dae64942c5e195892c

    SHA512

    67472d12ad67db87b31b3119138f2e5c42bcf89ac58758a2d2425b9a02181a473dc9b0c11d605e23128435d0d046f2bb9f07c9742bab043609f6446f73882bfe

  • memory/2096-48-0x0000000003100000-0x0000000003101000-memory.dmp

    Filesize

    4KB

  • memory/2096-54-0x0000000003100000-0x0000000003101000-memory.dmp

    Filesize

    4KB

  • memory/2096-39-0x0000000001F70000-0x0000000001F71000-memory.dmp

    Filesize

    4KB

  • memory/2096-40-0x00000000007C0000-0x00000000007C1000-memory.dmp

    Filesize

    4KB

  • memory/2096-41-0x00000000030C0000-0x00000000030C1000-memory.dmp

    Filesize

    4KB

  • memory/2096-42-0x00000000030B0000-0x00000000030B3000-memory.dmp

    Filesize

    12KB

  • memory/2096-43-0x0000000003100000-0x0000000003101000-memory.dmp

    Filesize

    4KB

  • memory/2096-44-0x0000000003100000-0x0000000003101000-memory.dmp

    Filesize

    4KB

  • memory/2096-45-0x0000000003100000-0x0000000003101000-memory.dmp

    Filesize

    4KB

  • memory/2096-46-0x0000000003100000-0x0000000003101000-memory.dmp

    Filesize

    4KB

  • memory/2096-47-0x0000000003100000-0x0000000003101000-memory.dmp

    Filesize

    4KB

  • memory/2096-37-0x0000000001F90000-0x0000000001F91000-memory.dmp

    Filesize

    4KB

  • memory/2096-49-0x0000000003100000-0x0000000003101000-memory.dmp

    Filesize

    4KB

  • memory/2096-50-0x0000000003100000-0x0000000003101000-memory.dmp

    Filesize

    4KB

  • memory/2096-51-0x0000000003100000-0x0000000003101000-memory.dmp

    Filesize

    4KB

  • memory/2096-52-0x0000000003100000-0x0000000003101000-memory.dmp

    Filesize

    4KB

  • memory/2096-53-0x0000000003100000-0x0000000003101000-memory.dmp

    Filesize

    4KB

  • memory/2096-38-0x0000000001FB0000-0x0000000001FB1000-memory.dmp

    Filesize

    4KB

  • memory/2096-55-0x0000000003120000-0x0000000003121000-memory.dmp

    Filesize

    4KB

  • memory/2096-58-0x0000000000250000-0x0000000000251000-memory.dmp

    Filesize

    4KB

  • memory/2096-59-0x0000000003110000-0x0000000003111000-memory.dmp

    Filesize

    4KB

  • memory/2096-56-0x00000000030D0000-0x00000000030D1000-memory.dmp

    Filesize

    4KB

  • memory/2096-57-0x0000000000230000-0x0000000000231000-memory.dmp

    Filesize

    4KB

  • memory/2096-36-0x0000000001FA0000-0x0000000001FA1000-memory.dmp

    Filesize

    4KB

  • memory/2096-35-0x0000000001F50000-0x0000000001F51000-memory.dmp

    Filesize

    4KB

  • memory/2096-33-0x0000000000340000-0x000000000039A000-memory.dmp

    Filesize

    360KB

  • memory/2096-32-0x0000000000400000-0x00000000004DF000-memory.dmp

    Filesize

    892KB

  • memory/2096-67-0x0000000000400000-0x00000000004DF000-memory.dmp

    Filesize

    892KB

  • memory/2096-68-0x0000000000340000-0x000000000039A000-memory.dmp

    Filesize

    360KB

  • memory/2096-71-0x0000000003100000-0x0000000003101000-memory.dmp

    Filesize

    4KB

  • memory/2096-73-0x0000000000400000-0x00000000004DF000-memory.dmp

    Filesize

    892KB

  • memory/2096-82-0x0000000000400000-0x00000000004DF000-memory.dmp

    Filesize

    892KB

  • memory/2484-30-0x0000000002940000-0x0000000002A1F000-memory.dmp

    Filesize

    892KB