Analysis

  • max time kernel
    141s
  • max time network
    122s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    24-01-2025 10:08

General

  • Target

    JaffaCakes118_2059c65030633b3301b4b20f50e53204.exe

  • Size

    525KB

  • MD5

    2059c65030633b3301b4b20f50e53204

  • SHA1

    8968aa3cf84576bc9510a643592575f44fcf183a

  • SHA256

    f40c7e82c800642a7c69b52f256afe2af65445848ff46a440fd1dd917760cc53

  • SHA512

    8b4c0a8d461e5496276a903cc076536f4d2a32385d0cdbcb26f9ecb3074659a7c6ea00b9337da4afdba16fd27a63fdc78ae1c64788d463a46c9d2aa40300d9a1

  • SSDEEP

    12288:VMtvBNNV4QsSE+lJnkOhcja2drTzdCbveXzaud+yslnQUhclp1QFROQuvCL6:GpBNa2luBXTzdCDyauUyslnQMGp0OQud

Malware Config

Signatures

  • Ardamax

    A keylogger first seen in 2013.

  • Ardamax family
  • Ardamax main executable 1 IoCs
  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 5 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Drops file in System32 directory 5 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_2059c65030633b3301b4b20f50e53204.exe
    "C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_2059c65030633b3301b4b20f50e53204.exe"
    1⤵
    • Loads dropped DLL
    • Drops file in System32 directory
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:1228
    • C:\Windows\SysWOW64\28463\CIII.exe
      "C:\Windows\system32\28463\CIII.exe"
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • System Location Discovery: System Language Discovery
      PID:2864
    • C:\Users\Admin\AppData\Local\Temp\Nuke By Faca.exe
      "C:\Users\Admin\AppData\Local\Temp\Nuke By Faca.exe"
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      PID:2792

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Windows\SysWOW64\28463\AKV.exe

    Filesize

    393KB

    MD5

    1f639ae71bad51bd172c23dbbe7429c0

    SHA1

    dc506ab2b63ba13f47a9cff898f5f5f218579f5a

    SHA256

    e3514b0b03e61fe8930718ecc2de28a449ff65f5cb3b0b1035c2f0f9f0b76cb2

    SHA512

    a348120898877988dfc3c4fad22e7a4c40da2a8043ec4a466f85fd45da25c0305dd87a038a765f258fc346c8aab826ded33544ef75740d81caf89d34b9cedd14

  • C:\Windows\SysWOW64\28463\CIII.001

    Filesize

    400B

    MD5

    7057d98c966f18a1b7ccbe555ba890ef

    SHA1

    b481e97510f5b1602363d2b62f26a7b7ab94f668

    SHA256

    251ba1fa7ebc0cf04944efdb8dc0a6251b3a2c9feec51f5d9f81623982d5c6d6

    SHA512

    2ab34ae4bb29922c2ef7f197895e588f995dfb6444ff43c43ac1a9a8bc99f108899076b6ecec1ee7351e88403d6717d742d4d8b2d222d96c2fea870fc6fcb332

  • C:\Windows\SysWOW64\28463\CIII.006

    Filesize

    7KB

    MD5

    15164d52b6e146554cebef1f0fd791bd

    SHA1

    48c56fc4c44f3842229fd29ef9ef9de7f28589be

    SHA256

    c0af2c2cf134da9055fac5d7f7b3d76d481efd9ae205901869c161738b796def

    SHA512

    0dae51d353beb0328a7a8a178ccedc92a6932702d4be3bd885cb3333735f9e6bf88617bf609490dd07e83e79ba5199e27ea4372c1997d862f861815f68cd0763

  • C:\Windows\SysWOW64\28463\CIII.007

    Filesize

    5KB

    MD5

    0f16c6d06d7a4c7d033020e343808f93

    SHA1

    6b132d1c3b5cb177e1df2e46e25ef4e4f16b5a50

    SHA256

    af580dff694d879ae7e7a48967879f1df411ca6f6a35fd770641c4d735b3f0f4

    SHA512

    85dc481faf6f033e30303cdb2c1381bbb1089e835f47b3f643214b53aaefd12d46bf2e4355bd16433cd3987c2062326ba497c8277b2c180c9951d6dfe66e3fc1

  • \Users\Admin\AppData\Local\Temp\@3F90.tmp

    Filesize

    4KB

    MD5

    89e9c2aa0adebd97c03807e2522f298d

    SHA1

    c64fec9e26dbd34769eb03aa4ccc09b56762c36b

    SHA256

    04805f006a00755b7ba1a82ee85ceb137a7e1f08ebf1b406d257330a3ad24dbb

    SHA512

    4bcf0a5d1c10fc2a9665a73745f9661559a9c476e970c55b5ab891b5173dcba3e985408a17c0f7aed3a7c38f18ab977769df3ce4249fb25ed30d860a4cc4c45f

  • \Users\Admin\AppData\Local\Temp\Nuke By Faca.exe

    Filesize

    109KB

    MD5

    7d26e5a8b7563120207a0429a4672556

    SHA1

    6fca914b023d2533275acd3dbd18289a2dce7797

    SHA256

    cd0d9da7bd0a4384a974b30b9b189c5c8be26056a69c90254074dd29d3a8ccc5

    SHA512

    58bc64dd1f6733016e3a9ba8ad42136ab950f3bd3e665cb067eff766b04bf753595addc7ef4e68b29cc756b3da5a1733e54dc82f808a532bfcb8e7ae172ec2e7

  • \Windows\SysWOW64\28463\CIII.exe

    Filesize

    472KB

    MD5

    6bba92647895e6060cc561c1fc90332f

    SHA1

    4a7a8260c47c7e9080c63ace8984abedd0d7a60e

    SHA256

    7063fdd12e083e24ebe80809fa14c4e3250ff306ad59f02dce9f892bacf8f84b

    SHA512

    503b8b5cbdfaa42ea8e73aabe9a70643eb18cce4ae0b051751980e444220f391f5fd866ebb4703834bf05b6b78434a90099ee47b7da54d0a300e026295cb8c6d

  • memory/2792-34-0x0000000000400000-0x0000000000425000-memory.dmp

    Filesize

    148KB

  • memory/2864-33-0x0000000000230000-0x0000000000231000-memory.dmp

    Filesize

    4KB