Analysis

  • max time kernel
    149s
  • max time network
    130s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    25-01-2025 06:06

General

  • Target

    JaffaCakes118_28d737c36a5928f9905fbcbfc3f176fc.exe

  • Size

    596KB

  • MD5

    28d737c36a5928f9905fbcbfc3f176fc

  • SHA1

    7cadb3cedeaa6141bdd8d00273d5de0097737bbb

  • SHA256

    dd2976c27594b4e40b7dc06e54d8b2f543db95a6afdd7115989aad71b228bf20

  • SHA512

    45668a4cde97e989505ae6616734e9c6b8bd8720e543da3bfc7a08dae40c742ea73f1d660ab63a4eebe8315b42ce55fcdb542ce1b05f5c54273d560cb8c840d6

  • SSDEEP

    12288:F1PFlJSZtV0IpS2NZ+CzNhhd/JF2r10pnbyZa2FnZJS/tyPgdgUJP:PNOZLJpS2BN9R2pZJOtyeP

Malware Config

Signatures

  • Ardamax

    A keylogger first seen in 2013.

  • Ardamax family
  • Ardamax main executable 1 IoCs
  • Executes dropped EXE 7 IoCs
  • Loads dropped DLL 31 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Drops file in System32 directory 11 IoCs
  • Drops file in Windows directory 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 7 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious behavior: SetClipboardViewer 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SendNotifyMessage 64 IoCs
  • Suspicious use of SetWindowsHookEx 15 IoCs
  • Suspicious use of WriteProcessMemory 56 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_28d737c36a5928f9905fbcbfc3f176fc.exe
    "C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_28d737c36a5928f9905fbcbfc3f176fc.exe"
    1⤵
    • Drops file in Windows directory
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:352
    • C:\Windows\ar_install.exe
      "C:\Windows\ar_install.exe"
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Drops file in System32 directory
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:2440
      • C:\Windows\SysWOW64\YOF\UILT.exe
        "C:\Windows\system32\YOF\UILT.exe"
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Adds Run key to start application
        • Drops file in System32 directory
        • System Location Discovery: System Language Discovery
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of SetWindowsHookEx
        PID:1244
      • C:\Users\Admin\AppData\Local\Temp\ctfmon.exe
        "C:\Users\Admin\AppData\Local\Temp\ctfmon.exe"
        3⤵
        • Executes dropped EXE
        PID:2088
    • C:\Windows\inst_ctfmon.exe
      "C:\Windows\inst_ctfmon.exe"
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:2288
      • C:\Users\Admin\AppData\Local\Temp\RarSFX0\rinst.exe
        "C:\Users\Admin\AppData\Local\Temp\RarSFX0\rinst.exe"
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Drops file in System32 directory
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of WriteProcessMemory
        PID:2556
        • C:\Users\Admin\AppData\Local\Temp\RarSFX0\ctfmon.exe
          "C:\Users\Admin\AppData\Local\Temp\RarSFX0\ctfmon.exe"
          4⤵
          • Executes dropped EXE
          PID:2604
        • C:\Windows\SysWOW64\svchots.exe
          C:\Windows\system32\svchots.exe
          4⤵
          • Executes dropped EXE
          • Loads dropped DLL
          • Adds Run key to start application
          • Drops file in System32 directory
          • System Location Discovery: System Language Discovery
          • Suspicious behavior: SetClipboardViewer
          • Suspicious use of FindShellTrayWindow
          • Suspicious use of SendNotifyMessage
          • Suspicious use of SetWindowsHookEx
          • Suspicious use of WriteProcessMemory
          PID:2704
          • C:\Program Files (x86)\Internet Explorer\ielowutil.exe
            "C:\Program Files (x86)\Internet Explorer\ielowutil.exe" -CLSID:{0002DF01-0000-0000-C000-000000000046} about:blank
            5⤵
            • System Location Discovery: System Language Discovery
            PID:3068

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\RarSFX0\inst.dat

    Filesize

    1KB

    MD5

    11ffacd522885e2d4645eb836c9a75e3

    SHA1

    74f5fd02421615d02cda770666191d07e35d5f06

    SHA256

    b970efdf7a35305285a81cb7c93630680e3c4c395da25e13b61aae9a063558c9

    SHA512

    1bf7254d196c6d180b682851a9dc6d4d17ec2e0c13dee319b460d23d13ed61c86c61e00818d8ddbdfb72bfe899c3d5997aeb1aa9691d0b5661cbef9572a32bfd

  • C:\Users\Admin\AppData\Local\Temp\RarSFX0\pk.bin

    Filesize

    7KB

    MD5

    09bb125ba6fefd2094218121b5935572

    SHA1

    fb7d1366c31f87467fd23e25546611cade20fdea

    SHA256

    413aab1542e3b82c47682a826f1fbabb57f67cd6f17a1a9ffbf94fb2608d906c

    SHA512

    beb1d5f36b3d8a4ac4267accefacb20866fca870dd322b6d98f574e2260c65caddf0fc4d7187ef7f163dd06be365edffabf303e9d94badb369e65cfeed8e1282

  • C:\Users\Admin\AppData\Local\Temp\RarSFX0\svchots.exe

    Filesize

    404KB

    MD5

    0c9b3ed8d4103465b06cdbaadb1f0bdc

    SHA1

    ca2ac7aa8fdd6dd00b1baa2b136afc97040cecd4

    SHA256

    18aebca8a04235c238a9d39ccd79c898202e5de7877b22fc80e5dab63eef4951

    SHA512

    b4e786f40144a7f7cfc5b14fa86e1d8264d81838e29af1f87e2e7b2b9b2b4c349b86a477866345a1fa8a5fb7c3480d3141811a2b8ccf8a82e9a6dac66db39673

  • C:\Users\Admin\AppData\Local\Temp\RarSFX0\svchotshk.dll

    Filesize

    21KB

    MD5

    d3a6f7e82f7fa5abfe48a93315eef72a

    SHA1

    8e962ef850bbc78b11ee6db13a632aef2243c1ef

    SHA256

    cf27ac55480fb95cd2a6ccbff8cb86bf264d2d519a1c4bd7686869f8a731abf8

    SHA512

    f5fe80d1c3e250bd6331af12db752b98383ae9fefa5173127c2c0af98c4172e56251b19414d0296302b547c9cafc4034a0a3a64356ff9329988fb1b88870422c

  • C:\Users\Admin\AppData\Local\Temp\ctfmon.exe

    Filesize

    15KB

    MD5

    24232996a38c0b0cf151c2140ae29fc8

    SHA1

    b36d03b56a30187ffc6257459d632a4faac48af2

    SHA256

    d2fed8ccae118f06fd948a4b12445aa8c29a3e7bb5b6fe90970fbc27f426f0b0

    SHA512

    c7b855a664d3359c041c68dffe75c118f9b6cef6c91f150686fb51ad63c1b7daa1b37c0a5de04ec078646f83a2bdea695d7d5e283e651135624208c04dc1cab1

  • C:\Windows\SysWOW64\YOF\UILT.001

    Filesize

    578B

    MD5

    b7663ec1689745f3236ae6dd778d271e

    SHA1

    285043cafe8d36808795d41e838a44fd54ed5c9d

    SHA256

    d168e6b7f7bdf811008a112ac5a5313a8b80af1d0df862e7158c992ea4f8b364

    SHA512

    89ae6a7570fb62906a4af672f5f730acef30f4f66e84fd63963598118bd96e1e0f2f6005a1f3fa7d9934d34e69e3b02405e5e6a7f853b5e0f89a3512a4b9c4d4

  • C:\Windows\SysWOW64\YOF\UILT.006

    Filesize

    8KB

    MD5

    1acf05c81017fb2a272d9c10caeb67f9

    SHA1

    e782df7f04a0146cec392f2200379fc42a4a74ad

    SHA256

    fa5e1d9a2240a678a99a0a11b1d49d6c692bc3ef24a0a1f2cc8f85c1d4e5a894

    SHA512

    c64e5b9c43af483c551b2fd4e143517c79cdef5b4144258f8964695dae3d0e3689194f0be5500369b19d666d0a08b46e15662bc8f1c51e314eee8af54cccb1c3

  • C:\Windows\SysWOW64\YOF\UILT.007

    Filesize

    5KB

    MD5

    1f154a8e3d92b44b66de52ea426c772d

    SHA1

    5cca6e4b88dafa2caae56ad98df6ca4bdabbd92f

    SHA256

    6e08d5b0986bd2f6a9f7a981a6d951b9e6b71616ec894a9a3b40a0c12ceb3b95

    SHA512

    06501a567500a05082d03818d33d49f3bf7afcdd5ea6e68ed37f09ed4fe6a945f2e86ce418a86a98d42d436d4b76ffaef2434642c8f2fb24f2f445797e5e8c55

  • C:\Windows\SysWOW64\pk.bin

    Filesize

    7KB

    MD5

    fd71c9da6e02190d3745888f43fdb36c

    SHA1

    bf21c2caf604e39f42ae9a6a29aad008f7ffe5c7

    SHA256

    3d1c6121696e14149fb74b47c4f17eb7a77baef3a465216fd071a503896f4d5d

    SHA512

    cf8cd13af95126853cc180d317cf49c370ca042d076ce4a9c7326d35f855f5bbd3bb372eb3f8c363b4164855c7f206c3b8b1c241e01d3bad9c8018cfa5f0c0e7

  • C:\Windows\SysWOW64\svchotshk.dll

    Filesize

    21KB

    MD5

    a11068817ba83d7b8c61a5c53c5a72ab

    SHA1

    cf4685ae095d5b1e92062c9d299cf9d250b6bab2

    SHA256

    0ee6154256e55de7d451e729c590f5bbf65479503099c3dfeaa10deac6fe4901

    SHA512

    a5ef2ec37eaf688c1fa926349227d25de1c5568c5630e56f8e5e3104ae6ee45275de8599d33d164cd2fc7c5b5dd853433e4228ff553d83228ae3f925446e9bae

  • C:\Windows\ar_install.exe

    Filesize

    298KB

    MD5

    8b9935e635a508afa6ecc522d2e98f75

    SHA1

    2266b8da85fcf058b345a2d613d1ef9860a0cb52

    SHA256

    9ba7a0b29b1d119cfdedda7d0edb940ae2021ad0996e478b11f3b71b94adf1ca

    SHA512

    405b904aaa882e7887704bd16b8d2146b97ad33534aaf408269721f092c021eb96136841df807f13144b08a04db4c495703971c17dec3ede84e62677d2556e4f

  • C:\Windows\inst_ctfmon.exe

    Filesize

    278KB

    MD5

    82844572ec3f7763ef1dca7881eb6783

    SHA1

    7d7ee81b263da2babcc778beb97a809508a64926

    SHA256

    a65c858866f4e3855e0f16ff4ed907ee61a80c89b2d51b957a8fabd2e3aa206f

    SHA512

    dffb6d237a74252d0c0a43c7f2b71fb2e2e8d44e4b081a5a60dbb9d9d83829abfb41b5825e2e79e8c7b727f02b4e09c43b3ef83ab5f97413d4993263fcd48a90

  • \Users\Admin\AppData\Local\Temp\@B184.tmp

    Filesize

    4KB

    MD5

    0850d0451f7b387627be1d8448d4e8cc

    SHA1

    f7f346dbb9399a5f3c1e783c66bc82b7110d6f32

    SHA256

    d0f4b9b1c98c68a583e99af328f25220072bf99350407f4d8168cc15714ed9e1

    SHA512

    bb403196ff80b8971486d4a71246de4d4e4b1bbea4505940574ce2d375bc1d55a5ba7606bba9d4b726ad3ef3fe89a1ed377d6d984f2f08fa1f938694fb2f6535

  • \Users\Admin\AppData\Local\Temp\RarSFX0\rinst.exe

    Filesize

    22KB

    MD5

    9a00d512f9e1464ad793702cf2b1eda0

    SHA1

    39a47a90cd3dd132dbab9f5052dda38dbd7c63f6

    SHA256

    98d257f639ee9df968f77b1f66c78230d07d86e58a7ddf0d306a24af3873dc5b

    SHA512

    18604f20351db1d418f48f2eb023be07588754b428b5d6abb0a7c40d6bf174ce7dcab2ae6e06f22585e12f1bfdb6e408b17bf20e2a7ba137620002ac04b8b4ba

  • \Windows\SysWOW64\YOF\UILT.exe

    Filesize

    540KB

    MD5

    3fcec6436ceefe496759d5d95a72946d

    SHA1

    90741b60963323ccff6aacc4f9a4e947967f3c65

    SHA256

    e9f4f9a93da9c4977f330450aa485665789b5f0d422ede2e67237c64eb975434

    SHA512

    44c675bc06b036c64f364db3198db29a8affce246006f8d51cd8de45c131de575ded4d5e1aefeeccd8c82d52529a3b312379ea524b7e49d662249a61c71aab06

  • \Windows\SysWOW64\svchots.exe

    Filesize

    404KB

    MD5

    2f5d609d4500a45255b90ce7b8f7d3c0

    SHA1

    085cb5756eb14c645b190da6d86c9689f0143b7b

    SHA256

    3afba7546ef28d94b4ec8842f390d9a91e550b739e4c90927f7887903fc34cf5

    SHA512

    87c482bfa3aafff1e9cb5f52aeeb95e6af4053ffb3eb0240ff9d5336e19720c7b4dd983af2a2847cc61520cac9b4fc7f25a720329164c33d69fc0958b2d3dcff

  • memory/352-11-0x0000000000400000-0x000000000049C000-memory.dmp

    Filesize

    624KB

  • memory/2288-112-0x0000000000400000-0x000000000041C000-memory.dmp

    Filesize

    112KB