Analysis

  • max time kernel
    149s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    25-01-2025 21:07

General

  • Target

    JaffaCakes118_2fa3f1a88ecb2e4d8870d99c2685e989.exe

  • Size

    1.3MB

  • MD5

    2fa3f1a88ecb2e4d8870d99c2685e989

  • SHA1

    dc04b559f5448fd61318f6530797a54ff1057604

  • SHA256

    3e2b9ac2dab55058fb5f641d3a113eba609590c0fc81712bc5e374c457080f57

  • SHA512

    9d8c5f5d7f4f9cc78b05220305ff40a2bee43f861e1e3863b1e805ad8fae93d3ee42e7411aadd9e9f6b6842ea54a1a8b96f627abcbeb9c15cceec5cd685c4f86

  • SSDEEP

    24576:+XA70YXzVoGGhD4Nx67uPtV/N0ksNxH/2R8j2n9X:+QIYVoNhg8yPak4xH/2qk

Malware Config

Signatures

  • Ardamax

    A keylogger first seen in 2013.

  • Ardamax family
  • Ardamax main executable 1 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Drops file in System32 directory 6 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of SetWindowsHookEx 4 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_2fa3f1a88ecb2e4d8870d99c2685e989.exe
    "C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_2fa3f1a88ecb2e4d8870d99c2685e989.exe"
    1⤵
    • Checks computer location settings
    • Drops file in System32 directory
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:1028
    • C:\Windows\SysWOW64\RDFYBT\YBQ.exe
      "C:\Windows\system32\RDFYBT\YBQ.exe"
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Adds Run key to start application
      • Drops file in System32 directory
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of SetWindowsHookEx
      PID:4060

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\ProgramData\jI82l\PCGWIN32.LI5

    Filesize

    2KB

    MD5

    af1934140fe91f0fa9d94899ad096746

    SHA1

    bb0ad6f8aa3f547e41cb3b0684f93a1bff7e9cb2

    SHA256

    23b6802973ead240d8d1f2f990fdf9c17d02a2e78412234cd189cb66da77ba83

    SHA512

    8490a524ee422456db04ac21d1ee22a61894384decbd21e42470db91ecf7717a84b7a4ad5fbae1f66e96f00adb1a84f26d40d154411e57d8b03a47fedf50b664

  • C:\Windows\SysWOW64\RDFYBT\AKV.exe

    Filesize

    490KB

    MD5

    64a6cc55dc76d26448c30a8a1885f7cb

    SHA1

    149e467026647e080b4c69ab4f99b2d3c2b4dbe4

    SHA256

    5cbc0ec73c901be4ac182e13f6869f6f8cf0831b9603e542a3919f6a06087640

    SHA512

    de8cd7bea8113871ce8a36966fbaefd02b8ef7b09a8cbb631b4ac353bdf65b27d5630146ed700fd6edbc4276f4368ebad76b772d9b84349ddc2bd6f7127c377d

  • C:\Windows\SysWOW64\RDFYBT\YBQ.001

    Filesize

    61KB

    MD5

    bf311791d2f9ea9c82a8d4764a98c0d8

    SHA1

    405ba2bd110590abd0bf340d12e054405afb011f

    SHA256

    d720cf3d297743da7ab1da528f4c086a29d59ef553e1a96569b49a59831d583b

    SHA512

    8be092f068807767b0065de10f9da386b90d8e587356881ba3391380b953b199e818b527e74b305d7c714fc94cb6f8e66c76d89d1785fa9910aa4cb39c5cada8

  • C:\Windows\SysWOW64\RDFYBT\YBQ.002

    Filesize

    44KB

    MD5

    ce365878123962c3438e349621c10198

    SHA1

    5b861d9fc2923c61ef390a0b729a21078aa5fd59

    SHA256

    ba254f6675490a045d4c85a5f46681c175c1321692c20fc808c7c244173dd63f

    SHA512

    efc6f143d5e9244a6635562d7e9a9cea22ab7e7b304e933642a51d66da896e9038208b86c12f6da623a01b9175e73eeb40ab600e6625db3595144bfca1231a76

  • C:\Windows\SysWOW64\RDFYBT\YBQ.004

    Filesize

    1KB

    MD5

    33a71fbe4829d24bb0aea096d64550c6

    SHA1

    66deaacca7e6ddc0d4bfc72abff74061f04a494f

    SHA256

    65b0d59180c1575b97b1ce8342b18df6b9bb277a4286568dfedd2a93c4727e05

    SHA512

    e1f2ba8f883eab0e16758f819839bd3b92252f399567d4fcf61a45658cbe936625b869c79091a5e249d965c3159153030fbf016ec5cefb0afb43410dd7866885

  • C:\Windows\SysWOW64\RDFYBT\YBQ.exe

    Filesize

    1.7MB

    MD5

    8f7590bbba70748e69612e9e2d5a9f2e

    SHA1

    f3ad9834bc38f33fe501b9076c65ac29d0410578

    SHA256

    2dec3a8fb4a5b198335e7f4a9b611194b0a081abf0c56f9df3f4e2697e69d9e4

    SHA512

    347e9ac793afd627e064ecdfea61c3e2b626ace0ea41928aad93a72567048b8e9bdf773f8a4a59a0d96ce8c08612c542c15982e8051828bef025fea6132838c6

  • memory/1028-0-0x00000000006C0000-0x000000000080F000-memory.dmp

    Filesize

    1.3MB

  • memory/1028-23-0x00000000006C0000-0x000000000080F000-memory.dmp

    Filesize

    1.3MB

  • memory/4060-29-0x0000000000720000-0x0000000000721000-memory.dmp

    Filesize

    4KB

  • memory/4060-31-0x0000000000720000-0x0000000000721000-memory.dmp

    Filesize

    4KB

  • memory/4060-32-0x0000000074050000-0x0000000074089000-memory.dmp

    Filesize

    228KB

  • memory/4060-33-0x0000000074050000-0x0000000074089000-memory.dmp

    Filesize

    228KB