General

  • Target

    JaffaCakes118_e010c26a87b60d8fd9ac5e7bc869cd4f

  • Size

    1.0MB

  • Sample

    250210-2j89hs1nfw

  • MD5

    e010c26a87b60d8fd9ac5e7bc869cd4f

  • SHA1

    4f8c1d0dcacd250b9896495bacdee24def0793bd

  • SHA256

    de52736171421cc27b1e4ea385ddcb5f5a94fb02a73e68db04b5519ac8387e57

  • SHA512

    3549f1ad33c43b3f23a610b1e24af8597cd1d9817a956c59cb2e08d30a1efe678a887e8d12e1c87681c0dcd9cb1b4b31211d7f43d0231f8f6cd09852948af554

  • SSDEEP

    24576:TJeJfAqkjp98zHpieToHBcJ9nPx/igrp+q:1eJfAJGpL8HsnP8Jq

Malware Config

Targets

    • Target

      JaffaCakes118_e010c26a87b60d8fd9ac5e7bc869cd4f

    • Size

      1.0MB

    • MD5

      e010c26a87b60d8fd9ac5e7bc869cd4f

    • SHA1

      4f8c1d0dcacd250b9896495bacdee24def0793bd

    • SHA256

      de52736171421cc27b1e4ea385ddcb5f5a94fb02a73e68db04b5519ac8387e57

    • SHA512

      3549f1ad33c43b3f23a610b1e24af8597cd1d9817a956c59cb2e08d30a1efe678a887e8d12e1c87681c0dcd9cb1b4b31211d7f43d0231f8f6cd09852948af554

    • SSDEEP

      24576:TJeJfAqkjp98zHpieToHBcJ9nPx/igrp+q:1eJfAJGpL8HsnP8Jq

    • Ardamax

      A keylogger first seen in 2013.

    • Ardamax family

    • Ardamax main executable

    • Modifies WinLogon for persistence

    • Boot or Logon Autostart Execution: Active Setup

      Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.

    • Disables RegEdit via registry modification

    • Disables Task Manager via registry modification

    • Downloads MZ/PE file

    • Event Triggered Execution: Component Object Model Hijacking

      Adversaries may establish persistence by executing malicious content triggered by hijacked references to Component Object Model (COM) objects.

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Installs/modifies Browser Helper Object

      BHOs are DLL modules which act as plugins for Internet Explorer.

    • AutoIT Executable

      AutoIT scripts compiled to PE executables.

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks