Analysis

  • max time kernel
    1s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20250207-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20250207-enlocale:en-usos:windows10-2004-x64system
  • submitted
    11-02-2025 07:14

Errors

Reason
Machine shutdown

General

  • Target

    JaffaCakes118_e3d93a8909368d5ea775a67e920eede6.exe

  • Size

    503KB

  • MD5

    e3d93a8909368d5ea775a67e920eede6

  • SHA1

    23460bd7e407318eecfe5e2543e267a28839824d

  • SHA256

    e09ac794e7ef4f2e192e89e4e6d5b4a3389691ddbca65cf5292ebf24e4e54fd5

  • SHA512

    3bda9e65c763f1168edbe8a76621b5228a3175d4dda01db32e46801c15c05dca04521f3e70c86e61e575019228a49287a2ec428525b8b59ef09a80e6892a9a3a

  • SSDEEP

    12288:xm4W304NZIS2Yk1hmxhcpjuxonqWiQaCG9RIlJhy3kDE:E+ECSx007aOUaCG94y3kDE

Malware Config

Signatures

  • Ardamax

    A keylogger first seen in 2013.

  • Ardamax family
  • Ardamax main executable 1 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 4 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Drops file in System32 directory 6 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_e3d93a8909368d5ea775a67e920eede6.exe
    "C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_e3d93a8909368d5ea775a67e920eede6.exe"
    1⤵
    • Checks computer location settings
    • Loads dropped DLL
    • Drops file in System32 directory
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:2408
    • C:\Windows\SysWOW64\28463\DKEQ.exe
      "C:\Windows\system32\28463\DKEQ.exe"
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Adds Run key to start application
      • Drops file in System32 directory
      • System Location Discovery: System Language Discovery
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of SetWindowsHookEx
      PID:4292
    • C:\Users\Admin\AppData\Local\Temp\restart.exe
      "C:\Users\Admin\AppData\Local\Temp\restart.exe"
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of SetWindowsHookEx
      PID:1316

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\@8E36.tmp

    Filesize

    4KB

    MD5

    25530555085337eb644b061f239aa9d4

    SHA1

    8d91e099aba5439d4bfa8bce464c94e3e1acf620

    SHA256

    3fb6b438ad1530abdd068bffb303fb8a4de51430e0e18ddb6b1a0469ffab8325

    SHA512

    b1f9de0c276533a5a7070aeb2b6415cc1c0bdd2baf5e0645c6ac5ba767cab0d76e5b4461800d89724992af2c863294ada3c1eb2e4516183fe2010c33d47d6a2a

  • C:\Users\Admin\AppData\Local\Temp\restart.exe

    Filesize

    16KB

    MD5

    31be79d660fc1da409f1c48a46cbd57b

    SHA1

    904552c6d3d62c2c2897565f3dad5ff5f92a4500

    SHA256

    fed3ccee3bd8ce3a71c10f408fb86a59fc10ea6e70bfc68d4f79bf587c5310c5

    SHA512

    aa6f927bfe90b38e37c7a707fa380b26723a9e384009a2d7f0329ae6b3c97349b0b2703f363c1b699141125582d61c7fa63436bd4d334b2282768b4c8e32723f

  • C:\Windows\SysWOW64\28463\AKV.exe

    Filesize

    395KB

    MD5

    d63cc8679a63448db1c64252e14e4ab5

    SHA1

    10b3a9ac4bc16e8ac1cd05e50b4d540fa3ef223e

    SHA256

    29b3646a556879a4a48e4f2f81e09179c34ac2051ed3e4f4c28e293092470d3d

    SHA512

    cb1911e1a77fb9be560aa4fd8bbef65e181b6d4438d65657501dbcd8dbf488ba01738a7222f35f8d4317e8df8c6f307d9e3623d6e3e45753e138b80fb68ff768

  • C:\Windows\SysWOW64\28463\DKEQ.001

    Filesize

    416B

    MD5

    7e422e0cfd2ce7c895ced377cd1733e4

    SHA1

    3e106ada814a47f82174db72e4e554846447f82e

    SHA256

    a14fa72c4b204b454d910c8775d3af96f4d9d09129a2b921ebcd7e4e99ddb9b4

    SHA512

    3d9bbfb8ed02556120f72f1400881eb39c1543535dca5f0d8b2ebb302a2323ae33820529fb965dcc75529ff9cd4e900326b5d7f30a64aa50ae547f866c92b231

  • C:\Windows\SysWOW64\28463\DKEQ.006

    Filesize

    8KB

    MD5

    43f02e9974b1477c1e6388882f233db0

    SHA1

    f3e27b231193f8d5b2e1b09d05ae3a62795cf339

    SHA256

    3c9e56e51d5a7a1b9aefe853c12a98bf246039aa46db94227ea128f6331782ba

    SHA512

    e22d14735606fe75ee5e55204807c3f5531d3e0c4f63aa4a3b2d4bb6abda6128c7e2816753f2e64400ac6dae8f8ef1e013a7a464dff2a79ad9937c48821a067f

  • C:\Windows\SysWOW64\28463\DKEQ.007

    Filesize

    5KB

    MD5

    e9fbdcc2f5fb657fa519b3f5c69fc52d

    SHA1

    c49cca77b46a59d620711de7564d43e5dafcd2b5

    SHA256

    cc440cfc4ce1a1ff503cc9e8937c59aae64bfce4daa3e7dc757220a25cadc2e4

    SHA512

    913759967e16b99d8ea66433e5dc99d5ddbf737be6784306e67c2b23a525b7a578fcae1028221d3209abc452ff30508eb750c62113c3868a7af36b544e525fb1

  • C:\Windows\SysWOW64\28463\DKEQ.exe

    Filesize

    473KB

    MD5

    17535dddecf8cb1efdba1f1952126547

    SHA1

    a862a9a3eb6c201751be1038537522a5281ea6cb

    SHA256

    1a3d28ac6359e58aa656f4734f9f36b6c09badadcf9fb900b9b118d90c38a9dd

    SHA512

    b4f31b552ab3bb3dafa365aa7a31f58674ae7ee82ce1d23457f2e7047431430b00abb3b5498491725639daf583b526b278a737168cfdc4e9ec796dfbc14a53d8

  • memory/4292-34-0x0000000000A70000-0x0000000000A71000-memory.dmp

    Filesize

    4KB