Analysis

  • max time kernel
    140s
  • max time network
    119s
  • platform
    windows7_x64
  • resource
    win7-20240729-en
  • resource tags

    arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system
  • submitted
    14-02-2025 09:57

General

  • Target

    JaffaCakes118_f67c64be8bb93db370723315f4ac0a1f.exe

  • Size

    277KB

  • MD5

    f67c64be8bb93db370723315f4ac0a1f

  • SHA1

    6d8dd3d3066841c5d339c92ed5954aa1a682b448

  • SHA256

    dd7cd42fc5c87a3a4f218aad6bd571167aa8d10108f636ec0b4d835f80ccb7b9

  • SHA512

    98e5e7ab18c9fdf80bbc540d1dc0d65970053255e72837533e90c0c7b34eafd677a6f78dd793484b11edcc58354caa0f4f110b430cbf98812a7219ee6bcc7531

  • SSDEEP

    6144:lYQW71WfrbnGYV5HBUk2YvMbxKWPsHSpN8eiSBBmKRAkDc1Pps:lA71IrbGYVhB4Yv+KWrG1T1Bs

Malware Config

Signatures

  • Ardamax

    A keylogger first seen in 2013.

  • Ardamax family
  • Ardamax main executable 1 IoCs
  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 7 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Drops file in System32 directory 4 IoCs
  • Drops file in Windows directory 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 4 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of SetWindowsHookEx 3 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_f67c64be8bb93db370723315f4ac0a1f.exe
    "C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_f67c64be8bb93db370723315f4ac0a1f.exe"
    1⤵
    • Loads dropped DLL
    • Drops file in System32 directory
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:3028
    • C:\Windows\SysWOW64\CKM.exe
      "C:\Windows\system32\CKM.exe"
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Drops file in Windows directory
      • System Location Discovery: System Language Discovery
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of SetWindowsHookEx
      PID:2776
    • C:\Users\Admin\AppData\Local\Temp\gerador.exe
      "C:\Users\Admin\AppData\Local\Temp\gerador.exe"
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:2768
      • C:\Windows\SysWOW64\cmd.exe
        C:\Windows\system32\cmd.exe /c PAUSE
        3⤵
        • System Location Discovery: System Language Discovery
        PID:2596

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\gerador.exe

    Filesize

    465KB

    MD5

    a122e22f41c8c1085689c681b60236fa

    SHA1

    74e3014b096096a410ae7959820e5d6e454c8886

    SHA256

    711f68e1abb0d104139ab76ed8bc585c8dfe48748affd846f2d966d6e28c1f93

    SHA512

    7012ac4981206c684b24d94a9efe067ec13e47901992ec683e7822ec419617aa70d4ebfb705c7b49cbbb3e9d1cd4732c779b2017e37fbdf78151b30bef1ef03d

  • C:\Windows\SysWOW64\CKM.001

    Filesize

    1KB

    MD5

    e6708c4f916c110f33197f1972263a8a

    SHA1

    3a27fa93856fd6348aeb1aa19f1968404534bc79

    SHA256

    9fd8742ab2130bef54ffffce201b190f782a5a7fd4559e651db3c6fa4d5d97a7

    SHA512

    9fcb14ccde9f9016a08fe10097083adaf45aec4b5e44debdbd91785b345e4c571a6ef2d0f792277df4facdc535c241b53ecf0b466f6a32260bd85678026a5298

  • C:\Windows\SysWOW64\CKM.006

    Filesize

    4KB

    MD5

    82dcd329190d327df8cc558ddb7bd796

    SHA1

    60692ef3d251e4be19445f3c37acaabd43e5153a

    SHA256

    88930ac9efc89f62bf2d9c7d967956591fa1f3ee886cabe799c41d252647285d

    SHA512

    76b094cf5baefe39d478445dcd5f3fbaa5ccca80abe9774c5aa9cf852cea5da37d052190968bb6f41cbd9cc6865a6b85492b4a606ac4607ac07c7f14be149d5a

  • C:\Windows\SysWOW64\CKM.007

    Filesize

    6KB

    MD5

    d82e272edfbadabf6f82fc5018ce97fc

    SHA1

    88beb0c2463678910d4c726e1207ec08d7f3b00f

    SHA256

    604434efc6c026f83708a5473aa993775649d69828315b8eafd33b58999292cd

    SHA512

    8663a9900b4ab8912d1aeec930e0a088bb90a46a7c575f62a9f8f7d1dc4bdfec9ffffe9ea71f5d00125b3e113864cffdee4632352d17c36f73d8bc571733231d

  • \Users\Admin\AppData\Local\Temp\@2617.tmp

    Filesize

    4KB

    MD5

    3a64783e94ab53902afd1ce21dc63379

    SHA1

    4933f4cdbd10630f0cf54952251e7d14c3ecd8ee

    SHA256

    ebb2b9682502e81881c647e30575c75d202d6185c7b182003c0eea8717b26dbf

    SHA512

    1178f0288b38b4509fca4fb1693671b2dbe4ca73cddc1679053f6680556c099691f2690c2298ea16285ad94ad8008ee1b5cebae25724d69b7dcb90ba67431e52

  • \Windows\SysWOW64\CKM.exe

    Filesize

    244KB

    MD5

    1cc2de0847d50813932844efcd3eac9c

    SHA1

    78799db1a7e289503fe4160d16c487fb8d45db74

    SHA256

    d2b114a49c9941d0888d0e215f1e1b00949271877d247421c0fa85f8e7c3261b

    SHA512

    b66cb6c931b1d541579f9c4f5ad3ee71b7ef884bf5ede2a77e8120356813f5aab8790cbced26671cc4ba77383196660ac51496a221d80ecb984ed2931c093c1c

  • memory/2768-34-0x0000000000400000-0x0000000000449000-memory.dmp

    Filesize

    292KB

  • memory/2776-32-0x0000000076A41000-0x0000000076A42000-memory.dmp

    Filesize

    4KB

  • memory/2776-33-0x0000000076A40000-0x0000000076A6A000-memory.dmp

    Filesize

    168KB