Analysis

  • max time kernel
    144s
  • max time network
    146s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20250211-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20250211-enlocale:en-usos:windows10-2004-x64system
  • submitted
    14-02-2025 09:57

General

  • Target

    JaffaCakes118_f67c64be8bb93db370723315f4ac0a1f.exe

  • Size

    277KB

  • MD5

    f67c64be8bb93db370723315f4ac0a1f

  • SHA1

    6d8dd3d3066841c5d339c92ed5954aa1a682b448

  • SHA256

    dd7cd42fc5c87a3a4f218aad6bd571167aa8d10108f636ec0b4d835f80ccb7b9

  • SHA512

    98e5e7ab18c9fdf80bbc540d1dc0d65970053255e72837533e90c0c7b34eafd677a6f78dd793484b11edcc58354caa0f4f110b430cbf98812a7219ee6bcc7531

  • SSDEEP

    6144:lYQW71WfrbnGYV5HBUk2YvMbxKWPsHSpN8eiSBBmKRAkDc1Pps:lA71IrbGYVhB4Yv+KWrG1T1Bs

Malware Config

Signatures

  • Ardamax

    A keylogger first seen in 2013.

  • Ardamax family
  • Ardamax main executable 1 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 4 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Drops file in System32 directory 4 IoCs
  • Drops file in Windows directory 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 6 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 2 IoCs

    Adversaries may check for Internet connectivity on compromised systems.

  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of SetWindowsHookEx 3 IoCs
  • Suspicious use of WriteProcessMemory 9 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_f67c64be8bb93db370723315f4ac0a1f.exe
    "C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_f67c64be8bb93db370723315f4ac0a1f.exe"
    1⤵
    • Checks computer location settings
    • Loads dropped DLL
    • Drops file in System32 directory
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:4268
    • C:\Windows\SysWOW64\CKM.exe
      "C:\Windows\system32\CKM.exe"
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Drops file in Windows directory
      • System Location Discovery: System Language Discovery
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of SetWindowsHookEx
      PID:4860
    • C:\Users\Admin\AppData\Local\Temp\gerador.exe
      "C:\Users\Admin\AppData\Local\Temp\gerador.exe"
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:1828
      • C:\Windows\SysWOW64\cmd.exe
        C:\Windows\system32\cmd.exe /c PAUSE
        3⤵
        • System Location Discovery: System Language Discovery
        PID:4684
  • C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe
    "C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe" /ping 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-PGFwcCBhcHBpZD0iezhBNjlEMzQ1LUQ1NjQtNDYzYy1BRkYxLUE2OUQ5RTUzMEY5Nn0iIHZlcnNpb249IjEyMy4wLjYzMTIuMTIzIiBuZXh0dmVyc2lvbj0iIiBsYW5nPSJlbiIgYnJhbmQ9IkdHTFMiIGNsaWVudD0iIiBpbnN0YWxsYWdlPSIyIiBpbnN0YWxsZGF0ZXRpbWU9IjE3MzkyODM0MTAiIG9vYmVfaW5zdGFsbF90aW1lPSIxMzM4Mzc1NTUzNjg2NzAwMDAiPjxldmVudCBldmVudHR5cGU9IjMxIiBldmVudHJlc3VsdD0iMSIgZXJyb3Jjb2RlPSIwIiBleHRyYWNvZGUxPSIyMTc5ODYyIiBzeXN0ZW1fdXB0aW1lX3RpY2tzPSI1MDA2MDE2NjU0Ii8-PC9hcHA-PC9yZXF1ZXN0Pg
    1⤵
    • System Location Discovery: System Language Discovery
    • System Network Configuration Discovery: Internet Connection Discovery
    PID:856
  • C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe
    "C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe" /ping PD94bWwgdmVyc2lvbj0iMS4wIiBlbmNvZGluZz0iVVRGLTgiPz48cmVxdWVzdCBwcm90b2NvbD0iMy4wIiB1cGRhdGVyPSJPbWFoYSIgdXBkYXRlcnZlcnNpb249IjEuMy4xOTUuNDMiIHNoZWxsX3ZlcnNpb249IjEuMy4xOTUuNDMiIGlzbWFjaGluZT0iMSIgc2Vzc2lvbmlkPSJ7OUQ1NzlDRTMtNzY0Ri00Q0Q0LUFCQTgtRUExOTdBNEFFRkUxfSIgdXNlcmlkPSJ7MTE5RUNBQkMtQTZDQy00RDkxLUI0MDMtQzJBMUFBOTQ4Nzc1fSIgaW5zdGFsbHNvdXJjZT0ic2NoZWR1bGVyIiByZXF1ZXN0aWQ9IntBMTI2NENBNC1CQzNELTQ1MTItQkJFMS0zMzFFMjVFMjBERjJ9IiBkZWR1cD0iY3IiIGRvbWFpbmpvaW5lZD0iMCI-PGh3IGxvZ2ljYWxfY3B1cz0iMiIgcGh5c21lbW9yeT0iNCIgZGlza190eXBlPSIyIiBzc2U9IjEiIHNzZTI9IjEiIHNzZTM9IjEiIHNzc2UzPSIxIiBzc2U0MT0iMSIgc3NlNDI9IjEiIGF2eD0iMSIvPjxvcyBwbGF0Zm9ybT0id2luIiB2ZXJzaW9uPSIxMC4wLjE5MDQxLjEyODgiIHNwPSIiIGFyY2g9Ing2NCIgcHJvZHVjdF90eXBlPSI0OCIgaXNfd2lwPSIwIiBpc19pbl9sb2NrZG93bl9tb2RlPSIwIi8-PG9lbSBwcm9kdWN0X21hbnVmYWN0dXJlcj0iIiBwcm9kdWN0X25hbWU9IiIvPjxleHAgZXRhZz0iJnF1b3Q7VlBRb1AxRitmcTE1d1J6aDFrUEw0UE1wV2g4T1JNQjVpenZyT0MvY2hqUT0mcXVvdDsiLz48YXBwIGFwcGlkPSJ7RjNDNEZFMDAtRUZENS00MDNCLTk1NjktMzk4QTIwRjFCQTRBfSIgdmVyc2lvbj0iMS4zLjE5NS40MyIgbmV4dHZlcnNpb249IiIgbGFuZz0iIiBicmFuZD0iSU5CWCIgY2xpZW50PSIiIGluc3RhbGxhZ2U9IjIiIGNvaG9ydD0icnJmQDAuMjUiPjx1cGRhdGVjaGVjay8-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-PHVwZGF0ZWNoZWNrLz48cGluZyByPSIzIiByZD0iNjYxNiIgcGluZ19mcmVzaG5lc3M9Ins0OEUyN0MwNi03QUU1LTRBQjItOTlBMi1COTZGQzlBOTg0QTF9Ii8-PC9hcHA-PC9yZXF1ZXN0Pg
    1⤵
    • System Location Discovery: System Language Discovery
    • System Network Configuration Discovery: Internet Connection Discovery
    PID:4144

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\ProgramData\Microsoft\EdgeUpdate\Log\MicrosoftEdgeUpdate.log

    Filesize

    445KB

    MD5

    4ff26cfa3378f388bf33f4593292d92e

    SHA1

    c2f831934308b00f780367462cc2144d1b648ff4

    SHA256

    06891008e476c552d7833ca073078af9bda710cc283418ef084568c4835d60de

    SHA512

    c61dc5f2d93468670c0ef63981c312ab8a29fb7e96a8cf567370d1fe0023dfc67aeb79f01f234d5825f8ce1282f7b7edc5754fa523a5a01c72fa037c3c956605

  • C:\Users\Admin\AppData\Local\Temp\@C4F.tmp

    Filesize

    4KB

    MD5

    3a64783e94ab53902afd1ce21dc63379

    SHA1

    4933f4cdbd10630f0cf54952251e7d14c3ecd8ee

    SHA256

    ebb2b9682502e81881c647e30575c75d202d6185c7b182003c0eea8717b26dbf

    SHA512

    1178f0288b38b4509fca4fb1693671b2dbe4ca73cddc1679053f6680556c099691f2690c2298ea16285ad94ad8008ee1b5cebae25724d69b7dcb90ba67431e52

  • C:\Users\Admin\AppData\Local\Temp\gerador.exe

    Filesize

    465KB

    MD5

    a122e22f41c8c1085689c681b60236fa

    SHA1

    74e3014b096096a410ae7959820e5d6e454c8886

    SHA256

    711f68e1abb0d104139ab76ed8bc585c8dfe48748affd846f2d966d6e28c1f93

    SHA512

    7012ac4981206c684b24d94a9efe067ec13e47901992ec683e7822ec419617aa70d4ebfb705c7b49cbbb3e9d1cd4732c779b2017e37fbdf78151b30bef1ef03d

  • C:\Windows\SysWOW64\CKM.001

    Filesize

    1KB

    MD5

    e6708c4f916c110f33197f1972263a8a

    SHA1

    3a27fa93856fd6348aeb1aa19f1968404534bc79

    SHA256

    9fd8742ab2130bef54ffffce201b190f782a5a7fd4559e651db3c6fa4d5d97a7

    SHA512

    9fcb14ccde9f9016a08fe10097083adaf45aec4b5e44debdbd91785b345e4c571a6ef2d0f792277df4facdc535c241b53ecf0b466f6a32260bd85678026a5298

  • C:\Windows\SysWOW64\CKM.006

    Filesize

    4KB

    MD5

    82dcd329190d327df8cc558ddb7bd796

    SHA1

    60692ef3d251e4be19445f3c37acaabd43e5153a

    SHA256

    88930ac9efc89f62bf2d9c7d967956591fa1f3ee886cabe799c41d252647285d

    SHA512

    76b094cf5baefe39d478445dcd5f3fbaa5ccca80abe9774c5aa9cf852cea5da37d052190968bb6f41cbd9cc6865a6b85492b4a606ac4607ac07c7f14be149d5a

  • C:\Windows\SysWOW64\CKM.007

    Filesize

    6KB

    MD5

    d82e272edfbadabf6f82fc5018ce97fc

    SHA1

    88beb0c2463678910d4c726e1207ec08d7f3b00f

    SHA256

    604434efc6c026f83708a5473aa993775649d69828315b8eafd33b58999292cd

    SHA512

    8663a9900b4ab8912d1aeec930e0a088bb90a46a7c575f62a9f8f7d1dc4bdfec9ffffe9ea71f5d00125b3e113864cffdee4632352d17c36f73d8bc571733231d

  • C:\Windows\SysWOW64\CKM.exe

    Filesize

    244KB

    MD5

    1cc2de0847d50813932844efcd3eac9c

    SHA1

    78799db1a7e289503fe4160d16c487fb8d45db74

    SHA256

    d2b114a49c9941d0888d0e215f1e1b00949271877d247421c0fa85f8e7c3261b

    SHA512

    b66cb6c931b1d541579f9c4f5ad3ee71b7ef884bf5ede2a77e8120356813f5aab8790cbced26671cc4ba77383196660ac51496a221d80ecb984ed2931c093c1c

  • memory/1828-33-0x0000000000400000-0x0000000000449000-memory.dmp

    Filesize

    292KB