Analysis

  • max time kernel
    120s
  • max time network
    140s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20250217-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20250217-enlocale:en-usos:windows10-2004-x64system
  • submitted
    19-02-2025 23:18

General

  • Target

    JaffaCakes118_0845e0f64eebfd48d5e57742118b3e08.exe

  • Size

    1.9MB

  • MD5

    0845e0f64eebfd48d5e57742118b3e08

  • SHA1

    488f70e93a4e1a9cdcd742a242280a7b35e96429

  • SHA256

    3d342c5f65f43779ca2d2d642429f1b5c2092359aa40ea83265b29fd329f52a6

  • SHA512

    2dc90f53822e952c37ceeab359300368b12ebb5e97e69f576f9ff6db7d8ed6fd9aef99dc8b2eafc5f5d8e3a984808994f2398b9958416ff04dc6f514c3f4af83

  • SSDEEP

    24576:aBb5dH/vam1g1285VIqcvtgMoj0nCTJrEu2Yw1Bn3myJGS+ETtXEJocIFUY21/ho:8Fd4I80qHMsHTxu72yGRJyFUYQrau

Malware Config

Signatures

  • Ardamax

    A keylogger first seen in 2013.

  • Ardamax family
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of SetWindowsHookEx 4 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_0845e0f64eebfd48d5e57742118b3e08.exe
    "C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_0845e0f64eebfd48d5e57742118b3e08.exe"
    1⤵
    • Checks computer location settings
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:1448
    • C:\ProgramData\UHXNRW\XRA.exe
      "C:\ProgramData\UHXNRW\XRA.exe"
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Adds Run key to start application
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious behavior: GetForegroundWindowSpam
      • Suspicious use of SetWindowsHookEx
      PID:2104

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\ProgramData\UHXNRW\XRA.00

    Filesize

    2KB

    MD5

    cdea989b1bc72bca9eb54f56ed920cb4

    SHA1

    d4fb2d39c7ef3bb71e80268ce71df567fa0c5c95

    SHA256

    26dece796b2064cb1277cb5310986f721b19b03d48976da83509b85700c9626a

    SHA512

    afe053efb739a3951a0f4f863ff53922916eac29eec15c255e01d26abd23408fe4c95bdace8dac5220dd6e4e201b8c6ac40dc0240eb162ff43f5a590601ae5f3

  • C:\ProgramData\UHXNRW\XRA.01

    Filesize

    79KB

    MD5

    c30084dc88225791e614acb58813f352

    SHA1

    995e5727d7d31646f79d70442b8e259ef5e43773

    SHA256

    b7edd3d1d7e02dc7c02304e77144033415bd09224e7c0752323b72664db90f62

    SHA512

    885cb8646d47ca690964ee51b9bd082ed3822e56ed717898db771e90e3395be51dcb1372e372d7f42f51e0d382c6511184f880ef48be75368261162d10dcafc2

  • C:\ProgramData\UHXNRW\XRA.exe

    Filesize

    2.2MB

    MD5

    dfbf47ddd738d6e5f3c756b642e85b8b

    SHA1

    67804206010d3db50492ef997b97b74382207d69

    SHA256

    2db963666860c66fc4926b27cb807480a291171f6e58a0e73173021de69a6b50

    SHA512

    3edb784e124d2065d1e246a0074e2d9cf4742fef70cd185e005ac2b5f88aa6ecf54753dbdc53c30ddedfa9acd15d67e94b5f7f45dd7b396406e3e09fe95c901c

  • memory/1448-0-0x0000000000871000-0x0000000000872000-memory.dmp

    Filesize

    4KB

  • memory/1448-1-0x0000000000870000-0x0000000000A5B000-memory.dmp

    Filesize

    1.9MB

  • memory/1448-2-0x0000000000870000-0x0000000000A5B000-memory.dmp

    Filesize

    1.9MB

  • memory/1448-14-0x0000000000870000-0x0000000000A5B000-memory.dmp

    Filesize

    1.9MB

  • memory/2104-15-0x0000000000402000-0x0000000000403000-memory.dmp

    Filesize

    4KB

  • memory/2104-18-0x0000000000400000-0x0000000000670000-memory.dmp

    Filesize

    2.4MB

  • memory/2104-22-0x0000000002780000-0x0000000002799000-memory.dmp

    Filesize

    100KB

  • memory/2104-17-0x0000000000400000-0x0000000000670000-memory.dmp

    Filesize

    2.4MB

  • memory/2104-23-0x0000000000400000-0x0000000000670000-memory.dmp

    Filesize

    2.4MB