Analysis

  • max time kernel
    15s
  • max time network
    16s
  • platform
    windows7_x64
  • resource
    win7-20240729-en
  • resource tags

    arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system
  • submitted
    15/03/2025, 09:42

General

  • Target

    JaffaCakes118_75ff32b8619f2e394ff40329688b7c95.exe

  • Size

    432KB

  • MD5

    75ff32b8619f2e394ff40329688b7c95

  • SHA1

    0f87db7af65a15d2d5ef7dbef7323e17a26d6aef

  • SHA256

    8d271b53cb341792d82dab407d66b5bad41640530bb6e971336987c945d9fddb

  • SHA512

    212dd2434ef74cd26deb171106b0cef3e47bd9415219b4427d74deaeb0aba7811530109c6fb8569e26539f74f149175a2487ee80e13868e908c6970a07f5814c

  • SSDEEP

    12288:NNGWbNLAXpBoiju6TDECey/2/9u8O5urrxBi:BAXpBpu6fEC7Qku5k

Malware Config

Signatures

  • Ardamax

    A keylogger first seen in 2013.

  • Ardamax family
  • Ardamax main executable 1 IoCs
  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 9 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Drops file in System32 directory 5 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of SetWindowsHookEx 5 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_75ff32b8619f2e394ff40329688b7c95.exe
    "C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_75ff32b8619f2e394ff40329688b7c95.exe"
    1⤵
    • Loads dropped DLL
    • Drops file in System32 directory
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:1704
    • C:\Windows\SysWOW64\Sys\Zidcon3.exe
      "C:\Windows\system32\Sys\Zidcon3.exe"
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Drops file in System32 directory
      • System Location Discovery: System Language Discovery
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of SetWindowsHookEx
      PID:612
    • C:\Users\Admin\AppData\Local\Temp\Zidkon 3.0.exe
      "C:\Users\Admin\AppData\Local\Temp\Zidkon 3.0.exe"
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • System Location Discovery: System Language Discovery
      • Suspicious use of SetWindowsHookEx
      PID:2816

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Windows\SysWOW64\Sys\Zidcon3.001

    Filesize

    3KB

    MD5

    a2bd98027af5501cbb0ef76b2acb1758

    SHA1

    19824abe1c1b5d38e9b1de62662c9a4420aaa1ac

    SHA256

    ea27dd8b5dbb0c030b1ab29b8f2b5c5386757c0b0d5e2be2a9a3ac251c008879

    SHA512

    d286202c0c6333429bb21ddb91e57363ac0b288c3930e30cdde17bf3ab43fa3072b18d1602ac963105cfd656f4682b536435711b1e796ad43d31f9493b72b3c0

  • C:\Windows\SysWOW64\Sys\Zidcon3.006

    Filesize

    5KB

    MD5

    81684ae4865ec5f66d24e892b03cdb28

    SHA1

    71e0129317001cbf9fc0876a6ea15886c0caa987

    SHA256

    b036f867ef31023198260a6610a57cc9148a547103b17de934e607aca580eb23

    SHA512

    adac78672fa35ad5aef8afac26c6360f06f98783fc3527c558b6fcadfd6d22b06ef4a8c0f6c076da3b270f83265eb4d20d58fc514932ad3d16554c3fd33f4fec

  • C:\Windows\SysWOW64\Sys\Zidcon3.007

    Filesize

    4KB

    MD5

    ac152720163090f4c0fb7f5c7e1638dc

    SHA1

    4fec3f24e3f9221c7c7cf918d7507586bf0cf48a

    SHA256

    fdc0467059610b4055818e2e499c1ed17705397383a61245917bb93ba0f8e3ef

    SHA512

    d62d827530d421735e95620f57230b1d7376a1055ddfb32d00db8df7764618f442a5166bdb765babf85695b7138ac7c4c71c231e5c745ed7d8113e6394acd301

  • \Users\Admin\AppData\Local\Temp\@A831.tmp

    Filesize

    4KB

    MD5

    fec74da36beb4457716675804f74221c

    SHA1

    1c02ce33852f00dd896b4bb1d93fbba663dd329d

    SHA256

    e47ac7649f18595fbd2281a8cdff82a2b488b8dd56bc1ae88930b521f24b1c89

    SHA512

    64b1d6912b2d6336f2ec7abd240215c842970eece0007afb4c939cf40becb437d6d6708d840035c935d96742918de07b52a96708388cbcda438e8c56d49ede06

  • \Users\Admin\AppData\Local\Temp\Zidkon 3.0.exe

    Filesize

    848KB

    MD5

    5587dd34732050cd7d6f8a35aa13c201

    SHA1

    4d94448ae51b2200fea25a1dbe3f243e998de22c

    SHA256

    c2de5a5350b99ea083dec3664dda7609de0d9241a7f123b254d79279fc4807da

    SHA512

    562034d033c39af596a23edd7bd77207afb94ac869bc272e624f941d7d6e6002b81c9de168d77d60763f6c814113ff6bf6b365989dec1d18b49e7972d70318df

  • \Windows\SysWOW64\Sys\Zidcon3.exe

    Filesize

    459KB

    MD5

    b7a532f4b00925d636882e80f49305a8

    SHA1

    ae88858ea8c3a7ba2ed373cb104ef2152fb44b54

    SHA256

    f417f9088e6c39c418ecf8efbf0038362945788838bd7e67efd89199ada15ccd

    SHA512

    551fe3425b17f29b1c8157b2fdf6c6c0ed15c655bc14e9b73ec38209c55191444762eeef61ae933047079243b9487f92b649f5852b3f22d4bac5d070f523b706

  • memory/612-22-0x0000000000250000-0x0000000000251000-memory.dmp

    Filesize

    4KB

  • memory/612-35-0x0000000077A6F000-0x0000000077A70000-memory.dmp

    Filesize

    4KB

  • memory/612-41-0x0000000000250000-0x0000000000251000-memory.dmp

    Filesize

    4KB

  • memory/2816-37-0x0000000077A6F000-0x0000000077A70000-memory.dmp

    Filesize

    4KB

  • memory/2816-40-0x0000000077A6F000-0x0000000077A70000-memory.dmp

    Filesize

    4KB