Analysis

  • max time kernel
    103s
  • max time network
    112s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20250314-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20250314-enlocale:en-usos:windows10-2004-x64system
  • submitted
    15/03/2025, 19:52

General

  • Target

    JaffaCakes118_77b92172dabe93765f41f8c87ce3b22a.exe

  • Size

    1.1MB

  • MD5

    77b92172dabe93765f41f8c87ce3b22a

  • SHA1

    29414bc4808101da5c994572494b0b863dfcc0fc

  • SHA256

    9fb314e4b4e7155a82556cf5102be301d750de3c0615ebe6c4958bc75e2f8f81

  • SHA512

    3061211165f6811498184d8b139fd31af166f62c01caff700058f5370172ad67564339517ca191786cc5b30d6e7622bd0672605b793b13aa6b035b5e49f52ce2

  • SSDEEP

    24576:gHvZTut444No7By3eK1SuNB4F8wIUp49vZ1JQnjVB4u4QWzK:oBTH4/7fK1g89v4jVZ4Dz

Malware Config

Signatures

  • Ardamax

    A keylogger first seen in 2013.

  • Ardamax family
  • Ardamax main executable 1 IoCs
  • Checks computer location settings 2 TTPs 2 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Indicator Removal: File Deletion 1 TTPs

    Adversaries may delete files left behind by the actions of their intrusion activity.

  • Drops file in System32 directory 6 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of SetWindowsHookEx 4 IoCs
  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_77b92172dabe93765f41f8c87ce3b22a.exe
    "C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_77b92172dabe93765f41f8c87ce3b22a.exe"
    1⤵
    • Checks computer location settings
    • Drops file in System32 directory
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:3896
    • C:\Windows\SysWOW64\YPJOWE\KXU.exe
      "C:\Windows\system32\YPJOWE\KXU.exe"
      2⤵
      • Checks computer location settings
      • Executes dropped EXE
      • Loads dropped DLL
      • Adds Run key to start application
      • Drops file in System32 directory
      • System Location Discovery: System Language Discovery
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:404
      • C:\Windows\SysWOW64\cmd.exe
        "C:\Windows\system32\cmd.exe" /c del C:\Windows\SysWOW64\YPJOWE\KXU.exe > nul
        3⤵
        • System Location Discovery: System Language Discovery
        PID:2400

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Windows\SysWOW64\YPJOWE\AKV.exe

    Filesize

    459KB

    MD5

    f6135f1f5ade7c3d98846fa547ec9ba7

    SHA1

    20decec41ddffba52e3e1723b9470e3e07f842f3

    SHA256

    32fd7962c319d55f6393eea1d8776ee7093c702ab020adee140c660ffe031c97

    SHA512

    89ff4488ebf92f03e21581c198a6d8ba505d24fd84b80861cd56f4fa5537d42207a381b9a9f82fae8ba55a48798a497d90d8c77b5657073faa6843671f895213

  • C:\Windows\SysWOW64\YPJOWE\KXU.001

    Filesize

    61KB

    MD5

    ae4f3b79ee0f6d870b899b9bd581823a

    SHA1

    b265f7280d80426f3388e7a72b5aa24ce70bdb18

    SHA256

    cd4f22eaa8324ed0d312a6eada7326c468222b3f6c13d31d001731c9fb5c1350

    SHA512

    55c71d7544c9d4cfd00edbc4b509d1c798d6d8d7f5943d389bfd47535d72f131191b479e3853ababc0a21589d7807e051ebe011f788dbaf9ccae2109c885be35

  • C:\Windows\SysWOW64\YPJOWE\KXU.002

    Filesize

    43KB

    MD5

    76b87d21121078dfba09e62fd15e447b

    SHA1

    3907c708c6fdf441ed18f5985a278d38d2052fae

    SHA256

    86cf96ce72cf3261cad31e7089702f1a449c07f6a00c470c86cfc895da48a903

    SHA512

    40637e5eb23871273b294d0af58217ce48f1507b004a4db9f644bd778d18d61c216cbdc0eaaf28b6e6e80461a9441cfa8a5c507f711750a9d29bf37be44ac5b1

  • C:\Windows\SysWOW64\YPJOWE\KXU.004

    Filesize

    1KB

    MD5

    a9acb130ff21f2e2fdb4e8d273221176

    SHA1

    54a63edb73ff814cc1b0d929a2a683947efe4aa2

    SHA256

    ab803a7e0ebabfaa985ecd70277f5a2525f538a8584fbaa7348ecb07ed3ef39a

    SHA512

    ed7ceb205373e91c1cf4041c82136b0ac2a94a0ea996c258ace36809f7487d2404168d22503db511e3e82943d59c7622a35de45c52b314475df271fc883abd77

  • C:\Windows\SysWOW64\YPJOWE\KXU.exe

    Filesize

    1.5MB

    MD5

    f378a6c579cbb851d72c6b2db3f58b7c

    SHA1

    ccc48fb1fb5da39184f9609a7b0bbf8e51877861

    SHA256

    30dca50b8f1c8d9cecb2630eaa652b8fc5d2be63431cc4e070fdec97dde2810e

    SHA512

    978a4954f993133408338ce7af6aab60775688f1fad16a60e4c332edef13a9b3d587fd0884fd609d5d30dfefa308385d2349615c90f89152877db9bfc631f456

  • memory/404-16-0x0000000000720000-0x0000000000721000-memory.dmp

    Filesize

    4KB

  • memory/404-18-0x0000000000720000-0x0000000000721000-memory.dmp

    Filesize

    4KB