Analysis

  • max time kernel
    141s
  • max time network
    128s
  • platform
    windows7_x64
  • resource
    win7-20241023-en
  • resource tags

    arch:x64arch:x86image:win7-20241023-enlocale:en-usos:windows7-x64system
  • submitted
    16/03/2025, 02:31

General

  • Target

    JaffaCakes118_788e554c0938109f4ec5cb40af7bd228.exe

  • Size

    600KB

  • MD5

    788e554c0938109f4ec5cb40af7bd228

  • SHA1

    62709ae17f8bdc45d5afae2fee3b954aed9005a0

  • SHA256

    91c0ed616170401a29cd6fa0a59d0aede1d39d38ed1ce8485a6e6f5789da6454

  • SHA512

    93670d12a873650f94d5d55e09f51ceab2db50e18d1a217a4a0e938cc786cbaed1b534ee55bf92c95d46c45b6a226d37608aa6d820caa814b592f88a8c1ab027

  • SSDEEP

    12288:fRhzupXfGlLO5MKsTDqtOotOBuI9NxpyLnZg:Zhz+ulKJS2PtmuSNxULZ

Malware Config

Extracted

Credentials

  • Protocol:
    ftp
  • Host:
    ftp.drivehq.com
  • Port:
    21
  • Username:
    cet90

Signatures

  • Ardamax

    A keylogger first seen in 2013.

  • Ardamax family
  • Ardamax main executable 1 IoCs
  • Executes dropped EXE 3 IoCs
  • Loads dropped DLL 9 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Drops file in System32 directory 8 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies registry class 32 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of SetWindowsHookEx 5 IoCs
  • Suspicious use of WriteProcessMemory 20 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_788e554c0938109f4ec5cb40af7bd228.exe
    "C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_788e554c0938109f4ec5cb40af7bd228.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2408
    • C:\Windows\system32\cmd.exe
      cmd /c ""C:\Users\Admin\AppData\Local\Temp\run.bat" "
      2⤵
        PID:1640
      • C:\Users\Admin\AppData\Local\Temp\ardamax.EXE
        "C:\Users\Admin\AppData\Local\Temp\ardamax.EXE"
        2⤵
        • Executes dropped EXE
        • Suspicious use of WriteProcessMemory
        PID:1484
        • C:\Users\Admin\AppData\Local\Temp\Install.exe
          "C:\Users\Admin\AppData\Local\Temp\Install.exe"
          3⤵
          • Executes dropped EXE
          • Loads dropped DLL
          • Drops file in System32 directory
          • System Location Discovery: System Language Discovery
          • Suspicious use of WriteProcessMemory
          PID:2200
          • C:\Windows\SysWOW64\28463\RKYT.exe
            "C:\Windows\system32\28463\RKYT.exe"
            4⤵
            • Executes dropped EXE
            • Loads dropped DLL
            • Adds Run key to start application
            • Drops file in System32 directory
            • System Location Discovery: System Language Discovery
            • Modifies registry class
            • Suspicious use of AdjustPrivilegeToken
            • Suspicious use of SetWindowsHookEx
            PID:2820

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\Install.exe

      Filesize

      566KB

      MD5

      41dc0fc1fff90a9d5d28f64da7f5b4f4

      SHA1

      03fb38cfec8e4cb088c9f2d3edb08afbf5c08f3d

      SHA256

      9c8ad7d35fa160b6254c62c99487e9d846c7da0e7d4900c7c6b707294aed4eaf

      SHA512

      29b816459333dfe4b269ee16eb6f11c622e0b10959f2431a7d14efe3861e24acf546e955736a1554404050bf1adc34abdd25ea178ae3a16c836aa8004db11377

    • C:\Users\Admin\AppData\Local\Temp\ardamax.EXE

      Filesize

      581KB

      MD5

      3a19cabf65e0f578e8bb61e2579017f6

      SHA1

      c12f4dfe9f4082ddd5b321a70a70e2eeeeeaa2eb

      SHA256

      3e26364fc5c4799e494eeab424fa632c4a7a629819e1582dd931fe08f9e43998

      SHA512

      6759f73b0462f6be26051dcbb4e78b8f13f5b3da74145aa0ac9fa05d85d1ae5c626ee4d06bdb99d48b26c772a32dce13cd20be15c3e712e703d47eee795d6f6e

    • C:\Users\Admin\AppData\Local\Temp\run.bat

      Filesize

      23B

      MD5

      234dbc908f632fc9fed55bd63e19e1f5

      SHA1

      39e7adf222e3eff34d33f65bbd56399aaeede7a7

      SHA256

      b110b65a0722a06873690dba696b25dd321365313c6f0e2db908d6544c8c5f98

      SHA512

      b4d32a3da8f1e9bd245303607b59df9eea19cc8776587defbac9384783004b150f2adad49e9ca369e643a64de7b747e276fef9486dd8ee1f3e263bb4e1521493

    • C:\Windows\SysWOW64\28463\RKYT.001

      Filesize

      374B

      MD5

      2e33a26777c1717ee92cc27e6f1c3979

      SHA1

      dbe6ecd86d9887415e7793e22cf5aefd606cfb7e

      SHA256

      035eff176236050769524579965c1781280b61e78278ee45bb1962737bfcab32

      SHA512

      76e6f99566288f4737c2122935bfaf13560406e8400cd372b4f1000d789d7834be5ae2aec0305a5436266945d9546a6dca342923ba1ffabdbe4ddc6a3f6ba342

    • C:\Windows\SysWOW64\28463\RKYT.006

      Filesize

      8KB

      MD5

      31854a50b294dd312eb7fa9eb1c99537

      SHA1

      e0b1682a001e15d0e0e1c1ca732cafb5c80b3160

      SHA256

      2fe2d55aae2deef38a37c9679d74ecf05699d6919760794f69583b43b7fe308c

      SHA512

      0482a4981ba242d4e931bd8b9eb5d606492cffb7609fb69fb349ed19c7a9e36a7e240e5ebe759505d253c5e72fb771612a76419c36fb035987a166569a5111c2

    • C:\Windows\SysWOW64\28463\RKYT.007

      Filesize

      5KB

      MD5

      603451f504bedb28c3a7bae4c89abf24

      SHA1

      cbfe12186b54663f60663c349739c7a49950c44e

      SHA256

      e4d6577ea390274308877284b6d0cd6672aeb0e76c9c9847ac59c0964f050d13

      SHA512

      136e28e288b3ce26b37c82b078a3440e3232c0f874d7d33e8e6fb6eadfd0024b9009448500c716523b81f142fa3bebf7d11f1dd3e8e6143867b06335eb5f9612

    • C:\Windows\SysWOW64\28463\RKYT.009

      Filesize

      929KB

      MD5

      d8003a646c4e4c43456d33e5a4310abe

      SHA1

      833fa3dc9e586890b2ff7343d4f7ec34a1fbcce0

      SHA256

      123233005967cc7657d08dc5de6997a8098c7246cbdeb61fe4b2b25ce5517efb

      SHA512

      5e063f7fbd3fa7f54fe84011332ea1e7ecb84999bbab6b991949dcdd935c48a01aa0beacbff24ab974faafecfe6bc4790adb265cb93d3e00bcb47456044c617b

    • C:\Windows\SysWOW64\28463\key.bin

      Filesize

      106B

      MD5

      639d75ab6799987dff4f0cf79fa70c76

      SHA1

      be2678476d07f78bb81e8813c9ee2bfff7cc7efb

      SHA256

      fc42ab050ffdfed8c8c7aac6d7e4a7cad4696218433f7ca327bcfdf9f318ac98

      SHA512

      4b511d0330d7204af948ce7b15615d745e8d4ea0a73bbece4e00fb23ba2635dd99e4fa54a76236d6f74bdbcdba57d32fd4c36b608d52628e72d11d5ed6f8cde2

    • \Users\Admin\AppData\Local\Temp\@BE50.tmp

      Filesize

      4KB

      MD5

      f1cf9fcbddeadabb738de497ffefdced

      SHA1

      7385a7c87e245da89cc5ef8f9295678c1566f25d

      SHA256

      086083bc73b14286f9c3c29df8b8dc6f014d8b084267fbaeee0af56344d1f779

      SHA512

      3a3b9d279b4c131ef3f358e0163f60ec9e60160a2cc45488adb915fea6642f3df5d35da2ccb6983d790401d237fbc808829f42c42ef958e7a0eac98fc33bb3f6

    • \Windows\SysWOW64\28463\RKYT.exe

      Filesize

      648KB

      MD5

      ce568bcaf7285124f764aff92f5079d4

      SHA1

      886f698e2239cf615f12b503853a5fa28c53aefc

      SHA256

      59d7d6de8a9e2d5535703d22c36888889530fd011d7f71cf034e93e36e7527af

      SHA512

      9f6e3496930cb5dd9c9403acc865bc94f63f64af49a27ffeedbc9d9082d50bff4a7a772bb98d4a2719f0ecae144393de9cc273ba83ae00abe347b0be0d7c9866

    • memory/1484-41-0x000007FEF5EC0000-0x000007FEF685D000-memory.dmp

      Filesize

      9.6MB

    • memory/1484-16-0x000007FEF5EC0000-0x000007FEF685D000-memory.dmp

      Filesize

      9.6MB

    • memory/2200-42-0x0000000002A40000-0x0000000002B1F000-memory.dmp

      Filesize

      892KB

    • memory/2408-49-0x000007FEF5EC0000-0x000007FEF685D000-memory.dmp

      Filesize

      9.6MB

    • memory/2408-0-0x000007FEF617E000-0x000007FEF617F000-memory.dmp

      Filesize

      4KB

    • memory/2408-15-0x000007FEF5EC0000-0x000007FEF685D000-memory.dmp

      Filesize

      9.6MB

    • memory/2820-47-0x0000000000400000-0x00000000004DF000-memory.dmp

      Filesize

      892KB

    • memory/2820-55-0x0000000000400000-0x00000000004DF000-memory.dmp

      Filesize

      892KB

    • memory/2820-62-0x0000000000400000-0x00000000004DF000-memory.dmp

      Filesize

      892KB