Analysis

  • max time kernel
    0s
  • max time network
    1s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    27/03/2025, 20:42

General

  • Target

    JaffaCakes118_8a083120bb5475d865f1e635dc31e6f3.exe

  • Size

    702KB

  • MD5

    8a083120bb5475d865f1e635dc31e6f3

  • SHA1

    a1f2afc9d95e74ee98d1c8a7bb715f9e8cf85a5c

  • SHA256

    3a13f85fcbb5c8adaf8475b07a55842bb24d6e470b8daeaa3d68d1bc3a566d00

  • SHA512

    1d1459e7da052c5d0c9544757170f4caa087a4070f687fb78ca5bffb22785c08d90c91192b6fdbdaa44bbad531d0ee0f792208b3b7df196bea8b8beeb2284282

  • SSDEEP

    12288:H3TdtLW5WIj1YSSdFxwvBSXyMzBUWb9lx/9AgHLo8OW+rB:XDsj1dEoBcJ9nPx/igrp+

Malware Config

Signatures

  • Ardamax

    A keylogger first seen in 2013.

  • Ardamax family
  • Ardamax main executable 1 IoCs
  • ASPack v2.12-2.42 1 IoCs

    Detects executables packed with ASPack v2.12-2.42

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_8a083120bb5475d865f1e635dc31e6f3.exe
    "C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_8a083120bb5475d865f1e635dc31e6f3.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    PID:3060
    • C:\Windows\SysWOW64\28463\svchost.exe
      C:\Windows\system32\28463\svchost.exe
      2⤵
        PID:1996
      • C:\Windows\SysWOW64\cmd.exe
        C:\Windows\system32\cmd.exe /C AT /delete /yes
        2⤵
          PID:2724

      Network

      MITRE ATT&CK Enterprise v15

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Windows\SysWOW64\28463\svchost.exe

        Filesize

        513KB

        MD5

        0c7a714b8e1d2ead2afc90dcc43bbe18

        SHA1

        66736613f22771f5da5606ed8c80b572b3f5c103

        SHA256

        800bdf00e09f302a17e22d26dffbea037e3c077ef9f6d1d585c114f079397a9e

        SHA512

        35db0de86c168eb6302dcbaa1e1f9ec96b5a8814e7067e1a7bb682e9f35fc06c51148a08e6f7df1e8caeb2effde555c53966a8922e8fef6b7ce194dc81c984b4

      • C:\Windows\SysWOW64\svchost .exe

        Filesize

        702KB

        MD5

        8a083120bb5475d865f1e635dc31e6f3

        SHA1

        a1f2afc9d95e74ee98d1c8a7bb715f9e8cf85a5c

        SHA256

        3a13f85fcbb5c8adaf8475b07a55842bb24d6e470b8daeaa3d68d1bc3a566d00

        SHA512

        1d1459e7da052c5d0c9544757170f4caa087a4070f687fb78ca5bffb22785c08d90c91192b6fdbdaa44bbad531d0ee0f792208b3b7df196bea8b8beeb2284282

      • memory/3060-0-0x0000000000400000-0x0000000000517000-memory.dmp

        Filesize

        1.1MB