Analysis
-
max time kernel
121s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
22/06/2024, 01:34
Static task
static1
Behavioral task
behavioral1
Sample
00ac9dcf883fe827af6250d88e1c417b_JaffaCakes118.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
00ac9dcf883fe827af6250d88e1c417b_JaffaCakes118.exe
Resource
win10v2004-20240226-en
General
-
Target
00ac9dcf883fe827af6250d88e1c417b_JaffaCakes118.exe
-
Size
1.3MB
-
MD5
00ac9dcf883fe827af6250d88e1c417b
-
SHA1
ad65323280c6ab9105baa6dd9f21516228f6b249
-
SHA256
e225f71705ac110dfc382a97317c215882459185dbb558752c2e98ebc4a14c74
-
SHA512
d8fd8c127a2c3a283559822d98c61ba9f153396493b1300f73b3c747e7af8e7a6b48a185a9c9a6ad757072a1a9e0a157d5ffc995f68a0912c49d07edda92b1d1
-
SSDEEP
24576:FVaUTq64vUmx3CYfhbkF2dhBInNBnpCYK/6Ah4QPh/ajdHfxCD:FVrTwvUQcm2jpaSA7GN2
Malware Config
Signatures
-
Ardamax main executable 1 IoCs
resource yara_rule behavioral1/files/0x0007000000016d45-6.dat family_ardamax -
Executes dropped EXE 1 IoCs
pid Process 1708 RMC.exe -
Loads dropped DLL 2 IoCs
pid Process 1116 00ac9dcf883fe827af6250d88e1c417b_JaffaCakes118.exe 1708 RMC.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\RMC Start = "C:\\Windows\\SysWOW64\\KPLWPO\\RMC.exe" RMC.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Drops file in System32 directory 6 IoCs
description ioc Process File created C:\Windows\SysWOW64\KPLWPO\RMC.004 00ac9dcf883fe827af6250d88e1c417b_JaffaCakes118.exe File created C:\Windows\SysWOW64\KPLWPO\RMC.001 00ac9dcf883fe827af6250d88e1c417b_JaffaCakes118.exe File created C:\Windows\SysWOW64\KPLWPO\RMC.002 00ac9dcf883fe827af6250d88e1c417b_JaffaCakes118.exe File created C:\Windows\SysWOW64\KPLWPO\AKV.exe 00ac9dcf883fe827af6250d88e1c417b_JaffaCakes118.exe File created C:\Windows\SysWOW64\KPLWPO\RMC.exe 00ac9dcf883fe827af6250d88e1c417b_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\KPLWPO\ RMC.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: 33 1708 RMC.exe Token: SeIncBasePriorityPrivilege 1708 RMC.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
pid Process 1708 RMC.exe 1708 RMC.exe 1708 RMC.exe 1708 RMC.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1116 wrote to memory of 1708 1116 00ac9dcf883fe827af6250d88e1c417b_JaffaCakes118.exe 28 PID 1116 wrote to memory of 1708 1116 00ac9dcf883fe827af6250d88e1c417b_JaffaCakes118.exe 28 PID 1116 wrote to memory of 1708 1116 00ac9dcf883fe827af6250d88e1c417b_JaffaCakes118.exe 28 PID 1116 wrote to memory of 1708 1116 00ac9dcf883fe827af6250d88e1c417b_JaffaCakes118.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\00ac9dcf883fe827af6250d88e1c417b_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\00ac9dcf883fe827af6250d88e1c417b_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:1116 -
C:\Windows\SysWOW64\KPLWPO\RMC.exe"C:\Windows\system32\KPLWPO\RMC.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Drops file in System32 directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:1708
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
456KB
MD5924cfca73fb9033f078a0f0621456f3a
SHA121c1edeac0a21fa9676362915a63856e7cb59b1a
SHA2567b62f4292c1324c6aa08b8da79d19440f47e2da72e2caa8fab6c93b0c4296aba
SHA51224bf43cf465d9bd6a011c8f8f8cf59b8d26b35406f36ae6dda5ed1e6094f5c2b6a83d0c992be7d6d5129c5e9f3d077dabfee847dad56a883a96d503f5a7ae06b
-
Filesize
60KB
MD5c9cec63855b65f0d823ac0db81864517
SHA103e0c57d0f093ccd1b06ea5f07a127a0eb2587cb
SHA256c69bfea6d64eef6169eecfaa3b576c9cb48f8fed190487f9051eeb5b3785af6f
SHA512df8b021329ae4bdc04c72da289a0cb5c95b90e5a51e048dbb4dbb9a38fbcf4718ba249480dd0920cfb84d4141c97d2c7bbf9bcfef8906d83a8812d5fb376fa9e
-
Filesize
43KB
MD5d718a21bcd75d95744395d6dcf2ef9f2
SHA1c2e3751640138c3ef8a137038ca6578838fa9073
SHA2569d344f12d5aff2bf16090d875317075f6cc57fac95418d7b7469e51d6b363406
SHA512f50267c1db72ecdb5a14bb5c97b2420fdc9e53295f1b87ce5df241c96d0c8654698e6c0fc9bc9bd6cd4feca2d2be650b422727a018a74565df08345d42065abf
-
Filesize
1KB
MD5029c9ec9b3b17e7329320b181205e3a0
SHA1000381e1ab0798e598a8bd0108a13ffc511a6047
SHA256aac22626ebfe73796c8d9fb7734ade08a680faff896d2393e0b0446fec659b4e
SHA5123cd7f69ede98ab85dd0797971e4a9eceffa8faf838ba70a954df2fcd4d35497bc499ccb7a14d27a17a688c1d9d9a48088d50dab27a662bc9f2fa66352a96d529
-
Filesize
1.7MB
MD5405f59610beaf42b02989637f07cb34a
SHA1e43ed23cdf65da7f184daa6ce3ba8ad1f743c6e6
SHA2563115b43b33937f05243b3470c917c47d2f79e01ca1bead3e0b150018b4be2b57
SHA512fcb5206da936d76125806b36c4cea8909902fc1b3c85a23b5d22955d8c3ccc0a27f5f5da49f91015582b5b16e2614d9e129540c0cc6056614212079e0a84b814