Analysis
-
max time kernel
143s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
26/06/2024, 17:13
Static task
static1
Behavioral task
behavioral1
Sample
12c4b0ebdebe107787da5a496e42a09d_JaffaCakes118.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
12c4b0ebdebe107787da5a496e42a09d_JaffaCakes118.exe
Resource
win10v2004-20240611-en
General
-
Target
12c4b0ebdebe107787da5a496e42a09d_JaffaCakes118.exe
-
Size
1.3MB
-
MD5
12c4b0ebdebe107787da5a496e42a09d
-
SHA1
c18727cbb1445d976f39cb797da06e24d8f99ade
-
SHA256
64df387c509c8396d6016735bc72cb4a0af2a14d113d9e0b5dcd29fa8f1c2635
-
SHA512
edbf9ceeb72bc75c95fa5396b5dc6ca401ef302b01ff477cac30ddb4696828cde8a03ae5c44946b6117ee39e17255e45e656ff30cef37a56958ec07954ce8cb0
-
SSDEEP
24576:9fYGIKoqH+FKk83Khkp1aX6uUBiYwX84+vXQbOQ7ckuyW4BWJgXUtjQNtYVbHFmV:2GuC+n86KzaXd+MQASeTBXEtMNAblmJ3
Malware Config
Signatures
-
Ardamax main executable 1 IoCs
resource yara_rule behavioral1/files/0x0006000000015d7b-628.dat family_ardamax -
Executes dropped EXE 2 IoCs
pid Process 940 Install.exe 2420 OEK.exe -
Loads dropped DLL 7 IoCs
pid Process 1632 12c4b0ebdebe107787da5a496e42a09d_JaffaCakes118.exe 940 Install.exe 940 Install.exe 2420 OEK.exe 2420 OEK.exe 2420 OEK.exe 2420 OEK.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\OEK Start = "C:\\Windows\\SysWOW64\\YJNWYW\\OEK.exe" OEK.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Drops file in System32 directory 6 IoCs
description ioc Process File created C:\Windows\SysWOW64\YJNWYW\OEK.004 Install.exe File created C:\Windows\SysWOW64\YJNWYW\OEK.001 Install.exe File created C:\Windows\SysWOW64\YJNWYW\OEK.002 Install.exe File created C:\Windows\SysWOW64\YJNWYW\OEK.003 Install.exe File created C:\Windows\SysWOW64\YJNWYW\OEK.exe Install.exe File opened for modification C:\Windows\SysWOW64\YJNWYW\ OEK.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of AdjustPrivilegeToken 10 IoCs
description pid Process Token: 33 1632 12c4b0ebdebe107787da5a496e42a09d_JaffaCakes118.exe Token: SeIncBasePriorityPrivilege 1632 12c4b0ebdebe107787da5a496e42a09d_JaffaCakes118.exe Token: 33 1632 12c4b0ebdebe107787da5a496e42a09d_JaffaCakes118.exe Token: SeIncBasePriorityPrivilege 1632 12c4b0ebdebe107787da5a496e42a09d_JaffaCakes118.exe Token: 33 1632 12c4b0ebdebe107787da5a496e42a09d_JaffaCakes118.exe Token: SeIncBasePriorityPrivilege 1632 12c4b0ebdebe107787da5a496e42a09d_JaffaCakes118.exe Token: 33 940 Install.exe Token: SeIncBasePriorityPrivilege 940 Install.exe Token: 33 2420 OEK.exe Token: SeIncBasePriorityPrivilege 2420 OEK.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
pid Process 2420 OEK.exe 2420 OEK.exe 2420 OEK.exe 2420 OEK.exe -
Suspicious use of WriteProcessMemory 14 IoCs
description pid Process procid_target PID 1632 wrote to memory of 940 1632 12c4b0ebdebe107787da5a496e42a09d_JaffaCakes118.exe 28 PID 1632 wrote to memory of 940 1632 12c4b0ebdebe107787da5a496e42a09d_JaffaCakes118.exe 28 PID 1632 wrote to memory of 940 1632 12c4b0ebdebe107787da5a496e42a09d_JaffaCakes118.exe 28 PID 1632 wrote to memory of 940 1632 12c4b0ebdebe107787da5a496e42a09d_JaffaCakes118.exe 28 PID 1632 wrote to memory of 940 1632 12c4b0ebdebe107787da5a496e42a09d_JaffaCakes118.exe 28 PID 1632 wrote to memory of 940 1632 12c4b0ebdebe107787da5a496e42a09d_JaffaCakes118.exe 28 PID 1632 wrote to memory of 940 1632 12c4b0ebdebe107787da5a496e42a09d_JaffaCakes118.exe 28 PID 940 wrote to memory of 2420 940 Install.exe 29 PID 940 wrote to memory of 2420 940 Install.exe 29 PID 940 wrote to memory of 2420 940 Install.exe 29 PID 940 wrote to memory of 2420 940 Install.exe 29 PID 940 wrote to memory of 2420 940 Install.exe 29 PID 940 wrote to memory of 2420 940 Install.exe 29 PID 940 wrote to memory of 2420 940 Install.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\12c4b0ebdebe107787da5a496e42a09d_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\12c4b0ebdebe107787da5a496e42a09d_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1632 -
C:\Users\Admin\AppData\Local\Xenocode\Sandbox\scnner tools\20.1.11.06\2012.04.13T08.22\Virtual\STUBEXE\@APPDATALOCAL@\Temp\Install.exe"C:\Users\Admin\AppData\Local\Temp\Install.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:940 -
C:\Users\Admin\AppData\Local\Xenocode\Sandbox\scnner tools\20.1.11.06\2012.04.13T08.22\Native\STUBEXE\@SYSTEM@\YJNWYW\OEK.exe"C:\Windows\system32\YJNWYW\OEK.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Drops file in System32 directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:2420
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
61KB
MD5383d5f5d4240d590e7dec3f7312a4ac7
SHA1f6bcade8d37afb80cf52a89b3e84683f4643fbce
SHA2567e87f6817b17a75106d34ce9884c40ddfb381bf8f2013930916498d1df0a6422
SHA512e652c41ec95d653940b869426bc2cbd8e5b3159110ffaab7d623e23eebe1f34ca65be6a9a9cdcd5f41aec7567469d6b4d6362d24ae92267cddb8940e1265806a
-
Filesize
43KB
MD593df156c4bd9d7341f4c4a4847616a69
SHA1c7663b32c3c8e247bc16b51aff87b45484652dc1
SHA256e55b6eabf0f99b90bd4cf3777c25813bded7b6fc5c9955188c8aa5224d299c3e
SHA512ed2e98c5fd1f0d49e5bac8baa515d489c89f8d42772ae05e4b7a32da8f06d511adad27867034ca0865beae9f78223e95c7d0f826154fc663f2fab9bd61e36e35
-
Filesize
65KB
MD5cefd6e9c8a039ab9a7833414dfb03f76
SHA12a026d0514e0119d0fd545a0d2f6deb198806b70
SHA2564d71cf9a598c7babd938c2635a755441da18502118cc3336ae25389510c7d01f
SHA512efcfd6654bf0c45158f43a8c8fd45cc8d40cac227926faa0cd368f1d8012df1bc271f3c7d5db539b1bf282087e533e5a809cf040ac087fcfab58bb320c5a5502
-
Filesize
1KB
MD5e59f589ff947bd8d09d0736bc00110d4
SHA106aa6b80b4e1e3ba99b2101efd61bd305c3d8a99
SHA256c8e5bc6ccb189e350af1de2210e59c216b6c5ef60fbf4ccb397e0f50f17e0df8
SHA512c02d085946c363db7b2fbff663ddbcec5e1669d58b2638b9b23d7c01451fb022099e996cd69f3087768909e6c5b5e1beabae53cff9bc943857e613311c921266
-
Filesize
1.7MB
MD53cd29c0df98a7aeb69a9692843ca3edb
SHA17c86aea093f1979d18901bd1b89a2b02a60ac3e2
SHA2565a37cd66508fa3fc85ae547de3498e709bd45167cb57f5e9b271dc3a1cb71a32
SHA512e78f3206b1878e8db1766d4038a375bbebcbcdb8d1b0a0cb9b0dc72c54881392b9c27e2864ad9118702da58f203f13e0ad5d230980ad1ef2370391a2c4acffc9
-
\Users\Admin\AppData\Local\Xenocode\Sandbox\scnner tools\20.1.11.06\2012.04.13T08.22\Native\STUBEXE\@SYSTEM@\YJNWYW\OEK.exe
Filesize17KB
MD53c69601eda703669caf6e866408f02ca
SHA16c7a9efe6ce4b5ecba79bc52a51ea8feb3a4aacb
SHA256036ae1db34e1964ca5745e3d9bf2028ace023a63362164c6eae3219f0ab5d52b
SHA512fdd3dcfce298b012b0a8264b6935eb0cf1afdb483ad7479dae0ba658084ed22f7405b8d5812bb7db10a211d6885dd287ccb1752875adb0235c6763a6d5fd092c
-
\Users\Admin\AppData\Local\Xenocode\Sandbox\scnner tools\20.1.11.06\2012.04.13T08.22\Virtual\STUBEXE\@APPDATALOCAL@\Temp\Install.exe
Filesize17KB
MD5baeb12380f1f8594f086ea22908fc5b3
SHA1009a8a10d79a1d564963083f6a75c3f4d6532418
SHA2569373d0cf4464f30b170fb65ef617e24b47790a308f76854f73c6f9a5da09eed0
SHA51235d50d277f0adf1fc8459516952866ffa0943c46e255190b67a05d71ea0f56b756cee5bfebf4ce8bb7cb37ed85a0981f492be86d533043393d32fec9747ec73c