Analysis
-
max time kernel
141s -
max time network
94s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
04/07/2024, 09:30
Static task
static1
Behavioral task
behavioral1
Sample
25739f4366e73e0c5f3fb31e8a14feec_JaffaCakes118.exe
Resource
win7-20240611-en
Behavioral task
behavioral2
Sample
25739f4366e73e0c5f3fb31e8a14feec_JaffaCakes118.exe
Resource
win10v2004-20240508-en
General
-
Target
25739f4366e73e0c5f3fb31e8a14feec_JaffaCakes118.exe
-
Size
2.6MB
-
MD5
25739f4366e73e0c5f3fb31e8a14feec
-
SHA1
c191ae8c4225899acdcb5f25b423c71df7bdeaac
-
SHA256
f7087b3bcd630098e4978b1c964d53dcbfe146d19f99c4c71a698722c009b299
-
SHA512
a02d4d4163ec6bff350685f021faead19b63acfe21db22a526e9f7b4cd69613c4bee28d1ddef160fda5fe408ea7594b8bf57e90aa35062cdd9fd1641515c8539
-
SSDEEP
49152:3aPQbgW0hZA6ZiTZ4FE/ZHx1qZ4lC37ovKnMkIzTIxCYWWyDMiIwGqs:TbniOt/MF4KKXMCNDMi8
Malware Config
Signatures
-
Ardamax main executable 1 IoCs
resource yara_rule behavioral2/files/0x000700000002341e-27.dat family_ardamax -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2804150937-2146708401-419095071-1000\Control Panel\International\Geo\Nation Moja Focia.exe -
Executes dropped EXE 4 IoCs
pid Process 812 setup-4.5.9.exe 960 Moja Focia.exe 232 setup-4.5.9.tmp 4404 RAXD.exe -
Loads dropped DLL 7 IoCs
pid Process 960 Moja Focia.exe 4404 RAXD.exe 4404 RAXD.exe 4404 RAXD.exe 232 setup-4.5.9.tmp 232 setup-4.5.9.tmp 232 setup-4.5.9.tmp -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\RAXD Agent = "C:\\Windows\\SysWOW64\\Sys32\\RAXD.exe" RAXD.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Drops file in System32 directory 8 IoCs
description ioc Process File created C:\Windows\SysWOW64\Sys32\RAXD.009 RAXD.exe File opened for modification C:\Windows\SysWOW64\Sys32\RAXD.009 RAXD.exe File created C:\Windows\SysWOW64\Sys32\RAXD.001 Moja Focia.exe File created C:\Windows\SysWOW64\Sys32\RAXD.006 Moja Focia.exe File created C:\Windows\SysWOW64\Sys32\RAXD.007 Moja Focia.exe File created C:\Windows\SysWOW64\Sys32\RAXD.exe Moja Focia.exe File created C:\Windows\SysWOW64\Sys32\AKV.exe Moja Focia.exe File opened for modification C:\Windows\SysWOW64\Sys32 RAXD.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: 33 4404 RAXD.exe Token: SeIncBasePriorityPrivilege 4404 RAXD.exe -
Suspicious use of SetWindowsHookEx 5 IoCs
pid Process 4404 RAXD.exe 4404 RAXD.exe 4404 RAXD.exe 4404 RAXD.exe 4404 RAXD.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 1348 wrote to memory of 812 1348 25739f4366e73e0c5f3fb31e8a14feec_JaffaCakes118.exe 81 PID 1348 wrote to memory of 812 1348 25739f4366e73e0c5f3fb31e8a14feec_JaffaCakes118.exe 81 PID 1348 wrote to memory of 812 1348 25739f4366e73e0c5f3fb31e8a14feec_JaffaCakes118.exe 81 PID 1348 wrote to memory of 960 1348 25739f4366e73e0c5f3fb31e8a14feec_JaffaCakes118.exe 82 PID 1348 wrote to memory of 960 1348 25739f4366e73e0c5f3fb31e8a14feec_JaffaCakes118.exe 82 PID 1348 wrote to memory of 960 1348 25739f4366e73e0c5f3fb31e8a14feec_JaffaCakes118.exe 82 PID 812 wrote to memory of 232 812 setup-4.5.9.exe 83 PID 812 wrote to memory of 232 812 setup-4.5.9.exe 83 PID 812 wrote to memory of 232 812 setup-4.5.9.exe 83 PID 960 wrote to memory of 4404 960 Moja Focia.exe 84 PID 960 wrote to memory of 4404 960 Moja Focia.exe 84 PID 960 wrote to memory of 4404 960 Moja Focia.exe 84
Processes
-
C:\Users\Admin\AppData\Local\Temp\25739f4366e73e0c5f3fb31e8a14feec_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\25739f4366e73e0c5f3fb31e8a14feec_JaffaCakes118.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:1348 -
C:\Users\Admin\AppData\Local\Temp\setup-4.5.9.exe"C:\Users\Admin\AppData\Local\Temp\setup-4.5.9.exe"2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:812 -
C:\Users\Admin\AppData\Local\Temp\is-UH7N9.tmp\setup-4.5.9.tmp"C:\Users\Admin\AppData\Local\Temp\is-UH7N9.tmp\setup-4.5.9.tmp" /SL5="$6011C,1816456,54272,C:\Users\Admin\AppData\Local\Temp\setup-4.5.9.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
PID:232
-
-
-
C:\Users\Admin\AppData\Local\Temp\Moja Focia.exe"C:\Users\Admin\AppData\Local\Temp\Moja Focia.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:960 -
C:\Windows\SysWOW64\Sys32\RAXD.exe"C:\Windows\system32\Sys32\RAXD.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Drops file in System32 directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:4404
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
4KB
MD533303ca8abef9221cb410b8a232e9fe4
SHA10cdfc25dbf0e9ad7d4585cd9037dc2e6604be00c
SHA2565110301dee966f0f26307ab1b430279d1e4999c2c4a0ea924ff32f1a9ded869a
SHA512da29821045773ba776def985966b62e09e69bb5bf1786b16c2fff6feb68a03b9e22c5f7d081e3dd58d1785cd7ac64736497c043b7cf6c7149c3a54f8ef111800
-
Filesize
519KB
MD583e53c4f04f4d1bd2909386f18edee05
SHA10ab9b87896520bce5f202445246a000f9eac45ed
SHA2563a9c75835ac8e813df7679ac942cbac409390cca1da1f00110c8e2335be3b849
SHA512e3d4667502a2a94fb27938872810cd6b738c935abfc50c7b150fb65ec035fb9a1ee239e463d4cbf64f61551ca9344d5c08b0b611aa5a6b3cffa96ceed19850cb
-
Filesize
683KB
MD5ce4e0ff83ac2a3256fd5c220562294a1
SHA172429c43cc4ed0a184a9c7b208902005489ff49a
SHA256130ec61d37b76fa26a4c7ebcf210467c5be3ae2ace7346546c65f093478bb06b
SHA512b375a78ca9b8e30ba665d3934716e5d3ac5737d8cf05a562f59c8b142923e3a79f1c44b55e995bd43fd0a9056a122cbe332d33947f626fa2d5bfb9f2e1824e98
-
Filesize
2.0MB
MD576641925fb1808e61be234c076ee0793
SHA19536eef3b699d52460e9e5261b9f669f87955d0f
SHA256dd0b2a6f679c52c13c70b01aac9102a8e6b6442e208bcc7c2debc3a4de7c9a80
SHA5126c588de91cf02b8eba5567821ad96d82c243dfd2b9e84d348cbe53d6342316655b5365c02aec44ed0eda45943a01828111673664d53936c6d9efdeb6bc8bf6d7
-
Filesize
391KB
MD5869461e168a87283a8782e70f5d5a3a8
SHA1ab189b5f2682ae66162226b4f646b1e80486c653
SHA256992cb5ea845b2d24c02f4e40873bf4ebd7b58b57ae2e001907228af4879e575b
SHA512e4e77e07eb0ef2adb6d5ebdb9629f4632c417cf3d1a22e4c414b806bfbd259df13f6c88265f9346ed2b22bf67eb3d63924d86767c8508be4abdc9067f15a82ae
-
Filesize
450B
MD53ba31e7c390f9227cd882ea667d21eb1
SHA13583fae57cea336609015ec6d19da7498063fb19
SHA2564d5cf2f088085e33b72ee9b23cf4658b1ed5360baadbb887368673668e7be9c8
SHA512c731a80169c7bc1cdac4a30f27ee497d50dcf12656cb6e36308d07495142bd9821b2f36f1db96306525c337d5624dedd598603538eb7cb2743e8b782733b9add
-
Filesize
7KB
MD5928cc65dc793834c709a054ca57c19c8
SHA1a1e5d8407199c1bd6a4b274044de640fe0d9e99b
SHA256e3473d81a02ed30e4236591384136f41f17b6a4aae24b5468789644ccd4bf192
SHA512f7c8f7a75c4f8a418630e2ac15676740a902449d9a3c4baf3184409f8701c9caa3e82304d141362d95503f1af6b693eed7b77f690d92ca0162f7ea3ecbc80fdf
-
Filesize
5KB
MD53e1f5d5a06cf97b0495b8d129fbe02e4
SHA1b0de258a813f5edde85004f6865b6ed91f6d6f8f
SHA256f49448fc7c567e64eaeb9cc4dbd3c8021a82b5d9df0a622a439f7b42dc2f26d7
SHA512b0e0b81cb5776d298e96346aa61027c9799a47191c94de50be2209c32747774959d002ddeb98fd15556ee893b0d7bd1f0c8a901469dce4e3acf94e2c4c3e2bfd
-
Filesize
476KB
MD5ef52b540cb404d908338e9cbf7cff283
SHA1778765e1736c0a197685978c3fee7a44e7bde419
SHA25639d8bdb975fbfcbcec8fe63be4e9fe6ce39ae5d23a005118aeffa07b17a3f815
SHA512596b77bf5b15455c326a5a2efd66bc69685eb625e3e211ea0341ad4d8920ada7618a7107e42f2c0963fe6c2d92f2acf47b641ef33071a7c42004e5874d5219a6