Analysis
-
max time kernel
119s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
05/07/2024, 10:50
Static task
static1
Behavioral task
behavioral1
Sample
26dcfae12f388eb7d9a42fd202d6569d_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
26dcfae12f388eb7d9a42fd202d6569d_JaffaCakes118.exe
Resource
win10v2004-20240704-en
General
-
Target
26dcfae12f388eb7d9a42fd202d6569d_JaffaCakes118.exe
-
Size
1.1MB
-
MD5
26dcfae12f388eb7d9a42fd202d6569d
-
SHA1
2cf3b08b378b5f6d84cb34c8e0a4ed7f0ef7e86c
-
SHA256
cf486d42d09743d634094e6fae43524324e14e21f6f7a08beba498e1c357ac2c
-
SHA512
95c8afd48b5b02a47060117a5f7632f4eb038bef6d4187363c2d3d47d69dab8fda85f4f650a37cef2c56c1314d59d9b924040e5974e67173491e7f99b1ba6558
-
SSDEEP
24576:wHvZTA0s6BlRSmrQZJcfezavPMqYD/tQHCMfAjG61cYHs:4BTbs6TomrQD8e2vE3ii6+GIc
Malware Config
Signatures
-
Ardamax main executable 1 IoCs
resource yara_rule behavioral1/files/0x0007000000016d3a-6.dat family_ardamax -
Executes dropped EXE 1 IoCs
pid Process 2596 ORD.exe -
Loads dropped DLL 2 IoCs
pid Process 2812 26dcfae12f388eb7d9a42fd202d6569d_JaffaCakes118.exe 2596 ORD.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\ORD Start = "C:\\Windows\\SysWOW64\\KXXNQF\\ORD.exe" ORD.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Drops file in System32 directory 6 IoCs
description ioc Process File created C:\Windows\SysWOW64\KXXNQF\ORD.exe 26dcfae12f388eb7d9a42fd202d6569d_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\KXXNQF\ ORD.exe File created C:\Windows\SysWOW64\KXXNQF\ORD.004 26dcfae12f388eb7d9a42fd202d6569d_JaffaCakes118.exe File created C:\Windows\SysWOW64\KXXNQF\ORD.001 26dcfae12f388eb7d9a42fd202d6569d_JaffaCakes118.exe File created C:\Windows\SysWOW64\KXXNQF\ORD.002 26dcfae12f388eb7d9a42fd202d6569d_JaffaCakes118.exe File created C:\Windows\SysWOW64\KXXNQF\AKV.exe 26dcfae12f388eb7d9a42fd202d6569d_JaffaCakes118.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: 33 2596 ORD.exe Token: SeIncBasePriorityPrivilege 2596 ORD.exe Token: SeIncBasePriorityPrivilege 2596 ORD.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
pid Process 2596 ORD.exe 2596 ORD.exe 2596 ORD.exe 2596 ORD.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2812 wrote to memory of 2596 2812 26dcfae12f388eb7d9a42fd202d6569d_JaffaCakes118.exe 30 PID 2812 wrote to memory of 2596 2812 26dcfae12f388eb7d9a42fd202d6569d_JaffaCakes118.exe 30 PID 2812 wrote to memory of 2596 2812 26dcfae12f388eb7d9a42fd202d6569d_JaffaCakes118.exe 30 PID 2812 wrote to memory of 2596 2812 26dcfae12f388eb7d9a42fd202d6569d_JaffaCakes118.exe 30 PID 2596 wrote to memory of 1984 2596 ORD.exe 32 PID 2596 wrote to memory of 1984 2596 ORD.exe 32 PID 2596 wrote to memory of 1984 2596 ORD.exe 32 PID 2596 wrote to memory of 1984 2596 ORD.exe 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\26dcfae12f388eb7d9a42fd202d6569d_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\26dcfae12f388eb7d9a42fd202d6569d_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:2812 -
C:\Windows\SysWOW64\KXXNQF\ORD.exe"C:\Windows\system32\KXXNQF\ORD.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Drops file in System32 directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2596 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c del C:\Windows\SysWOW64\KXXNQF\ORD.exe > nul3⤵PID:1984
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
461KB
MD57e335c1258740a5798c2b3eea5a97229
SHA16ce1e98ddc05a4b9e772901c9bc6caae4103267f
SHA256667ab5d791b89216a46f7dd3a1bcb9b7e5f235415a74a9678ca41cec051c462f
SHA5128c190dd139f5459a91c81871f53fc080a81c6397c68cb5b0ee195571012cc8af923b10cd77301da1816f935d36a0587d1c75126f5553005a0f50eb22d3441cb4
-
Filesize
61KB
MD59fca42b7fa3132ded471b886c4bf8a51
SHA186109ac13f8b63bd3467bbf05e39c5cf9bd11d26
SHA256c519bcfc50245700b30cb417478b46810443b03a6447387dd1d0a13966ff00dd
SHA512bbdd590e1bd2971fbc6a462f6501341c0808d658ba3407b051f9d299d9babf0632af092d64c6ad290d4ae5d9db8c367898a064bbea916c516c0a54066ad698ab
-
Filesize
43KB
MD54c30b3e90b3da5619bc0d5f53c025135
SHA1829f487b7c26f6cb8b7f211b2331abbc5229aa61
SHA256b632cedab7ce3d19eebc0d31864dc8c38cd249dcbde299cda818f7026ec294cf
SHA512fd0b36fb43c6b62f6d47455b392276d4e3710b204ef11c70cefed417740a4b5d9357ba37f612f3f87d539175af312ead05bc7a4360fe3e26fd43c56e856e6313
-
Filesize
1KB
MD52e0e7c1046a1d07fc7dcac15825d0f8e
SHA14233d7bcac84da73411b0664223c84c980afb420
SHA256e668dfcfa02af57b2ba04afe584ff6dd873dfb18c6a3348ac1356fde097ca743
SHA51272538782c1182850500d98fc921750c472883c3f372fbbadd0dec897432b8b329eb562edb231fb01d9f85b9090efa44bb10b6e978bbcb8132ad75ff304a5f2ae
-
Filesize
1.5MB
MD59c28244f2dbe3a4758b532838b0040c9
SHA14b58bb4033d43ae64af6c18db48d5d25e23f6121
SHA256cb770745d547a27a4b99fdbe27a672135f812b29d94fd2b843d06bb5aa1748aa
SHA51224ed3d4c6aae307a0f1bb1f063b211152644b06d7425a5fe24b09f5f747dd63011451cef3f47cc4985b3316cf1213c056d38768ccb7f44cb2fab28cf4e30e969