General
-
Target
3deb1b80bd7b6803260b0f3497991e1e_JaffaCakes118
-
Size
1.3MB
-
Sample
240712-ss613s1glg
-
MD5
3deb1b80bd7b6803260b0f3497991e1e
-
SHA1
9ed30034d9c78134feb2a445341d893f0bc4eb79
-
SHA256
c2c16ebe19392e3651fe0abde3865eb7e6ffc62f4c81f13aa889e8ac565875e5
-
SHA512
bbe266a2bf89585dceb8ec0c8942756a185aada94299a7e693e404cd7f7cd9a96eb4da0df68d39426c1ff1c3caa4d768afcf78a7c19cb41eaf3054394856192c
-
SSDEEP
24576:u8gmUG1W4B5aKt2VWC8ijrjsCQafDv2QrRWxme7CkYjG0ngOtA:u8jZ1W43aKtiWC8mrjsCQaz2QrRWx7Wu
Behavioral task
behavioral1
Sample
3deb1b80bd7b6803260b0f3497991e1e_JaffaCakes118.exe
Resource
win7-20240708-en
Malware Config
Targets
-
-
Target
3deb1b80bd7b6803260b0f3497991e1e_JaffaCakes118
-
Size
1.3MB
-
MD5
3deb1b80bd7b6803260b0f3497991e1e
-
SHA1
9ed30034d9c78134feb2a445341d893f0bc4eb79
-
SHA256
c2c16ebe19392e3651fe0abde3865eb7e6ffc62f4c81f13aa889e8ac565875e5
-
SHA512
bbe266a2bf89585dceb8ec0c8942756a185aada94299a7e693e404cd7f7cd9a96eb4da0df68d39426c1ff1c3caa4d768afcf78a7c19cb41eaf3054394856192c
-
SSDEEP
24576:u8gmUG1W4B5aKt2VWC8ijrjsCQafDv2QrRWxme7CkYjG0ngOtA:u8jZ1W43aKtiWC8mrjsCQaz2QrRWx7Wu
-
Ardamax main executable
-
Boot or Logon Autostart Execution: Active Setup
Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.
-
ACProtect 1.3x - 1.4x DLL software
Detects file using ACProtect software.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Drops file in System32 directory
-