Analysis
-
max time kernel
121s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240705-en -
resource tags
arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system -
submitted
13/07/2024, 22:35
Static task
static1
Behavioral task
behavioral1
Sample
439ddf6bd306f2c9b9b059cefae5191a_JaffaCakes118.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
439ddf6bd306f2c9b9b059cefae5191a_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
439ddf6bd306f2c9b9b059cefae5191a_JaffaCakes118.exe
-
Size
1.1MB
-
MD5
439ddf6bd306f2c9b9b059cefae5191a
-
SHA1
d2acd93b0da5ca2539a30eb294b789d195cf54b3
-
SHA256
5e5751ab12a05b80925a7159c8e95ce78106fd9d87a1fdbe1c54203acf52f3f6
-
SHA512
02f7ea2ee6d19173745706634b14e628970818d3fdc71d94c8162645e23a83c88a6509e09cdd8162b396e02e4348e731e05fb08b12fea905860cf4e3f05b4114
-
SSDEEP
24576:wHvZTgeTSLuCulRS6aJ0Kk8ITXMiKc2quYfT4DkTNOK03RKgtrlML5QfOebfqgb:4BTdGqvU/eKk84car4kMbpmYbfq
Malware Config
Signatures
-
Ardamax main executable 1 IoCs
resource yara_rule behavioral1/files/0x00070000000164cf-6.dat family_ardamax -
Executes dropped EXE 2 IoCs
pid Process 2336 VMD.exe 1648 JDownloadeer.exe -
Loads dropped DLL 5 IoCs
pid Process 2356 439ddf6bd306f2c9b9b059cefae5191a_JaffaCakes118.exe 2336 VMD.exe 2356 439ddf6bd306f2c9b9b059cefae5191a_JaffaCakes118.exe 2356 439ddf6bd306f2c9b9b059cefae5191a_JaffaCakes118.exe 2356 439ddf6bd306f2c9b9b059cefae5191a_JaffaCakes118.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\VMD Start = "C:\\Windows\\SysWOW64\\VWBTEM\\VMD.exe" VMD.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Drops file in System32 directory 6 IoCs
description ioc Process File created C:\Windows\SysWOW64\VWBTEM\VMD.001 439ddf6bd306f2c9b9b059cefae5191a_JaffaCakes118.exe File created C:\Windows\SysWOW64\VWBTEM\VMD.002 439ddf6bd306f2c9b9b059cefae5191a_JaffaCakes118.exe File created C:\Windows\SysWOW64\VWBTEM\AKV.exe 439ddf6bd306f2c9b9b059cefae5191a_JaffaCakes118.exe File created C:\Windows\SysWOW64\VWBTEM\VMD.exe 439ddf6bd306f2c9b9b059cefae5191a_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\VWBTEM\ VMD.exe File created C:\Windows\SysWOW64\VWBTEM\VMD.004 439ddf6bd306f2c9b9b059cefae5191a_JaffaCakes118.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: 33 2336 VMD.exe Token: SeIncBasePriorityPrivilege 2336 VMD.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
pid Process 2336 VMD.exe 2336 VMD.exe 2336 VMD.exe 2336 VMD.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 2356 wrote to memory of 2336 2356 439ddf6bd306f2c9b9b059cefae5191a_JaffaCakes118.exe 31 PID 2356 wrote to memory of 2336 2356 439ddf6bd306f2c9b9b059cefae5191a_JaffaCakes118.exe 31 PID 2356 wrote to memory of 2336 2356 439ddf6bd306f2c9b9b059cefae5191a_JaffaCakes118.exe 31 PID 2356 wrote to memory of 2336 2356 439ddf6bd306f2c9b9b059cefae5191a_JaffaCakes118.exe 31 PID 2356 wrote to memory of 1648 2356 439ddf6bd306f2c9b9b059cefae5191a_JaffaCakes118.exe 32 PID 2356 wrote to memory of 1648 2356 439ddf6bd306f2c9b9b059cefae5191a_JaffaCakes118.exe 32 PID 2356 wrote to memory of 1648 2356 439ddf6bd306f2c9b9b059cefae5191a_JaffaCakes118.exe 32 PID 2356 wrote to memory of 1648 2356 439ddf6bd306f2c9b9b059cefae5191a_JaffaCakes118.exe 32 PID 1648 wrote to memory of 2828 1648 JDownloadeer.exe 33 PID 1648 wrote to memory of 2828 1648 JDownloadeer.exe 33 PID 1648 wrote to memory of 2828 1648 JDownloadeer.exe 33 PID 1648 wrote to memory of 2828 1648 JDownloadeer.exe 33
Processes
-
C:\Users\Admin\AppData\Local\Temp\439ddf6bd306f2c9b9b059cefae5191a_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\439ddf6bd306f2c9b9b059cefae5191a_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:2356 -
C:\Windows\SysWOW64\VWBTEM\VMD.exe"C:\Windows\system32\VWBTEM\VMD.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Drops file in System32 directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:2336
-
-
C:\Users\Admin\AppData\Local\Temp\JDownloadeer.exe"C:\Users\Admin\AppData\Local\Temp\JDownloadeer.exe"2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1648 -
C:\Program Files\Java\jre7\bin\javaw.exe"C:\Program Files\Java\jre7\bin\javaw.exe" -Xmx512m -jar "C:\Users\Admin\AppData\Local\Temp\App\JDownloader\JDownloader.jar"3⤵PID:2828
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
461KB
MD57e335c1258740a5798c2b3eea5a97229
SHA16ce1e98ddc05a4b9e772901c9bc6caae4103267f
SHA256667ab5d791b89216a46f7dd3a1bcb9b7e5f235415a74a9678ca41cec051c462f
SHA5128c190dd139f5459a91c81871f53fc080a81c6397c68cb5b0ee195571012cc8af923b10cd77301da1816f935d36a0587d1c75126f5553005a0f50eb22d3441cb4
-
Filesize
61KB
MD59fca42b7fa3132ded471b886c4bf8a51
SHA186109ac13f8b63bd3467bbf05e39c5cf9bd11d26
SHA256c519bcfc50245700b30cb417478b46810443b03a6447387dd1d0a13966ff00dd
SHA512bbdd590e1bd2971fbc6a462f6501341c0808d658ba3407b051f9d299d9babf0632af092d64c6ad290d4ae5d9db8c367898a064bbea916c516c0a54066ad698ab
-
Filesize
43KB
MD54c30b3e90b3da5619bc0d5f53c025135
SHA1829f487b7c26f6cb8b7f211b2331abbc5229aa61
SHA256b632cedab7ce3d19eebc0d31864dc8c38cd249dcbde299cda818f7026ec294cf
SHA512fd0b36fb43c6b62f6d47455b392276d4e3710b204ef11c70cefed417740a4b5d9357ba37f612f3f87d539175af312ead05bc7a4360fe3e26fd43c56e856e6313
-
Filesize
1KB
MD54df40848ecc79487389e115c32e8dc3f
SHA14f848790402ef7c43d7e091a767e207d1e7c7d3f
SHA2568f0ae843a98181bb460474207d1bcaf14ecee858112a21dd595db8f8699d8e67
SHA512d85dd5dbf49b05454d738f5ded1659b4ab924d6d3d861aa3196dc8393374f0f3074172cbff63e7d5686298d8ac24d9a9177b3ea9eb24b64cbb8eb1b54edee99a
-
Filesize
41KB
MD52720fd3043177a9cd731a27daa45bb97
SHA1302557b7819961ce05cb2d187139d16b85a4da5e
SHA2567c659324ff0792be97b09888e4003ea57150da7850803bf1eb2918230758198f
SHA512185efd6eaaf8913346b4c9fa33cfd7ee6b0a736edbce7f39e99dab6eb295c0b234836cf1fb7cab32803aac12946eb8104621d9b02b04bb7f3c51920e6ec95841
-
Filesize
1.5MB
MD59c28244f2dbe3a4758b532838b0040c9
SHA14b58bb4033d43ae64af6c18db48d5d25e23f6121
SHA256cb770745d547a27a4b99fdbe27a672135f812b29d94fd2b843d06bb5aa1748aa
SHA51224ed3d4c6aae307a0f1bb1f063b211152644b06d7425a5fe24b09f5f747dd63011451cef3f47cc4985b3316cf1213c056d38768ccb7f44cb2fab28cf4e30e969