General
-
Target
4ada0281fa1ed7bdb8041dcb4ce835ca_JaffaCakes118
-
Size
647KB
-
Sample
240715-wywn3stanr
-
MD5
4ada0281fa1ed7bdb8041dcb4ce835ca
-
SHA1
66cb2e1d3139a150e5cba6416c0d311e2a93e7cc
-
SHA256
c7a080639a5f7c5c28fe45b9aa6e3210fec8dfee9ed2c3ed847dd4e0a0041000
-
SHA512
b2973bb50b0c90142945838a3ed7f9771c5628916768948c176bb01b81265c10067b9210cbd797ecc1f71ab953ab50d0caa191e9d6d1bbc7b14fc54a8e4f59af
-
SSDEEP
12288:J3TdtLW5WIj1YSSdFxiBSXyMzBUWb9lx/9AgHLo8OW+rBAf:hDsj1dEyBcJ9nPx/igrp+Wf
Static task
static1
Behavioral task
behavioral1
Sample
4ada0281fa1ed7bdb8041dcb4ce835ca_JaffaCakes118.exe
Resource
win7-20240705-en
Malware Config
Targets
-
-
Target
4ada0281fa1ed7bdb8041dcb4ce835ca_JaffaCakes118
-
Size
647KB
-
MD5
4ada0281fa1ed7bdb8041dcb4ce835ca
-
SHA1
66cb2e1d3139a150e5cba6416c0d311e2a93e7cc
-
SHA256
c7a080639a5f7c5c28fe45b9aa6e3210fec8dfee9ed2c3ed847dd4e0a0041000
-
SHA512
b2973bb50b0c90142945838a3ed7f9771c5628916768948c176bb01b81265c10067b9210cbd797ecc1f71ab953ab50d0caa191e9d6d1bbc7b14fc54a8e4f59af
-
SSDEEP
12288:J3TdtLW5WIj1YSSdFxiBSXyMzBUWb9lx/9AgHLo8OW+rBAf:hDsj1dEyBcJ9nPx/igrp+Wf
-
Ardamax main executable
-
Modifies WinLogon for persistence
-
Disables RegEdit via registry modification
-
Disables Task Manager via registry modification
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
AutoIT Executable
AutoIT scripts compiled to PE executables.
-
Drops file in System32 directory
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Privilege Escalation
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Defense Evasion
Modify Registry
3Subvert Trust Controls
1Install Root Certificate
1