Analysis
-
max time kernel
148s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
19-07-2024 13:32
Static task
static1
Behavioral task
behavioral1
Sample
5c25bf68835574d720d2f2419e51bcce_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
5c25bf68835574d720d2f2419e51bcce_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
5c25bf68835574d720d2f2419e51bcce_JaffaCakes118.exe
-
Size
582KB
-
MD5
5c25bf68835574d720d2f2419e51bcce
-
SHA1
58ffea6265516a94f272e84936d220b669008e70
-
SHA256
ba196926ca35e7e7144fdbe2a26be51f5570f938d92e8811cffb560b5f9002aa
-
SHA512
535c5ad44eae7955861523fb3a7f2a50a7779615aa6749132ae8ef8019ce1007c2a6f2f959d267d1ca6e30cade98b57bb433de1d161d3a44dec49b85693eb38b
-
SSDEEP
12288:TIaJ7TvUUqFoo1ZT0Mvth2SWOUTwFXHWTtRWpDaOywedq8ZUu:h7Tvvquo1ZA+tdWMWTy5Noq8Zf
Malware Config
Signatures
-
Ardamax main executable 1 IoCs
resource yara_rule behavioral2/files/0x00070000000234d9-12.dat family_ardamax -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2990742725-2267136959-192470804-1000\Control Panel\International\Geo\Nation 5c25bf68835574d720d2f2419e51bcce_JaffaCakes118.exe -
Executes dropped EXE 1 IoCs
pid Process 4136 KIRX.exe -
Loads dropped DLL 1 IoCs
pid Process 3100 5c25bf68835574d720d2f2419e51bcce_JaffaCakes118.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\KIRX Agent = "C:\\Windows\\SysWOW64\\28463\\KIRX.exe" KIRX.exe -
Drops file in System32 directory 5 IoCs
description ioc Process File created C:\Windows\SysWOW64\28463\KIRX.006 5c25bf68835574d720d2f2419e51bcce_JaffaCakes118.exe File created C:\Windows\SysWOW64\28463\KIRX.007 5c25bf68835574d720d2f2419e51bcce_JaffaCakes118.exe File created C:\Windows\SysWOW64\28463\KIRX.exe 5c25bf68835574d720d2f2419e51bcce_JaffaCakes118.exe File created C:\Windows\SysWOW64\28463\AKV.exe 5c25bf68835574d720d2f2419e51bcce_JaffaCakes118.exe File created C:\Windows\SysWOW64\28463\KIRX.001 5c25bf68835574d720d2f2419e51bcce_JaffaCakes118.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3100 wrote to memory of 4136 3100 5c25bf68835574d720d2f2419e51bcce_JaffaCakes118.exe 92 PID 3100 wrote to memory of 4136 3100 5c25bf68835574d720d2f2419e51bcce_JaffaCakes118.exe 92 PID 3100 wrote to memory of 4136 3100 5c25bf68835574d720d2f2419e51bcce_JaffaCakes118.exe 92
Processes
-
C:\Users\Admin\AppData\Local\Temp\5c25bf68835574d720d2f2419e51bcce_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\5c25bf68835574d720d2f2419e51bcce_JaffaCakes118.exe"1⤵
- Checks computer location settings
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:3100 -
C:\Windows\SysWOW64\28463\KIRX.exe"C:\Windows\system32\28463\KIRX.exe"2⤵
- Executes dropped EXE
- Adds Run key to start application
PID:4136
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
4KB
MD5cde9827bcff03c6c1f883f693c8c6700
SHA1c2ce6d6a1dd2e17d8736e779ebe1f6d0383b4f46
SHA256ba4566adf8b2cd5a6afb6fcb2a43cd80139d1882f71f03ccd4d0eea71fac8252
SHA51211b901e644a52826c317435dc87872b55a36fa9d477530a030d1f137beb2710544b1f0e2fd23b3f6528f2f71ab55c66d219a87f1d5bc0f6ec0fd5aecd7659bc5
-
Filesize
526KB
MD5450aa859ed8139935812c13199c050b7
SHA16a5a3cbf66edfb5cd67088c628376d85a1a1aa2f
SHA256f2f71eea47e67a00808504052b6518e4bbc6d455327d91b579dece4d3bed12f6
SHA512c824a415ee77e941e9da9288e94ee25bbeb6120c661d9042fc0de40b339a354b878b2a06fe58b1b508c170d080310d92c952aceaf8c1279cb18799986214ccac
-
Filesize
370B
MD56afab250ae6d293505a0e71c7b5a10ff
SHA13caf92659b928ffd070a288daad99b1f0e97ded4
SHA256efa170aea2e0338ba5959b9764baff6da75e0953b43c80b57638b35aa9be5dd9
SHA512cac56215933071d2a23a96c608968d6aef0d4d5b268b9db71db68cec3a4ac1eb8b7163190560061f060a19b84b82313ea49246dcf908b10a7659a6e9db69d150
-
Filesize
8KB
MD5acfe714319d5092d079a46d20785dab8
SHA167c491b9abb9ecffa1c87ce9ec1d516cd5fd9715
SHA256832732c6ebefed88a2db93f73867ca0d5bd5b2a012ccbcfcf26e22bed6dc4fac
SHA512895b25109ae1d6b64c6383cd74e8354cda27aa4925c06d7ef90edb748fb7765a07253ce0f69b3d0a13f8c63d1d226df61f50a56fe05569d31a4a5265f4175a8f
-
Filesize
5KB
MD5dd462f9742de6d9d95459334538c2b1f
SHA18718400320b2aa38ff37dba0fe82062e5d3839bd
SHA256b172cb7ab44abac00ea09707fe8926aa327e01f22726a887fa0e8eb72cdf1e54
SHA512bc21d555ade6009250a892ef4b55f8ee96998dfafb3557da1e347297f0dc5f0e53e635f4b5d53261cccc46629adabd208fbc7a53fb826ff1606c47eb57e4537c
-
Filesize
567KB
MD54ea1467f05af54ad8c98ee4926aff85c
SHA1a377d95a18ed943cae552af415647ec6e9861c1e
SHA256b5a510cf3884c0217cafd5f378ce3eb389bd4e88eea5f662e5c364a6e3fb4476
SHA512049b8f935e96773f35f67d0ff6de74e6dda04f5add09964500a356184db0c3229943ef5a27df2b1e8098bf693e3016007272e797c37e99a1ebdce0999363963d