General
-
Target
98ace29e8bb6404dcc645efd782b5fe3_JaffaCakes118
-
Size
1.6MB
-
Sample
240815-dhbd4awenq
-
MD5
98ace29e8bb6404dcc645efd782b5fe3
-
SHA1
f842537bf61da8e77426e6d6b2e612bf30cd270b
-
SHA256
7d3d3adc082cc7503ba98ce176b48cdf22ffe1a300974b4fddcd1671a0caf7c0
-
SHA512
0140df4ca5c25cb9eb071f7a3004c74eeb0e303ad0558f44eb5879695123f2e153857fad8b1c90b8c74d6a82bb48ac311ff7f0b8bcedb650945c5c9ed17c52dd
-
SSDEEP
49152:Q3tTmJEOHNNoWhfIbRbOc/JEd5u3ihcIYy:QgJEU6BKds3il
Static task
static1
Behavioral task
behavioral1
Sample
98ace29e8bb6404dcc645efd782b5fe3_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
98ace29e8bb6404dcc645efd782b5fe3_JaffaCakes118.exe
Resource
win10v2004-20240802-en
Malware Config
Extracted
sality
http://89.119.67.154/testo5/
http://kukutrustnet777.info/home.gif
http://kukutrustnet888.info/home.gif
http://kukutrustnet987.info/home.gif
Targets
-
-
Target
98ace29e8bb6404dcc645efd782b5fe3_JaffaCakes118
-
Size
1.6MB
-
MD5
98ace29e8bb6404dcc645efd782b5fe3
-
SHA1
f842537bf61da8e77426e6d6b2e612bf30cd270b
-
SHA256
7d3d3adc082cc7503ba98ce176b48cdf22ffe1a300974b4fddcd1671a0caf7c0
-
SHA512
0140df4ca5c25cb9eb071f7a3004c74eeb0e303ad0558f44eb5879695123f2e153857fad8b1c90b8c74d6a82bb48ac311ff7f0b8bcedb650945c5c9ed17c52dd
-
SSDEEP
49152:Q3tTmJEOHNNoWhfIbRbOc/JEd5u3ihcIYy:QgJEU6BKds3il
-
Ardamax main executable
-
Disables RegEdit via registry modification
-
Disables Task Manager via registry modification
-
Modifies Windows Firewall
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Deletes itself
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Indicator Removal: File Deletion
Adversaries may delete files left behind by the actions of their intrusion activity.
-
Drops file in System32 directory
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Event Triggered Execution
1Netsh Helper DLL
1Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Event Triggered Execution
1Netsh Helper DLL
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
4Disable or Modify System Firewall
1Disable or Modify Tools
3Indicator Removal
1File Deletion
1Modify Registry
5