Analysis
-
max time kernel
117s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20240729-en -
resource tags
arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system -
submitted
16-08-2024 11:30
Static task
static1
Behavioral task
behavioral1
Sample
9e2dad56b15a9b479282726deb9d35e2_JaffaCakes118.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
9e2dad56b15a9b479282726deb9d35e2_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
9e2dad56b15a9b479282726deb9d35e2_JaffaCakes118.exe
-
Size
575KB
-
MD5
9e2dad56b15a9b479282726deb9d35e2
-
SHA1
7ebf1c7c28caf8b40d6342ef9dad1ee042763089
-
SHA256
85335c9913584ffa043afffbf21a1bea3dfdfafb0898f6f3bb63b2b67212edb3
-
SHA512
e8cf4174fdfaed0b56aa82fe23783b8db03ce025506bff1b1efcc122384bd15dcbbc338c6602ab1b38ef4afb14b8682b7dc59399394e9916b48a69373ae9b668
-
SSDEEP
12288:IIkpPSSFoCRrpigV1DU4XV08eIA4dPUrCiIvt1DIekAYh57LVo:U6O/okX+5I8SDSnK
Malware Config
Signatures
-
Ardamax main executable 1 IoCs
resource yara_rule behavioral1/files/0x0007000000018766-9.dat family_ardamax -
Executes dropped EXE 1 IoCs
pid Process 740 DPOP.exe -
Loads dropped DLL 2 IoCs
pid Process 2136 9e2dad56b15a9b479282726deb9d35e2_JaffaCakes118.exe 2136 9e2dad56b15a9b479282726deb9d35e2_JaffaCakes118.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\DPOP Agent = "C:\\Windows\\SysWOW64\\28463\\DPOP.exe" DPOP.exe -
Drops file in System32 directory 8 IoCs
description ioc Process File created C:\Windows\SysWOW64\28463\DPOP.006 9e2dad56b15a9b479282726deb9d35e2_JaffaCakes118.exe File created C:\Windows\SysWOW64\28463\DPOP.007 9e2dad56b15a9b479282726deb9d35e2_JaffaCakes118.exe File created C:\Windows\SysWOW64\28463\DPOP.exe 9e2dad56b15a9b479282726deb9d35e2_JaffaCakes118.exe File created C:\Windows\SysWOW64\28463\AKV.exe 9e2dad56b15a9b479282726deb9d35e2_JaffaCakes118.exe File created C:\Windows\SysWOW64\28463\DPOP.chm 9e2dad56b15a9b479282726deb9d35e2_JaffaCakes118.exe File created C:\Windows\SysWOW64\28463\DPOP.004 9e2dad56b15a9b479282726deb9d35e2_JaffaCakes118.exe File created C:\Windows\SysWOW64\28463\DPOP.003 9e2dad56b15a9b479282726deb9d35e2_JaffaCakes118.exe File created C:\Windows\SysWOW64\28463\DPOP.001 9e2dad56b15a9b479282726deb9d35e2_JaffaCakes118.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 9e2dad56b15a9b479282726deb9d35e2_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language DPOP.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2136 wrote to memory of 740 2136 9e2dad56b15a9b479282726deb9d35e2_JaffaCakes118.exe 30 PID 2136 wrote to memory of 740 2136 9e2dad56b15a9b479282726deb9d35e2_JaffaCakes118.exe 30 PID 2136 wrote to memory of 740 2136 9e2dad56b15a9b479282726deb9d35e2_JaffaCakes118.exe 30 PID 2136 wrote to memory of 740 2136 9e2dad56b15a9b479282726deb9d35e2_JaffaCakes118.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\9e2dad56b15a9b479282726deb9d35e2_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\9e2dad56b15a9b479282726deb9d35e2_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2136 -
C:\Windows\SysWOW64\28463\DPOP.exe"C:\Windows\system32\28463\DPOP.exe"2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
PID:740
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
458KB
MD5445bb23ed3b1c70476641806ffb42bd6
SHA18e39c008da05859777a69cfc9b7d5acb882d93c0
SHA25662d39fc61386dccf614ab8345d77bd8f36b5350b3ed7b5ea506fd0dec7adb34a
SHA512a06f7bbc85cd5071f061b5983e195fe4f143281d6c999da1b5e6c3816bbea1dde8e4d6d94ce97ae63a16f67d7f705fff526b5511bfa7111a05e8ef70e5348a03
-
Filesize
392B
MD55a8dd98e7d20b0ce7bd04d4cbf6d1332
SHA168116bded83562e0c0ed5e150c097374f17e60fc
SHA2563002f0fb7f28aaef66089ac5bc14fecc1721ddeb1cdec70c164e118c17d3860d
SHA512bfd8ce6c9d72a5b4fb51e80c7527e8942bdcc43c199e49b5fbfd9fa355691fc78e61f427bf4d11361e1ec6d5c02c75a089db6f2d0a8f617ac2dc294d7b06d95a
-
Filesize
14KB
MD5eb8b93b928b88ff56474d2351ee09800
SHA19c50d21553448bb6b83688401e56ae765ea1e3c7
SHA256d88a20d765f1e12796067764474f9cb22639864cbda71b1df1ef2bfb59bf62e2
SHA512d9d571458c5c0fac4226f4b3c05c42a66ae9ffffaa7833de22fa053538917e63471db9bb2bfb464c476c47a454647d162c8e351d7ea2d8cbb1c640057ca1c1ea
-
Filesize
8KB
MD5360ed664cecf28635462d5e563be3c62
SHA15ff3c278c561d07f7bf05495b804af75de80bb62
SHA256da0ac6a5ab9f8258695ff475d6038d1d45af4cdee8efca0f5ba7baf434f28a6f
SHA51276ebb7e13ca404a4220bacce77ccbe69804c96126075326562376608fc0b0011b3b5869047f97c609431cb4d3afd17368e9e21d1ab02ee0b0e491887439e6b29
-
Filesize
5KB
MD5422d74eb4f7efa089c718584c66744b1
SHA1613ae988006affa6dadf7b552e3c1ba867d73b68
SHA25668acc0270eb37fc646e6a97fe5417f68ef881b383da4416674f45e04f6858cd1
SHA51276688362ddf00585d0274605a3c34734bd93610eb02bb8ed115bde01d00e80daec1dcf5f845fb56c2e71160556d2000af4b6219b4b7466e76e740e4170862124
-
Filesize
33KB
MD5b0c07c5afc489587493d309e54279e58
SHA10dfc61e7e23394f6242fbbf961b6f94a81dcd7db
SHA25644c43ba9cbe53a0a38a0176176a79da8223b4d3b311d12fb9e44e0bfe8f38e6c
SHA51277dfd87a26b8b70377f5ef6da9617322821154aa249a7e4969533ac58781b07f806c8dfeaf05bf01b24305721a5e4425738fb744fe8be3150a88d6a2920191c4
-
Filesize
4KB
MD545cc64001aa3c416b28e83b855097316
SHA10031aca142db6b23c4475e5ae2afe09e234ab336
SHA2568e857031ebfa0e37532f37b0eaaa3c553921a4c211fadd983099c49ff772a83e
SHA512662a7ebc4dc87db4b8b3f34ddf89a71631f395a65f0b3da1ed64c92f42068cf6ff1cb377a66d1e09957e522abccf5d9845931dc9891ca845258e3453597f29d3
-
Filesize
567KB
MD590e0e67d8d1adc46c1829a02005c4a75
SHA16e35a52aedf38ae8fbc50108f0a572e8c9bfb1cc
SHA2560b731d1736eb5ead93415efee7e3e7e4a78ba1352512482d16183b3a62b2543b
SHA5127b33312246b77b191be15e1f675503a2dbfc3bb196388c5d46948240d011d8068d7a84841b25fad63e345ece0bd9a61b5ae39de4be84433805acd077dafece81