Analysis
-
max time kernel
120s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
18-08-2024 03:32
Static task
static1
Behavioral task
behavioral1
Sample
a5388a0dafc6e7bbdfbf06e8d8aa06f1_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
a5388a0dafc6e7bbdfbf06e8d8aa06f1_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
a5388a0dafc6e7bbdfbf06e8d8aa06f1_JaffaCakes118.exe
-
Size
1.9MB
-
MD5
a5388a0dafc6e7bbdfbf06e8d8aa06f1
-
SHA1
8d4955a7b85b384e4a242dd60287283ac0d7c8b0
-
SHA256
e8ac6b3824d1bed128fdd94217c2ed21afc24f7660ef5da10e56aa072ad6179f
-
SHA512
e3192e9ef2860b00104406f33a7621fbc2dad168d8a266b33f33022c94ea83e72d0d329f65b343095956af6cf6884a767a7a01e9e88f5aec668a970fcd540ab9
-
SSDEEP
49152:QeqsMfH0R8/71XvXlcxUV83mEfrCtKvFVRX1:qsU0R8j1fX+xUqlSKdrX1
Malware Config
Signatures
-
Ardamax main executable 1 IoCs
resource yara_rule behavioral1/files/0x0007000000016dc7-8.dat family_ardamax -
Executes dropped EXE 2 IoCs
pid Process 2852 OWX.exe 2252 Mu BSK.exe -
Loads dropped DLL 4 IoCs
pid Process 2564 a5388a0dafc6e7bbdfbf06e8d8aa06f1_JaffaCakes118.exe 2852 OWX.exe 2564 a5388a0dafc6e7bbdfbf06e8d8aa06f1_JaffaCakes118.exe 2564 a5388a0dafc6e7bbdfbf06e8d8aa06f1_JaffaCakes118.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\OWX Start = "C:\\Windows\\SysWOW64\\BIYDOY\\OWX.exe" OWX.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Indicator Removal: File Deletion 1 TTPs
Adversaries may delete files left behind by the actions of their intrusion activity.
-
Drops file in System32 directory 6 IoCs
description ioc Process File created C:\Windows\SysWOW64\BIYDOY\OWX.004 a5388a0dafc6e7bbdfbf06e8d8aa06f1_JaffaCakes118.exe File created C:\Windows\SysWOW64\BIYDOY\OWX.001 a5388a0dafc6e7bbdfbf06e8d8aa06f1_JaffaCakes118.exe File created C:\Windows\SysWOW64\BIYDOY\OWX.002 a5388a0dafc6e7bbdfbf06e8d8aa06f1_JaffaCakes118.exe File created C:\Windows\SysWOW64\BIYDOY\AKV.exe a5388a0dafc6e7bbdfbf06e8d8aa06f1_JaffaCakes118.exe File created C:\Windows\SysWOW64\BIYDOY\OWX.exe a5388a0dafc6e7bbdfbf06e8d8aa06f1_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\BIYDOY\ OWX.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language a5388a0dafc6e7bbdfbf06e8d8aa06f1_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language OWX.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: 33 2852 OWX.exe Token: SeIncBasePriorityPrivilege 2852 OWX.exe Token: SeIncBasePriorityPrivilege 2852 OWX.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
pid Process 2852 OWX.exe 2852 OWX.exe 2852 OWX.exe 2852 OWX.exe -
Suspicious use of WriteProcessMemory 15 IoCs
description pid Process procid_target PID 2564 wrote to memory of 2852 2564 a5388a0dafc6e7bbdfbf06e8d8aa06f1_JaffaCakes118.exe 30 PID 2564 wrote to memory of 2852 2564 a5388a0dafc6e7bbdfbf06e8d8aa06f1_JaffaCakes118.exe 30 PID 2564 wrote to memory of 2852 2564 a5388a0dafc6e7bbdfbf06e8d8aa06f1_JaffaCakes118.exe 30 PID 2564 wrote to memory of 2852 2564 a5388a0dafc6e7bbdfbf06e8d8aa06f1_JaffaCakes118.exe 30 PID 2564 wrote to memory of 2252 2564 a5388a0dafc6e7bbdfbf06e8d8aa06f1_JaffaCakes118.exe 31 PID 2564 wrote to memory of 2252 2564 a5388a0dafc6e7bbdfbf06e8d8aa06f1_JaffaCakes118.exe 31 PID 2564 wrote to memory of 2252 2564 a5388a0dafc6e7bbdfbf06e8d8aa06f1_JaffaCakes118.exe 31 PID 2564 wrote to memory of 2252 2564 a5388a0dafc6e7bbdfbf06e8d8aa06f1_JaffaCakes118.exe 31 PID 2564 wrote to memory of 2252 2564 a5388a0dafc6e7bbdfbf06e8d8aa06f1_JaffaCakes118.exe 31 PID 2564 wrote to memory of 2252 2564 a5388a0dafc6e7bbdfbf06e8d8aa06f1_JaffaCakes118.exe 31 PID 2564 wrote to memory of 2252 2564 a5388a0dafc6e7bbdfbf06e8d8aa06f1_JaffaCakes118.exe 31 PID 2852 wrote to memory of 684 2852 OWX.exe 33 PID 2852 wrote to memory of 684 2852 OWX.exe 33 PID 2852 wrote to memory of 684 2852 OWX.exe 33 PID 2852 wrote to memory of 684 2852 OWX.exe 33
Processes
-
C:\Users\Admin\AppData\Local\Temp\a5388a0dafc6e7bbdfbf06e8d8aa06f1_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\a5388a0dafc6e7bbdfbf06e8d8aa06f1_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2564 -
C:\Windows\SysWOW64\BIYDOY\OWX.exe"C:\Windows\system32\BIYDOY\OWX.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2852 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c del C:\Windows\SysWOW64\BIYDOY\OWX.exe > nul3⤵
- System Location Discovery: System Language Discovery
PID:684
-
-
-
C:\Users\Admin\AppData\Local\Temp\Mu BSK.exe"C:\Users\Admin\AppData\Local\Temp\Mu BSK.exe"2⤵
- Executes dropped EXE
PID:2252
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
463KB
MD5eb916da4abe4ff314662089013c8f832
SHA11e7e611cc6922a2851bcf135806ab51cdb499efa
SHA25696af80e7ba0f3997d59ebcb5ecef619f980d71ca29113e2cd2f2e8adcdea3061
SHA512d0dbe1d1612982b9cd2a3ed3cbd3e3b5be49237f580f91d5e5d5b6d20ed4dc0babb69a666c19bf4e0f10776a43b9b1dcda91a4cd381ce3705b1795ef9d731c8b
-
Filesize
61KB
MD5425ff37c76030ca0eb60321eedd4afdd
SHA17dde5e9ce5c4057d3db149f323fa43ed29d90e09
SHA25670b00b09ae76a7ecfd6680ab22df546b17826755087c069fc87d14895e1a4e24
SHA512ef5ff97c0d682b6155eff8f92dace1789cf01ca8bca55af1c1d0f2243b5e18bc12a657bb2bb12601b51ef9e1b942f02feb8462644da291fd1b2239c34ef2b59b
-
Filesize
43KB
MD512fb4f589942682a478b7c7881dfcba2
SHA1a3d490c6cda965708a1ff6a0dc4e88037e0d6336
SHA2564de0c277800ae36b85a11ed9765f732a73578d4dce053ff7179f96ab776fb60d
SHA512dd1c6a4ea5bc9698701ec941c4e90fe8dfb0993dc321edc052d1a80cc49bc46be665a85ec678876e698de60cda5dbf1d6279742a16d648f9d18e642a3ea33ddd
-
Filesize
1KB
MD5219fe566b733eddf78f9fc40f4bfe314
SHA1b50c6e8d39624e04c1506356bb81cc933ab381f4
SHA2562ab52aa157374c124ee84f672f5b02d7a051da6cee8283172b65ba770b183879
SHA512415983e859544500119a391ab583a474062884929d268e6d2a48a01be4e2434dccc407216b2d5242b60198b3daec9fb38b4b174f12d8b945381d5e04100987e2
-
Filesize
2.9MB
MD5aa9d8df49d37f7fff1e2d1f21c157e87
SHA156ac7c0e7baed038f9b7976ec7de3b83302e0513
SHA256c1a638943ca053da4774f6c55a7f0994828fa1b49efac143aa8cf75a97dc98b4
SHA512a2b8df8546a387ca20f50fa66b49346d68e18a3d32221ed32064b3f90aaabf83306bd4f796eb3fed3a2e28cdde393e3cb803b5bcd6aaa3d6a21258d40b02a785
-
Filesize
1.5MB
MD5f8530f0dfe90c7c1e20239b0a7643041
SHA13e0208ab84b8444a69c8d62ad0b81c4186395802
SHA256734439c4049ae1a832b4cc5c8d227112106406945d1a7cbb355e11a3f5e356c4
SHA5125cb01517938789e006e00d69729ae7d73ad480f1ae17a80059bf81ee5d9cebb1263a35732c84f03d742684a650b116b13e6731ca80b0b9cdb3908e5588649399