Analysis
-
max time kernel
119s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
18-08-2024 07:22
Behavioral task
behavioral1
Sample
a5e2762223935a4dfb2d698249e0dec8_JaffaCakes118.exe
Resource
win7-20240708-en
General
-
Target
a5e2762223935a4dfb2d698249e0dec8_JaffaCakes118.exe
-
Size
605KB
-
MD5
a5e2762223935a4dfb2d698249e0dec8
-
SHA1
5ee41d8224806321f8b9d950d844198a47a4e227
-
SHA256
4f315383c0983c00c28f31cd008b60c6eff4f8cceb070cf70713405c02a97458
-
SHA512
ddd8fedf465ad56990c10936d7c60d93f43657c00191affc628d749ee7ab184ae8635d52a92b288dfc657077de2ad7428a30007919c7360f9f385c98e88dfc2e
-
SSDEEP
12288:IP+PbVQvXpZvCDi+fa3c54/I2XHrSm3rY//8JqhLtnIm:pjy7F4as5OLXLRY//BnI
Malware Config
Signatures
-
Ardamax main executable 1 IoCs
resource yara_rule behavioral1/files/0x0007000000015df0-33.dat family_ardamax -
Deletes itself 1 IoCs
pid Process 632 cmd.exe -
Executes dropped EXE 2 IoCs
pid Process 2892 Install.exe 2688 VNQS.exe -
Loads dropped DLL 16 IoCs
pid Process 2852 a5e2762223935a4dfb2d698249e0dec8_JaffaCakes118.exe 2852 a5e2762223935a4dfb2d698249e0dec8_JaffaCakes118.exe 2852 a5e2762223935a4dfb2d698249e0dec8_JaffaCakes118.exe 2892 Install.exe 2892 Install.exe 2892 Install.exe 2892 Install.exe 2892 Install.exe 2892 Install.exe 2688 VNQS.exe 2688 VNQS.exe 2688 VNQS.exe 2688 VNQS.exe 2660 DllHost.exe 2688 VNQS.exe 2660 DllHost.exe -
resource yara_rule behavioral1/memory/2852-0-0x0000000000400000-0x00000000004C5000-memory.dmp upx behavioral1/memory/2852-59-0x0000000000400000-0x00000000004C5000-memory.dmp upx -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Drops file in System32 directory 9 IoCs
description ioc Process File created C:\Windows\SysWOW64\Sys\VNQS.006 Install.exe File opened for modification C:\Windows\SysWOW64\Sys VNQS.exe File created C:\Windows\SysWOW64\Sys\VNQS.001 Install.exe File created C:\Windows\SysWOW64\116604.jpg a5e2762223935a4dfb2d698249e0dec8_JaffaCakes118.exe File created C:\Windows\SysWOW64\Sys\VNQS.007 Install.exe File created C:\Windows\SysWOW64\Sys\VNQS.exe Install.exe File created C:\Windows\SysWOW64\Sys\AKV.exe Install.exe File opened for modification C:\Windows\SysWOW64\116604.jpg DllHost.exe File created C:\Windows\SysWOW64\Install.exe a5e2762223935a4dfb2d698249e0dec8_JaffaCakes118.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\Windows\system32zcleaner.bat a5e2762223935a4dfb2d698249e0dec8_JaffaCakes118.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 5 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language DllHost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language VNQS.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language a5e2762223935a4dfb2d698249e0dec8_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Install.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: 33 2688 VNQS.exe Token: SeIncBasePriorityPrivilege 2688 VNQS.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2660 DllHost.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
pid Process 2688 VNQS.exe 2688 VNQS.exe 2688 VNQS.exe 2688 VNQS.exe -
Suspicious use of WriteProcessMemory 18 IoCs
description pid Process procid_target PID 2852 wrote to memory of 2892 2852 a5e2762223935a4dfb2d698249e0dec8_JaffaCakes118.exe 30 PID 2852 wrote to memory of 2892 2852 a5e2762223935a4dfb2d698249e0dec8_JaffaCakes118.exe 30 PID 2852 wrote to memory of 2892 2852 a5e2762223935a4dfb2d698249e0dec8_JaffaCakes118.exe 30 PID 2852 wrote to memory of 2892 2852 a5e2762223935a4dfb2d698249e0dec8_JaffaCakes118.exe 30 PID 2852 wrote to memory of 2892 2852 a5e2762223935a4dfb2d698249e0dec8_JaffaCakes118.exe 30 PID 2852 wrote to memory of 2892 2852 a5e2762223935a4dfb2d698249e0dec8_JaffaCakes118.exe 30 PID 2852 wrote to memory of 2892 2852 a5e2762223935a4dfb2d698249e0dec8_JaffaCakes118.exe 30 PID 2892 wrote to memory of 2688 2892 Install.exe 32 PID 2892 wrote to memory of 2688 2892 Install.exe 32 PID 2892 wrote to memory of 2688 2892 Install.exe 32 PID 2892 wrote to memory of 2688 2892 Install.exe 32 PID 2892 wrote to memory of 2688 2892 Install.exe 32 PID 2892 wrote to memory of 2688 2892 Install.exe 32 PID 2892 wrote to memory of 2688 2892 Install.exe 32 PID 2852 wrote to memory of 632 2852 a5e2762223935a4dfb2d698249e0dec8_JaffaCakes118.exe 33 PID 2852 wrote to memory of 632 2852 a5e2762223935a4dfb2d698249e0dec8_JaffaCakes118.exe 33 PID 2852 wrote to memory of 632 2852 a5e2762223935a4dfb2d698249e0dec8_JaffaCakes118.exe 33 PID 2852 wrote to memory of 632 2852 a5e2762223935a4dfb2d698249e0dec8_JaffaCakes118.exe 33
Processes
-
C:\Users\Admin\AppData\Local\Temp\a5e2762223935a4dfb2d698249e0dec8_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\a5e2762223935a4dfb2d698249e0dec8_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- Drops file in System32 directory
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2852 -
C:\Windows\SysWOW64\Install.exe"C:\Windows\system32\Install.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2892 -
C:\Windows\SysWOW64\Sys\VNQS.exe"C:\Windows\system32\Sys\VNQS.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:2688
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Windows\system32zcleaner.bat" "2⤵
- Deletes itself
- System Location Discovery: System Language Discovery
PID:632
-
-
C:\Windows\SysWOW64\DllHost.exeC:\Windows\SysWOW64\DllHost.exe /Processid:{76D0CB12-7604-4048-B83C-1005C7DDC503}1⤵
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of FindShellTrayWindow
PID:2660
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
6KB
MD5ebf128dc70d745f9735b56a5179008cf
SHA131eeedb77921200e87910f146ecc477e95b968e6
SHA2567f8da00c290e88ea5ab8c5db3f20be2f8a9e7f86d5d14bfb5eaf06245d5056c4
SHA512a387630b4a4cd1c4891de03dfe1353c23f40ebb4766cf5d40484477a1ef3e3e08ddab37605a9b631a0f98b206f0732158e22b07d7876b4aa7379ddd8823abc9e
-
Filesize
387KB
MD581f6a58eb4c46ebf68ac1dbcdeef7901
SHA11732b02862a98c039055e1fd5b817b07af76659e
SHA25672fc82a07b19ffb5f2c8e2f292db1b0ab42c96b12ef10110562eddcc2297d3aa
SHA512b0d1325bdf8dcd2683e46f8dfb984fbf87b7d92d8ec3f2a0d8330a313d6ae26847ca5e4a0ec9bd65d8ef09344f2d489af9a2866b3b2a67377c14fccdca63f6cb
-
Filesize
3KB
MD537c7fffacfd8d7c1e0b02e06f235f935
SHA1732002b4fee161322b20356596f7454414288614
SHA256bec8b4d200e99955681b6b951554a397fe109f73c8840605a9a71f6435455dde
SHA51207de54acc27aedded20a105a2a3130049ca3362df5567b6ee365f745716b726378704133dc61c3f610a20a6be66a3f14e4d7bb0ed8c88b52de4b7214da5954b9
-
Filesize
5KB
MD5271bbf07cc8006c3335db6fc21622be4
SHA1cb0caf39bc1cab16ec8a39d6a11160865703c329
SHA2565d6e4701d424e8e095b95c98f87bb1946ac0254bd089d128c4a4c3e5b13ed5d7
SHA51265dd41d4bb119d1f3801dc3097254e967d747661c83bfe0cd3c061441b63e1dd4928a0476fbd4a015631ecf1d511d2f66ec87f2bd078b6bce0b86fdb659392c8
-
Filesize
4KB
MD52d8ec35eb48bf5cbc8c38a7a8d6cfa51
SHA14f43dc1a30731acba6d33b52c3970c9815f5be34
SHA2567b6d9330aba21844b6f267489d29f0e10b4beea3a749b72d5dec9e8761c98d3e
SHA5120a2f41f3e88132e56f7ce3c83e24753c80c9344011b0dcd943def8733b79d197e10ad5fba82be08f0054ec5d4c9af731f1a1eb4e041a93cd81c25b364087176e
-
Filesize
468KB
MD562401443a0feeb13a9940fcc78558090
SHA16200cf99b3a6a1bebde29378a6260ddf92d13370
SHA25669761c67078239fa4e05676e0974f7d7410de0f6f00d19f8f69c9a180c0d5de7
SHA5122001aa6875728c2ba75b1f8ee44fbb87a508598194f5ed6e5945292c2eb67874c3bc619da84a107ac0e5bc83748625eadcae0ccbd9f1f5414575db3fc3e92ce0
-
Filesize
140B
MD576477a794c43a2ceeac4d36bcbd62812
SHA1a6ece953e579d7f5f984adab8fda15d7e7fc6f26
SHA2561b333790bbfa99c3501165eeceace284e52464f55da967f76368096601164f6a
SHA5129207f5ccb7d0a49c69af41929be4082fb26bb8334727629be257cd4900b6e9b31336a7e2b989fdc45f8787f22eedd40e33c9264b43160f216bc28bb53f63720a
-
Filesize
4KB
MD5b8416a532c8e995dfb2789ff77fa5618
SHA1b5421c4f4ae3f27a9278b60d6ef683deb3111251
SHA256f93ff177d9d79a04d8a35a57689e9977babf939de260f27fbc832c0be981ca89
SHA51230dcc35db52f723490ea03df3abe5efc9374035a339f060a7468cae79bf8ba379538a87ad5217f0f0e06b741fe6497917b4226e65ac9c0e3026900244c3094b3
-
Filesize
473KB
MD50505f56cb8f0fbb8a6631060e703640d
SHA16b3bf0ffee4a57c52ea3558bd580130eff61ab1d
SHA25664bbb1bce626e4410ec86953c6e649b39b2e0ddf0d51e2722e54c48f78c196fa
SHA512086540b3a58320968f10a2908621b9ad2069b55d333cb5934b75a8eaf39e014b1f126dbf381030d3e8cc515cddcc4baed4098f61f58db184da3711aef063465a