Analysis
-
max time kernel
126s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
22/08/2024, 16:22
Static task
static1
Behavioral task
behavioral1
Sample
b8524b2b1bc8241c408600cefdcde821_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
b8524b2b1bc8241c408600cefdcde821_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
b8524b2b1bc8241c408600cefdcde821_JaffaCakes118.exe
-
Size
1.2MB
-
MD5
b8524b2b1bc8241c408600cefdcde821
-
SHA1
72fb7b330842c12d91f4636f25e6c4d43574c9a7
-
SHA256
a9507d8377fde1343f92c5ba7f7c0721c5d1c4af5f317c64f10fb2a349c7431d
-
SHA512
b20e6f41755d0675a0e6ca9c92d567bea748054a599eb44e87cc06909133d975b9a9cd87e8a8884d509a86c2417982a76e8f74b2015364b3105dd766ea0fe82b
-
SSDEEP
24576:k65IkNmFqY8xl0qsBT/y1c6syYh/8VGQaztdeK/MW9h9ZFpbM+sEc+CUG6:H5hNSqzXQtB6s9d8cThdeE9h9zpfzX
Malware Config
Signatures
-
Ardamax main executable 1 IoCs
resource yara_rule behavioral1/files/0x0007000000015f16-28.dat family_ardamax -
Executes dropped EXE 1 IoCs
pid Process 2244 XRR.exe -
Loads dropped DLL 2 IoCs
pid Process 2156 b8524b2b1bc8241c408600cefdcde821_JaffaCakes118.exe 2244 XRR.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\XRR Start = "C:\\Windows\\SysWOW64\\WWFFYX\\XRR.exe" XRR.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Drops file in System32 directory 6 IoCs
description ioc Process File created C:\Windows\SysWOW64\WWFFYX\AKV.exe b8524b2b1bc8241c408600cefdcde821_JaffaCakes118.exe File created C:\Windows\SysWOW64\WWFFYX\XRR.exe b8524b2b1bc8241c408600cefdcde821_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\WWFFYX\ XRR.exe File created C:\Windows\SysWOW64\WWFFYX\XRR.004 b8524b2b1bc8241c408600cefdcde821_JaffaCakes118.exe File created C:\Windows\SysWOW64\WWFFYX\XRR.001 b8524b2b1bc8241c408600cefdcde821_JaffaCakes118.exe File created C:\Windows\SysWOW64\WWFFYX\XRR.002 b8524b2b1bc8241c408600cefdcde821_JaffaCakes118.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1404 set thread context of 2156 1404 b8524b2b1bc8241c408600cefdcde821_JaffaCakes118.exe 30 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language b8524b2b1bc8241c408600cefdcde821_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language b8524b2b1bc8241c408600cefdcde821_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language XRR.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: 33 2244 XRR.exe Token: SeIncBasePriorityPrivilege 2244 XRR.exe -
Suspicious use of SetWindowsHookEx 5 IoCs
pid Process 1404 b8524b2b1bc8241c408600cefdcde821_JaffaCakes118.exe 2244 XRR.exe 2244 XRR.exe 2244 XRR.exe 2244 XRR.exe -
Suspicious use of WriteProcessMemory 15 IoCs
description pid Process procid_target PID 1404 wrote to memory of 2156 1404 b8524b2b1bc8241c408600cefdcde821_JaffaCakes118.exe 30 PID 1404 wrote to memory of 2156 1404 b8524b2b1bc8241c408600cefdcde821_JaffaCakes118.exe 30 PID 1404 wrote to memory of 2156 1404 b8524b2b1bc8241c408600cefdcde821_JaffaCakes118.exe 30 PID 1404 wrote to memory of 2156 1404 b8524b2b1bc8241c408600cefdcde821_JaffaCakes118.exe 30 PID 1404 wrote to memory of 2156 1404 b8524b2b1bc8241c408600cefdcde821_JaffaCakes118.exe 30 PID 1404 wrote to memory of 2156 1404 b8524b2b1bc8241c408600cefdcde821_JaffaCakes118.exe 30 PID 1404 wrote to memory of 2156 1404 b8524b2b1bc8241c408600cefdcde821_JaffaCakes118.exe 30 PID 1404 wrote to memory of 2156 1404 b8524b2b1bc8241c408600cefdcde821_JaffaCakes118.exe 30 PID 1404 wrote to memory of 2156 1404 b8524b2b1bc8241c408600cefdcde821_JaffaCakes118.exe 30 PID 1404 wrote to memory of 2156 1404 b8524b2b1bc8241c408600cefdcde821_JaffaCakes118.exe 30 PID 1404 wrote to memory of 2156 1404 b8524b2b1bc8241c408600cefdcde821_JaffaCakes118.exe 30 PID 2156 wrote to memory of 2244 2156 b8524b2b1bc8241c408600cefdcde821_JaffaCakes118.exe 31 PID 2156 wrote to memory of 2244 2156 b8524b2b1bc8241c408600cefdcde821_JaffaCakes118.exe 31 PID 2156 wrote to memory of 2244 2156 b8524b2b1bc8241c408600cefdcde821_JaffaCakes118.exe 31 PID 2156 wrote to memory of 2244 2156 b8524b2b1bc8241c408600cefdcde821_JaffaCakes118.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\b8524b2b1bc8241c408600cefdcde821_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\b8524b2b1bc8241c408600cefdcde821_JaffaCakes118.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1404 -
C:\Users\Admin\AppData\Local\Temp\b8524b2b1bc8241c408600cefdcde821_JaffaCakes118.exe
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2156 -
C:\Windows\SysWOW64\WWFFYX\XRR.exe"C:\Windows\system32\WWFFYX\XRR.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:2244
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
465KB
MD54061e424a7e62d613aa16201364593c9
SHA184e5f41196523eddd24b62670ec8100632dbc933
SHA256d39b682a1de3541ce4858727a3206a0fb78d1e070e4dd60fab43c2537d1adfd9
SHA5123290348c02db1d9125d80b6e240544d51b0805240e113397d85a3fbdf3421172c8dd23e5631525db9258b7eedcdc228df3082041a017c664593eac698773f5fa
-
Filesize
61KB
MD54eb04b9187bbf3e3c33bf95e74eb6262
SHA1ca5dcaea5ef4ba48c0bb06635c0b5abed4f0f342
SHA256cf84d5704b350beaf1f2b46dc44bd372141d7554a8958ce22c0a84a3f21f2fe7
SHA512aeaa608cd4f66ba817a7e8698d17f9801c9cedf99875decff39bc18cebdec3947f02566bdf21d9096e5a6a6b740717ab06d46a2a9605bf8e8fa0fee12fe17e81
-
Filesize
43KB
MD51aed6fee0870288cdb607393fc2f33a1
SHA1584fd8d5ffbced19dd09b8b71cee9026c0ac65c6
SHA25602c4eef7045896258d00077e123719aa256c606f4e38c417965ba5f64d48e180
SHA51215e5b7843b07bcb4a638057b05712c66b285d70ace24ab3a4c125d24d538ace20cfac179accefa417d7790f7a095327affd3cd73d9eacaa632356f95a9fde3b8
-
Filesize
1KB
MD5473c4dfea14e331bc7361fe1d4835bc8
SHA11a9de9b5df14ec0081170e3640929f6966e6581e
SHA256ff2f438aad7382a01af834ae4847ee1a5a83ca6560849d883605f1f629f39ca5
SHA512fc6ea7429ea59fec5a96324d2c6a4935793ec520b27f10a035170552a907ca502070f24f6323f8e776cf67aa6a2e14643af3ea594734ed6e0d86104a6092848c
-
Filesize
1.5MB
MD5865b02aa4fb68ac150953986e6f63f1c
SHA1214190642d67f02c349e68f3f3c6ef0e9c2212d7
SHA256fac58547e80a1b9598261b6d2aa5175653831e507c57b6860bc5d04d2e754dff
SHA512473dc55a8a8f11d8445cef9cd8cabf8a9b227a6e47994ecfe9c86d41062641668d858e61b7ade1ad2801c5daa13d0630159b7ad241379e111c83564030c0a40e