Analysis
-
max time kernel
122s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20240705-en -
resource tags
arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system -
submitted
23/08/2024, 07:17
Static task
static1
Behavioral task
behavioral1
Sample
bacd3aab6910a82ed5b64b210e92135c_JaffaCakes118.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
bacd3aab6910a82ed5b64b210e92135c_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
bacd3aab6910a82ed5b64b210e92135c_JaffaCakes118.exe
-
Size
1.2MB
-
MD5
bacd3aab6910a82ed5b64b210e92135c
-
SHA1
36d2f786c6f1699a8d309854fa2bb165cf93c4fc
-
SHA256
1784f7a5e094146e84d53f20d6d504a4cf353e369fc895ed81bc9bbd9950d5a7
-
SHA512
51e45d86cdb476ba192655627610bae691e3cc7a9a300492552ab14bb891a5273af904e4d75e47a675101790b370f52102a5371fc91d3ed94b8b57b93a265640
-
SSDEEP
24576:eITTy6nYLlB8G4yQAIl/VNagjl7AUMDgaWqnllZdLJaMcF8MGV0:e6TyQsX4yQAItasEpDgaW4lZdlaGQ
Malware Config
Signatures
-
Ardamax main executable 1 IoCs
resource yara_rule behavioral1/files/0x000500000001a3f7-20.dat family_ardamax -
Executes dropped EXE 2 IoCs
pid Process 2544 NEW.exe 2864 JII.exe -
Loads dropped DLL 1 IoCs
pid Process 2544 NEW.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\JII Start = "C:\\Windows\\SysWOW64\\FJDMVR\\JII.exe" JII.exe -
Drops file in System32 directory 5 IoCs
description ioc Process File created C:\Windows\SysWOW64\FJDMVR\JII.001 NEW.exe File created C:\Windows\SysWOW64\FJDMVR\JII.002 NEW.exe File created C:\Windows\SysWOW64\FJDMVR\AKV.exe NEW.exe File created C:\Windows\SysWOW64\FJDMVR\JII.exe NEW.exe File created C:\Windows\SysWOW64\FJDMVR\JII.004 NEW.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language NEW.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JII.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 3024 wrote to memory of 2544 3024 bacd3aab6910a82ed5b64b210e92135c_JaffaCakes118.exe 30 PID 3024 wrote to memory of 2544 3024 bacd3aab6910a82ed5b64b210e92135c_JaffaCakes118.exe 30 PID 3024 wrote to memory of 2544 3024 bacd3aab6910a82ed5b64b210e92135c_JaffaCakes118.exe 30 PID 3024 wrote to memory of 2544 3024 bacd3aab6910a82ed5b64b210e92135c_JaffaCakes118.exe 30 PID 2544 wrote to memory of 2864 2544 NEW.exe 32 PID 2544 wrote to memory of 2864 2544 NEW.exe 32 PID 2544 wrote to memory of 2864 2544 NEW.exe 32 PID 2544 wrote to memory of 2864 2544 NEW.exe 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\bacd3aab6910a82ed5b64b210e92135c_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\bacd3aab6910a82ed5b64b210e92135c_JaffaCakes118.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:3024 -
C:\Users\Admin\AppData\Local\Temp\NEW.exe"C:\Users\Admin\AppData\Local\Temp\NEW.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2544 -
C:\Windows\SysWOW64\FJDMVR\JII.exe"C:\Windows\system32\FJDMVR\JII.exe"3⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
PID:2864
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.2MB
MD549b98877ff5fe0d83e1df3d6a4fe595d
SHA11767463f9fe2fd38b664c3818b2309591a036480
SHA2569e6d7df6da98b564cba6cc6d449ba9ca8d704aa4d2e14cc2fb1f4ae82ac40d76
SHA512d387c25d96346cf54c951f93321414c6f64b58efe9ae810a0784d4a75de64967836e159e9bfc3399eb16165f50a3b4a2129c977a6fb3a2644fcebad2b418a5b2
-
Filesize
490KB
MD564a6cc55dc76d26448c30a8a1885f7cb
SHA1149e467026647e080b4c69ab4f99b2d3c2b4dbe4
SHA2565cbc0ec73c901be4ac182e13f6869f6f8cf0831b9603e542a3919f6a06087640
SHA512de8cd7bea8113871ce8a36966fbaefd02b8ef7b09a8cbb631b4ac353bdf65b27d5630146ed700fd6edbc4276f4368ebad76b772d9b84349ddc2bd6f7127c377d
-
Filesize
61KB
MD5bf311791d2f9ea9c82a8d4764a98c0d8
SHA1405ba2bd110590abd0bf340d12e054405afb011f
SHA256d720cf3d297743da7ab1da528f4c086a29d59ef553e1a96569b49a59831d583b
SHA5128be092f068807767b0065de10f9da386b90d8e587356881ba3391380b953b199e818b527e74b305d7c714fc94cb6f8e66c76d89d1785fa9910aa4cb39c5cada8
-
Filesize
44KB
MD5ce365878123962c3438e349621c10198
SHA15b861d9fc2923c61ef390a0b729a21078aa5fd59
SHA256ba254f6675490a045d4c85a5f46681c175c1321692c20fc808c7c244173dd63f
SHA512efc6f143d5e9244a6635562d7e9a9cea22ab7e7b304e933642a51d66da896e9038208b86c12f6da623a01b9175e73eeb40ab600e6625db3595144bfca1231a76
-
Filesize
1KB
MD5042ac0c0c95c3a5259214a77c69839a9
SHA1140d39a68fd998b318a2709adb347ef5e9541d9b
SHA25634d1d51c8ea3f1ebb03417ef954449e842fef2c55a7c27634af6e447b8311d5c
SHA51282b80d67e416bfa51d35d578b7a26be8cf104f8f8d6a3df90a64705a30dec42b39891896522c773890be33bd324238bca0a58484171885cfb4e936875fd66d76
-
Filesize
1.7MB
MD58f7590bbba70748e69612e9e2d5a9f2e
SHA1f3ad9834bc38f33fe501b9076c65ac29d0410578
SHA2562dec3a8fb4a5b198335e7f4a9b611194b0a081abf0c56f9df3f4e2697e69d9e4
SHA512347e9ac793afd627e064ecdfea61c3e2b626ace0ea41928aad93a72567048b8e9bdf773f8a4a59a0d96ce8c08612c542c15982e8051828bef025fea6132838c6