General
-
Target
bd229a3a17248f8cd4b8f224ce9d44b3_JaffaCakes118
-
Size
1020KB
-
Sample
240823-zsy4sswcpf
-
MD5
bd229a3a17248f8cd4b8f224ce9d44b3
-
SHA1
fb9206a0ace2e721842a86c76693199cd97ec344
-
SHA256
0e7f047f9e6ba43c544b6771d2c7becc67c1d01df9e691e442c16e36d66b3e2e
-
SHA512
611b74f394164b182c8867b0ed0ad92992709f8bbdb8a76735fd790d353ad09366dcdd552ad35cbc86c46045c26b3afeef219322abd0fcde56ccdf057e109fb0
-
SSDEEP
24576:xUFYB1OlMu9k2vwKhKKXd5rCDOzB9iKq8JIBfD2VdpUncPuhS:xt1O2BKlRzCDIB9iKq8SBC3pOcF
Static task
static1
Behavioral task
behavioral1
Sample
bd229a3a17248f8cd4b8f224ce9d44b3_JaffaCakes118.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
bd229a3a17248f8cd4b8f224ce9d44b3_JaffaCakes118.exe
Resource
win10v2004-20240802-en
Malware Config
Targets
-
-
Target
bd229a3a17248f8cd4b8f224ce9d44b3_JaffaCakes118
-
Size
1020KB
-
MD5
bd229a3a17248f8cd4b8f224ce9d44b3
-
SHA1
fb9206a0ace2e721842a86c76693199cd97ec344
-
SHA256
0e7f047f9e6ba43c544b6771d2c7becc67c1d01df9e691e442c16e36d66b3e2e
-
SHA512
611b74f394164b182c8867b0ed0ad92992709f8bbdb8a76735fd790d353ad09366dcdd552ad35cbc86c46045c26b3afeef219322abd0fcde56ccdf057e109fb0
-
SSDEEP
24576:xUFYB1OlMu9k2vwKhKKXd5rCDOzB9iKq8JIBfD2VdpUncPuhS:xt1O2BKlRzCDIB9iKq8SBC3pOcF
-
Ardamax main executable
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Indicator Removal: File Deletion
Adversaries may delete files left behind by the actions of their intrusion activity.
-
Drops file in System32 directory
-