Analysis
-
max time kernel
140s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
15-09-2024 06:57
Static task
static1
Behavioral task
behavioral1
Sample
e1ef1a87e8870a258409381cf005c39c_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
e1ef1a87e8870a258409381cf005c39c_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
e1ef1a87e8870a258409381cf005c39c_JaffaCakes118.exe
-
Size
1.3MB
-
MD5
e1ef1a87e8870a258409381cf005c39c
-
SHA1
2eae3742bbd7585c0860981e90dd18e35b9ac732
-
SHA256
418423971a7dc99cb1e1f1676a39c359ef22b9a9941e51d151b12c13c8e55124
-
SHA512
f63c0a38c5fbcbe759ec119a81857239478e28ad2263d4f947813364c0852475959a42dc94dafb69a77c4e78a6795ab6f887622594770892bd71bcef91c42506
-
SSDEEP
24576:ZHvZTCpS7HweVGVAofbCOImY7GQRgbavM0/0o0KbqSauOpjDLXZcbRV2QyRPp:xBTCY7ZhKm75sav6oTbqSauaLXZcbRcf
Malware Config
Signatures
-
Ardamax main executable 1 IoCs
resource yara_rule behavioral1/files/0x0007000000016dea-7.dat family_ardamax -
Executes dropped EXE 2 IoCs
pid Process 2268 TAF.exe 2748 File Compare.exe -
Loads dropped DLL 6 IoCs
pid Process 2824 e1ef1a87e8870a258409381cf005c39c_JaffaCakes118.exe 2268 TAF.exe 2824 e1ef1a87e8870a258409381cf005c39c_JaffaCakes118.exe 2824 e1ef1a87e8870a258409381cf005c39c_JaffaCakes118.exe 2824 e1ef1a87e8870a258409381cf005c39c_JaffaCakes118.exe 2748 File Compare.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\TAF Start = "C:\\Windows\\SysWOW64\\LYSHVR\\TAF.exe" TAF.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Indicator Removal: File Deletion 1 TTPs
Adversaries may delete files left behind by the actions of their intrusion activity.
-
Drops file in System32 directory 7 IoCs
description ioc Process File created C:\Windows\SysWOW64\LYSHVR\TAF.exe e1ef1a87e8870a258409381cf005c39c_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\LYSHVR\ TAF.exe File created C:\Windows\SysWOW64\LYSHVR\TAF.004 e1ef1a87e8870a258409381cf005c39c_JaffaCakes118.exe File created C:\Windows\SysWOW64\LYSHVR\TAF.001 e1ef1a87e8870a258409381cf005c39c_JaffaCakes118.exe File created C:\Windows\SysWOW64\LYSHVR\TAF.002 e1ef1a87e8870a258409381cf005c39c_JaffaCakes118.exe File created C:\Windows\SysWOW64\LYSHVR\AKV.exe e1ef1a87e8870a258409381cf005c39c_JaffaCakes118.exe File created C:\Windows\SysWOW64\LYSHVR\TAF.003 e1ef1a87e8870a258409381cf005c39c_JaffaCakes118.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language e1ef1a87e8870a258409381cf005c39c_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language TAF.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language File Compare.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: 33 2268 TAF.exe Token: SeIncBasePriorityPrivilege 2268 TAF.exe Token: SeIncBasePriorityPrivilege 2268 TAF.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
pid Process 2268 TAF.exe 2268 TAF.exe 2268 TAF.exe 2268 TAF.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 2824 wrote to memory of 2268 2824 e1ef1a87e8870a258409381cf005c39c_JaffaCakes118.exe 30 PID 2824 wrote to memory of 2268 2824 e1ef1a87e8870a258409381cf005c39c_JaffaCakes118.exe 30 PID 2824 wrote to memory of 2268 2824 e1ef1a87e8870a258409381cf005c39c_JaffaCakes118.exe 30 PID 2824 wrote to memory of 2268 2824 e1ef1a87e8870a258409381cf005c39c_JaffaCakes118.exe 30 PID 2824 wrote to memory of 2748 2824 e1ef1a87e8870a258409381cf005c39c_JaffaCakes118.exe 31 PID 2824 wrote to memory of 2748 2824 e1ef1a87e8870a258409381cf005c39c_JaffaCakes118.exe 31 PID 2824 wrote to memory of 2748 2824 e1ef1a87e8870a258409381cf005c39c_JaffaCakes118.exe 31 PID 2824 wrote to memory of 2748 2824 e1ef1a87e8870a258409381cf005c39c_JaffaCakes118.exe 31 PID 2268 wrote to memory of 3024 2268 TAF.exe 33 PID 2268 wrote to memory of 3024 2268 TAF.exe 33 PID 2268 wrote to memory of 3024 2268 TAF.exe 33 PID 2268 wrote to memory of 3024 2268 TAF.exe 33
Processes
-
C:\Users\Admin\AppData\Local\Temp\e1ef1a87e8870a258409381cf005c39c_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\e1ef1a87e8870a258409381cf005c39c_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2824 -
C:\Windows\SysWOW64\LYSHVR\TAF.exe"C:\Windows\system32\LYSHVR\TAF.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2268 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c del C:\Windows\SysWOW64\LYSHVR\TAF.exe > nul3⤵
- System Location Discovery: System Language Discovery
PID:3024
-
-
-
C:\Users\Admin\AppData\Local\Temp\File Compare.exe"C:\Users\Admin\AppData\Local\Temp\File Compare.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:2748
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
459KB
MD528f68e988bfb6a7c9d45d23058cf74e5
SHA1a0740aea5602429f844cc7ba35c637d26c59edf9
SHA2561dd66d2320104e426a9d8ae390d3199a6ae2ecadb85e35eed9c6ed7a1819d478
SHA512dccc2cb961f86a0e11a27976d9f53043df895edf8ca624ace1be2b002b5ce2c372a833b87fdbeb518ada7666c72d01b9724f5ba203b301af444e1ac01104fcda
-
Filesize
43KB
MD594aba5bdc0756bc2ceb5f521c4b620c6
SHA1fbfd46ae5704c7dd6d63b959c1edb869f7dd19cf
SHA2565bc8115fdcbe153a33a3feb65bc9eefe4e2a0357a145525f05689054939779e3
SHA5120f4e154a0813f39f76acc95ec70b87241017d4210b44395bea9ef66c31f0da05503cf8ad665e03fd0c7aed8084e99bf3358de699bbcae2ffbe5176987640e33b
-
Filesize
68KB
MD5d60681fbc823778563c48ee4b60738a9
SHA1edba51b88c7d3e53e96cfc599722e786648b68e4
SHA256eecfbf0329505b64616240086a69538a02fa1e0fbc0e1d9032c27d80f10b97f4
SHA512e3b41bdf63330e53f4823039537bad120c174f7aed102b9fa3c67141afa16d4b6b6710b8cb4fbdb2e7c3f7fa3edff899dffd18ecc13961e5d61e402d947efa5c
-
Filesize
1KB
MD583e1df9d802f121b59c292213dd65870
SHA12186d3945dedf8e60082e82632d43ef81a914f9f
SHA2568eb1eb0c0293fc9667908ca7f217f1eda6df2d9f10ae66a225f0adea10965359
SHA51211a2c0d81dac2ecf666a1139382d2ee24df28c8c94eb06fe0f27de3dbb7e9ca88d0e77e1abf720aab28c89989cfa889de552477f08bd49fdd6df71b74c9ead52
-
Filesize
391KB
MD52951e0186e410bb029286648d145a4e0
SHA1e322e158d59a31eba57af7ac852835e4be563548
SHA2560888125019f61e0e1621f440af2e3b105e443e89ea2967d83194f577416854c8
SHA51292e8793607c055f7ff3d4ae2439bde9a6fddb33722fca315cd3d29641eb2a7d52b182d61079b1d5cca6fcc4c9ede276cfa0cdac0cdba7d632304f4217cd2d267
-
Filesize
61KB
MD5a2e848c23f0e2cca1974ea55e6a99779
SHA134a5a236c6bdfb6b9a47d5cd213147da7a507ad9
SHA256e852249a3fc489ee5c3fb4928dab911c4d826ef180f27faaa2f37a7179d231e4
SHA51270b67fd7368b0efdcaaad3cf8478b7519761afcb0578bded88f61bc357cbddf0c851e8248cab32c1d3b12dc933a33ccd23906aee695a9a9748a1d465566a108f
-
Filesize
1.5MB
MD5b2d5e28fcce82e8ee5e1c0b1502e8730
SHA12573726de59c9c342e3d77bf7436704e74ad90f4
SHA256b69590e97e053d49295aa1776526052caf3669579e81302825c954b0a4804095
SHA5120318b6cc12c373a200fdfd144af551c90e2db0219115c6d7d3ec43275f177831c71a06a1c9741cc9522defb293212375707df73e28824d4b37c1d8a6d7c0638b