Analysis
-
max time kernel
119s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
15-09-2024 15:44
Static task
static1
Behavioral task
behavioral1
Sample
e2d4d40ebaad5f9c1c1f179e65f3111d_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
e2d4d40ebaad5f9c1c1f179e65f3111d_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
e2d4d40ebaad5f9c1c1f179e65f3111d_JaffaCakes118.exe
-
Size
514KB
-
MD5
e2d4d40ebaad5f9c1c1f179e65f3111d
-
SHA1
4166ed2b5d2f9b1eee617c4948f4ec6f542dbce3
-
SHA256
7a75579b9f240ed9a3f61099dab0f94d444a7a58df461e6431ea9f1cebeb2a45
-
SHA512
1c196aee3f50ae220833b07ec976f66940127a7637c2afedc3f2aad5db32ec421348d50024054500477c85af25c7cbf2b302ba76b83abfa75a98fd3f57d58a68
-
SSDEEP
12288:KI6y3wDjyfB72B11lI5AlTqFR9S3c2fnkqHu3Y9SNTftfEjh0:UL525AhqRS3c2f3HWftfr
Malware Config
Signatures
-
Ardamax main executable 1 IoCs
resource yara_rule behavioral1/files/0x000700000001752f-9.dat family_ardamax -
Executes dropped EXE 1 IoCs
pid Process 3004 QONQ.exe -
Loads dropped DLL 2 IoCs
pid Process 2336 e2d4d40ebaad5f9c1c1f179e65f3111d_JaffaCakes118.exe 2336 e2d4d40ebaad5f9c1c1f179e65f3111d_JaffaCakes118.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\QONQ Agent = "C:\\Windows\\SysWOW64\\28463\\QONQ.exe" QONQ.exe -
Drops file in System32 directory 5 IoCs
description ioc Process File created C:\Windows\SysWOW64\28463\QONQ.006 e2d4d40ebaad5f9c1c1f179e65f3111d_JaffaCakes118.exe File created C:\Windows\SysWOW64\28463\QONQ.007 e2d4d40ebaad5f9c1c1f179e65f3111d_JaffaCakes118.exe File created C:\Windows\SysWOW64\28463\QONQ.exe e2d4d40ebaad5f9c1c1f179e65f3111d_JaffaCakes118.exe File created C:\Windows\SysWOW64\28463\AKV.exe e2d4d40ebaad5f9c1c1f179e65f3111d_JaffaCakes118.exe File created C:\Windows\SysWOW64\28463\QONQ.001 e2d4d40ebaad5f9c1c1f179e65f3111d_JaffaCakes118.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language e2d4d40ebaad5f9c1c1f179e65f3111d_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language QONQ.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2336 wrote to memory of 3004 2336 e2d4d40ebaad5f9c1c1f179e65f3111d_JaffaCakes118.exe 31 PID 2336 wrote to memory of 3004 2336 e2d4d40ebaad5f9c1c1f179e65f3111d_JaffaCakes118.exe 31 PID 2336 wrote to memory of 3004 2336 e2d4d40ebaad5f9c1c1f179e65f3111d_JaffaCakes118.exe 31 PID 2336 wrote to memory of 3004 2336 e2d4d40ebaad5f9c1c1f179e65f3111d_JaffaCakes118.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\e2d4d40ebaad5f9c1c1f179e65f3111d_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\e2d4d40ebaad5f9c1c1f179e65f3111d_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2336 -
C:\Windows\SysWOW64\28463\QONQ.exe"C:\Windows\system32\28463\QONQ.exe"2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
PID:3004
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
458KB
MD514f8412a6efc0043fdf855f6eff2217f
SHA199c8ada8c45b390c44e7daf706705a653914f85f
SHA25657dad901c66f57147e75656fa5b4df9fd62158b546dc7ceee18767f1ca95e6bc
SHA512cafbbb42a9b0877f1bcf17a0219d9570bee5878cccbfe2a30f947cff492d3bc089fed34dbf12e410031f9f70decccbaf3464c1e4e71d7d771efa048580bbeb81
-
Filesize
304B
MD5f2748aeeedef32ff250563c2968f6399
SHA1a0e89fc776637b22c3267eb83061845faa2a3f46
SHA25692b731a91af4fe738edf93a2d50732cf0c73d77a6c7dbccbe793ebf37e325f55
SHA5123be23a592680e8c42e9182b36b3c4b212dac967e2f166ece89da8a81cccfc1dab1ea977b25dc2aa74e85c8e474a130a36e9772e799954e7104f3d499c0432ebd
-
Filesize
8KB
MD5acfe714319d5092d079a46d20785dab8
SHA167c491b9abb9ecffa1c87ce9ec1d516cd5fd9715
SHA256832732c6ebefed88a2db93f73867ca0d5bd5b2a012ccbcfcf26e22bed6dc4fac
SHA512895b25109ae1d6b64c6383cd74e8354cda27aa4925c06d7ef90edb748fb7765a07253ce0f69b3d0a13f8c63d1d226df61f50a56fe05569d31a4a5265f4175a8f
-
Filesize
5KB
MD5dd462f9742de6d9d95459334538c2b1f
SHA18718400320b2aa38ff37dba0fe82062e5d3839bd
SHA256b172cb7ab44abac00ea09707fe8926aa327e01f22726a887fa0e8eb72cdf1e54
SHA512bc21d555ade6009250a892ef4b55f8ee96998dfafb3557da1e347297f0dc5f0e53e635f4b5d53261cccc46629adabd208fbc7a53fb826ff1606c47eb57e4537c
-
Filesize
4KB
MD5cde9827bcff03c6c1f883f693c8c6700
SHA1c2ce6d6a1dd2e17d8736e779ebe1f6d0383b4f46
SHA256ba4566adf8b2cd5a6afb6fcb2a43cd80139d1882f71f03ccd4d0eea71fac8252
SHA51211b901e644a52826c317435dc87872b55a36fa9d477530a030d1f137beb2710544b1f0e2fd23b3f6528f2f71ab55c66d219a87f1d5bc0f6ec0fd5aecd7659bc5
-
Filesize
567KB
MD54ea1467f05af54ad8c98ee4926aff85c
SHA1a377d95a18ed943cae552af415647ec6e9861c1e
SHA256b5a510cf3884c0217cafd5f378ce3eb389bd4e88eea5f662e5c364a6e3fb4476
SHA512049b8f935e96773f35f67d0ff6de74e6dda04f5add09964500a356184db0c3229943ef5a27df2b1e8098bf693e3016007272e797c37e99a1ebdce0999363963d