Analysis
-
max time kernel
120s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
15-09-2024 16:56
Static task
static1
Behavioral task
behavioral1
Sample
e2f52c4c59decf0fccf06de586d96e21_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
e2f52c4c59decf0fccf06de586d96e21_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
e2f52c4c59decf0fccf06de586d96e21_JaffaCakes118.exe
-
Size
963KB
-
MD5
e2f52c4c59decf0fccf06de586d96e21
-
SHA1
97bfb9c37442a44080f3c0646e77349446e363bc
-
SHA256
7531cf8bbe5733fe5af0030860f9fa29d5b24720433a527e5512950a8dd08627
-
SHA512
4568350403b0b4a4c4ef3930e79d72bf908a6ebec618e9079d5b6699f1701f0ba4cdaa1fa241678019b75f835f5c856e7c6c3785707a881ceaf1e2bf5649dcf4
-
SSDEEP
24576:9iITL62wFHYwKpUSM0OT5YnuTbx25Mxsd1MXwMh2y6xD2:93TG2w2pbMr5iu/5sd1XMhT6N
Malware Config
Signatures
-
Ardamax main executable 1 IoCs
resource yara_rule behavioral1/files/0x0007000000016cec-5.dat family_ardamax -
Executes dropped EXE 1 IoCs
pid Process 2476 GIN.exe -
Loads dropped DLL 2 IoCs
pid Process 2492 e2f52c4c59decf0fccf06de586d96e21_JaffaCakes118.exe 2476 GIN.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\GIN Start = "C:\\Windows\\SysWOW64\\GYJQKQ\\GIN.exe" GIN.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Drops file in System32 directory 5 IoCs
description ioc Process File created C:\Windows\SysWOW64\GYJQKQ\GIN.exe e2f52c4c59decf0fccf06de586d96e21_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\GYJQKQ\ GIN.exe File created C:\Windows\SysWOW64\GYJQKQ\GIN.004 e2f52c4c59decf0fccf06de586d96e21_JaffaCakes118.exe File created C:\Windows\SysWOW64\GYJQKQ\GIN.001 e2f52c4c59decf0fccf06de586d96e21_JaffaCakes118.exe File created C:\Windows\SysWOW64\GYJQKQ\GIN.002 e2f52c4c59decf0fccf06de586d96e21_JaffaCakes118.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language e2f52c4c59decf0fccf06de586d96e21_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language GIN.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2476 GIN.exe 2476 GIN.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: 33 2476 GIN.exe Token: SeIncBasePriorityPrivilege 2476 GIN.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
pid Process 2476 GIN.exe 2476 GIN.exe 2476 GIN.exe 2476 GIN.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2492 wrote to memory of 2476 2492 e2f52c4c59decf0fccf06de586d96e21_JaffaCakes118.exe 30 PID 2492 wrote to memory of 2476 2492 e2f52c4c59decf0fccf06de586d96e21_JaffaCakes118.exe 30 PID 2492 wrote to memory of 2476 2492 e2f52c4c59decf0fccf06de586d96e21_JaffaCakes118.exe 30 PID 2492 wrote to memory of 2476 2492 e2f52c4c59decf0fccf06de586d96e21_JaffaCakes118.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\e2f52c4c59decf0fccf06de586d96e21_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\e2f52c4c59decf0fccf06de586d96e21_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2492 -
C:\Windows\SysWOW64\GYJQKQ\GIN.exe"C:\Windows\system32\GYJQKQ\GIN.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:2476
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
61KB
MD5d02c94d02f324be4517cd570672a38eb
SHA1af21c078c41fbc66aac65e7afc782d1dfb9684f0
SHA256c6684fb800ddfaa11070587fc66c613eb96b00bf4534144a747fbc1b711cb965
SHA51245dd3aeb10cd17901509dad15c1f3bf941cf1771671ff3cdc7743c790066aaa16c659b511fdf375d4908ab5347f0aa1005e950272ffa9f5f5564ff757e65a685
-
Filesize
44KB
MD58e7df9075891cde8051cd8e40eeeddf7
SHA18156fd5804ee054a3160ba7f511134355508b128
SHA25630f963b1f86a713a53e6c3b9ec39f339158793e800406d245bfc9565272118d9
SHA51256f835ff92fbb41cc6aac150e5a99dfaa6bb0221f7e4e503136d7ee1d29c13d235607498ee5bac84407a9b56af9f895fcfdd5795706d3a9b99d7a69a14c5d780
-
Filesize
1KB
MD570fa389b2bab90fe29840be1cb42589a
SHA1f60e28bf4fdc91c32860d91c46559baefaf79a44
SHA256fda318e03e17035db643d618ed19d33b9f14b71db9c338d8723b9b4bd3a4adbe
SHA512961602568d192cfb3fad415a1cf37b8baa98f9da2d1adb5dbee1a0e5fd3905d11bd230c48803ab69f472c4a27f52548a1198156b45c58d9876555c03ed4aa264
-
Filesize
1.7MB
MD591dcc602af4df48468e5f60724f2e6fb
SHA13f466e5628c80891fc10822f85ac547d461aee6e
SHA2566067d9a2efd2176dcfc41db3d20cf6657cce911dba1bd6a08aac55bfea99830d
SHA512d671d43977fb9a3e892354768c16393edfc7d462226c3986b350b9aa6267751ebf4b4bbb269a4372313befdd26a1edf0927efb14f22f6f1a5706aae87fc2f67a