Analysis
-
max time kernel
95s -
max time network
98s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
19-09-2024 13:01
Static task
static1
Behavioral task
behavioral1
Sample
eb631d5e7add23a6dc50e841a8c98c88_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
eb631d5e7add23a6dc50e841a8c98c88_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
eb631d5e7add23a6dc50e841a8c98c88_JaffaCakes118.exe
-
Size
149KB
-
MD5
eb631d5e7add23a6dc50e841a8c98c88
-
SHA1
8f83c560438574022f1d960dc599457e50999a9c
-
SHA256
4f56cc08c70c59b91b071909506d6061f2e5fd3071f9cf5fd21f12e08c71f4cd
-
SHA512
35a9c7d03fea0507a492e47c5e63da50c5703e37f1ba8eed852f378d22cd682d747fcd6ef487e80eaeec42cf5d36725dd72079bead90a2f6babc2d5718f4a2ed
-
SSDEEP
3072:eOOGY+qa9LqOAszNWTQ0hO+bH9FCOVclE0xuFX7C7kw5r6:wGpxYE0sIdFCOV/F27koO
Malware Config
Signatures
-
Ardamax main executable 1 IoCs
resource yara_rule behavioral2/files/0x0007000000023401-12.dat family_ardamax -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000\Control Panel\International\Geo\Nation eb631d5e7add23a6dc50e841a8c98c88_JaffaCakes118.exe -
Executes dropped EXE 1 IoCs
pid Process 4840 CKM.exe -
Loads dropped DLL 2 IoCs
pid Process 3600 eb631d5e7add23a6dc50e841a8c98c88_JaffaCakes118.exe 4840 CKM.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\CKM = "C:\\Windows\\SysWOW64\\CKM.exe" CKM.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Drops file in System32 directory 4 IoCs
description ioc Process File created C:\Windows\SysWOW64\CKM.001 eb631d5e7add23a6dc50e841a8c98c88_JaffaCakes118.exe File created C:\Windows\SysWOW64\CKM.006 eb631d5e7add23a6dc50e841a8c98c88_JaffaCakes118.exe File created C:\Windows\SysWOW64\CKM.007 eb631d5e7add23a6dc50e841a8c98c88_JaffaCakes118.exe File created C:\Windows\SysWOW64\CKM.exe eb631d5e7add23a6dc50e841a8c98c88_JaffaCakes118.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64 CKM.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language eb631d5e7add23a6dc50e841a8c98c88_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language CKM.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: 33 4840 CKM.exe Token: SeIncBasePriorityPrivilege 4840 CKM.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 4840 CKM.exe -
Suspicious use of SendNotifyMessage 1 IoCs
pid Process 4840 CKM.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 4840 CKM.exe 4840 CKM.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3600 wrote to memory of 4840 3600 eb631d5e7add23a6dc50e841a8c98c88_JaffaCakes118.exe 82 PID 3600 wrote to memory of 4840 3600 eb631d5e7add23a6dc50e841a8c98c88_JaffaCakes118.exe 82 PID 3600 wrote to memory of 4840 3600 eb631d5e7add23a6dc50e841a8c98c88_JaffaCakes118.exe 82
Processes
-
C:\Users\Admin\AppData\Local\Temp\eb631d5e7add23a6dc50e841a8c98c88_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\eb631d5e7add23a6dc50e841a8c98c88_JaffaCakes118.exe"1⤵
- Checks computer location settings
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3600 -
C:\Windows\SysWOW64\CKM.exe"C:\Windows\system32\CKM.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
PID:4840
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
4KB
MD5b3ce78b324bbaf657fa5dfb80270240d
SHA13eacec137e3e0c898e916dfebee4668aa2c6ef3d
SHA256da289a8e9545c71918bda3fa6f84e45eaec17a7016be8c885f35940aebfcd486
SHA5121494fa678289bee54ff554e1fd7e63ca38f22135d60afc7b95a566879592d00e9cf29fd2e31d541ad0881fd28c057928c467e002965a21944467232852fda068
-
Filesize
81B
MD5a7daac11f42f110338a74ba35cb5f0ba
SHA1eb7105d44c4085a0ff6bd69c23598735dec59a76
SHA25659daec54114434e32405eb0a4f1edd2b440a5e8c729ed5e97b84c9dd8742dc7a
SHA512ab1bf4c20778f724bc3dc3c617ee7b0e78f5db98e06b72e11b75462ec7da8b097ebe062e8606bef49fcb5d206af8086b30fa4f3d15e632232620c18a72b7f252
-
Filesize
4KB
MD52ae55889b93c5fac99ae642d1c9279b9
SHA1640ff431cf80e0e811a74060efdb0c27c2ac4459
SHA256b7025d43db6c92a011df5f8a5f90c6c4401875543a994dc3434ac52480a3941d
SHA51262b3b8c892ecfa40d08783f005064fdd0e7eebbb3459ee7f646b492f541f7907fbd9e479e60142ad9d2318dca693fc57cf57add079e33397a3f2c8667da0ee92
-
Filesize
244KB
MD53d940db5a36c4850146a7515f36bf64e
SHA177e61d2cddbfe4722f623197856a8053a9d6ca73
SHA256ba471b072fc8d13d946754e6cacc41c2c992581018bff3d051d4a07b5b2bc375
SHA512ab629b4436dcec4e65899bb9c66263a0d74a48be6ced4a5fd472b20959e858bc69772a1f74b5b20c06ec4860ff03d01bb20074d2c79b567b60480c80c1648d83