Analysis
-
max time kernel
141s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
19-09-2024 16:16
Static task
static1
Behavioral task
behavioral1
Sample
ebb68d587792734a41d2cc9cb4108883_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
ebb68d587792734a41d2cc9cb4108883_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
ebb68d587792734a41d2cc9cb4108883_JaffaCakes118.exe
-
Size
261KB
-
MD5
ebb68d587792734a41d2cc9cb4108883
-
SHA1
8b72589a0369088c6bebd51c6866d732f984e20d
-
SHA256
10e4be086813a732d597f944e48ac2d5fe383e9969c9f6cfb681fad7e60afb2a
-
SHA512
d675454c5b7b94f2a8abc222ef5835f864ea8b64c86231845cb148fad6b2be1119922f4bc682e673a79338d4bb8ef17a5855cb1ebc361524e448de74e01b8921
-
SSDEEP
6144:OmNs4fAfqVMewEXc6UXWDc9MP92k51vuEuRR:OmNs4cqVMYs6UmBwPR
Malware Config
Signatures
-
Ardamax main executable 1 IoCs
resource yara_rule behavioral1/files/0x000600000001926a-9.dat family_ardamax -
Executes dropped EXE 2 IoCs
pid Process 2072 NSK.exe 2392 bafometro.exe -
Loads dropped DLL 6 IoCs
pid Process 3048 ebb68d587792734a41d2cc9cb4108883_JaffaCakes118.exe 3048 ebb68d587792734a41d2cc9cb4108883_JaffaCakes118.exe 3048 ebb68d587792734a41d2cc9cb4108883_JaffaCakes118.exe 2072 NSK.exe 3048 ebb68d587792734a41d2cc9cb4108883_JaffaCakes118.exe 3048 ebb68d587792734a41d2cc9cb4108883_JaffaCakes118.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\NSK = "C:\\Windows\\SysWOW64\\NSK.exe" NSK.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Drops file in System32 directory 4 IoCs
description ioc Process File created C:\Windows\SysWOW64\NSK.exe ebb68d587792734a41d2cc9cb4108883_JaffaCakes118.exe File created C:\Windows\SysWOW64\NSK.001 ebb68d587792734a41d2cc9cb4108883_JaffaCakes118.exe File created C:\Windows\SysWOW64\NSK.006 ebb68d587792734a41d2cc9cb4108883_JaffaCakes118.exe File created C:\Windows\SysWOW64\NSK.007 ebb68d587792734a41d2cc9cb4108883_JaffaCakes118.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64 NSK.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ebb68d587792734a41d2cc9cb4108883_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language NSK.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language bafometro.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: 33 2072 NSK.exe Token: SeIncBasePriorityPrivilege 2072 NSK.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2072 NSK.exe -
Suspicious use of SendNotifyMessage 1 IoCs
pid Process 2072 NSK.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2072 NSK.exe 2072 NSK.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 3048 wrote to memory of 2072 3048 ebb68d587792734a41d2cc9cb4108883_JaffaCakes118.exe 30 PID 3048 wrote to memory of 2072 3048 ebb68d587792734a41d2cc9cb4108883_JaffaCakes118.exe 30 PID 3048 wrote to memory of 2072 3048 ebb68d587792734a41d2cc9cb4108883_JaffaCakes118.exe 30 PID 3048 wrote to memory of 2072 3048 ebb68d587792734a41d2cc9cb4108883_JaffaCakes118.exe 30 PID 3048 wrote to memory of 2392 3048 ebb68d587792734a41d2cc9cb4108883_JaffaCakes118.exe 31 PID 3048 wrote to memory of 2392 3048 ebb68d587792734a41d2cc9cb4108883_JaffaCakes118.exe 31 PID 3048 wrote to memory of 2392 3048 ebb68d587792734a41d2cc9cb4108883_JaffaCakes118.exe 31 PID 3048 wrote to memory of 2392 3048 ebb68d587792734a41d2cc9cb4108883_JaffaCakes118.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\ebb68d587792734a41d2cc9cb4108883_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\ebb68d587792734a41d2cc9cb4108883_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3048 -
C:\Windows\SysWOW64\NSK.exe"C:\Windows\system32\NSK.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
PID:2072
-
-
C:\Users\Admin\AppData\Local\Temp\bafometro.exe"C:\Users\Admin\AppData\Local\Temp\bafometro.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2392
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD5100d5d6fb19e30525c2a1e50d8264577
SHA127488ac68647ec87dd981ff826932ae5cd9d9450
SHA256a0e18be4811e1c0c7e06ae836296d16787140f9ff46156511972bdf32fb51015
SHA512416bb6f978f16931c44b4bfc4eccecbf8bb40ecca53436e127dc104d6634f201cf366d3e9179456587bb8e7bb18cbdef3a0d6da27d4046747dec243fcdc2a8cb
-
Filesize
4KB
MD5ccfd350414f3804bbb32ddd7eb3f6153
SHA1e91d270b8481d456a3beabf617ef3379a93f1137
SHA2561dabedfe9c7cda2d8aa74c95ba57fb832a4066b20f4051c0330b4422de237eb3
SHA512328e069aaced9217eb9f4b4f20e27cd7ef933427e3388b3a0829089d694ea2280a2e5511a9eb577cec2a7b409cf367b0f17d8654076931648e152936fad810bd
-
Filesize
212KB
MD50b69bead0fd93128cda7980c4bf9344f
SHA12e179c08feb9ff3c0a36c5215784e62354f6cf44
SHA2561c0adc42188797023bd2ae06c0225004e32fddd8fdbedb48092a5f44961a9580
SHA51287c78ade59dc8346cc7cae3c7815cbd8b850869919e2e03f4a8ded317c653a51155db07d21c0de50c94ffd6a058756af007cfebf8302c3290f8471ae87abeea8
-
Filesize
4KB
MD50868167c8915fb3d87d4e5a775a57ffd
SHA15f223134e003382fd8c191a1f4ca94922f1d802e
SHA2566a28449ee15745e772f877b6133913325400a2ca3dbf829d76cf42e0c8d6da4c
SHA512d9f82239d6990b3dcc261f99f5acf20d71965b08146821575f830698fa07a5ec7ba0553494bb779e427692ada39ed5973489d1077aeec5ddfdf5a73d9c91b058
-
Filesize
239KB
MD52bada91f44e2a5133a5c056b31866112
SHA19fbe664832d04d79f96fa090191b73d9811ef08d
SHA256c742feab59b4e1b7b188b02ed91ab34eaeb83c87ac6babfb5f08649ed2b8cd02
SHA512dc797a06061937f8dd657a34d4373d3069c9c1a6752752516042e5d135fc41257c7a3a6738b3accd626a02f1887476197eca0ab28cf568daf57269cbe9c8eb41