Analysis
-
max time kernel
121s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
20-09-2024 15:59
Static task
static1
Behavioral task
behavioral1
Sample
edf0a3c05c3d37ea794153d51022524b_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
edf0a3c05c3d37ea794153d51022524b_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
edf0a3c05c3d37ea794153d51022524b_JaffaCakes118.exe
-
Size
3.2MB
-
MD5
edf0a3c05c3d37ea794153d51022524b
-
SHA1
821ec3c1e69ebe493f810660958bfe97f48b6d12
-
SHA256
1d82737a80016f0c598b58be9842a834b39c1f21a31d3a4882202d44275a3afb
-
SHA512
be2c697706274d4fb1eaa755263c7a04412763a1f3d1ce1b216f8fd7f61e3973456bf056af3a43db898dae2a7dba1a7b5da85687fab9e84a2879380bca60e32e
-
SSDEEP
24576:vjx1BlBdVF7WfWYKjl32hUnXHjA3h3qeVF9NLqnCQ9YzfuI1M3zJTaYG0rP/2jzZ:vv7PYrU3MRrX9NLA9YN1M7G0e4/YfT
Malware Config
Signatures
-
Ardamax main executable 1 IoCs
resource yara_rule behavioral1/files/0x00060000000193b4-24.dat family_ardamax -
Executes dropped EXE 1 IoCs
pid Process 2180 NJK.exe -
Loads dropped DLL 2 IoCs
pid Process 2172 vbc.exe 2180 NJK.exe -
Uses the VBS compiler for execution 1 TTPs
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\NJK Start = "C:\\Windows\\SysWOW64\\OTNHBA\\NJK.exe" NJK.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Drops file in System32 directory 6 IoCs
description ioc Process File created C:\Windows\SysWOW64\OTNHBA\NJK.002 vbc.exe File created C:\Windows\SysWOW64\OTNHBA\AKV.exe vbc.exe File created C:\Windows\SysWOW64\OTNHBA\NJK.exe vbc.exe File opened for modification C:\Windows\SysWOW64\OTNHBA\ NJK.exe File created C:\Windows\SysWOW64\OTNHBA\NJK.004 vbc.exe File created C:\Windows\SysWOW64\OTNHBA\NJK.001 vbc.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2236 set thread context of 2172 2236 edf0a3c05c3d37ea794153d51022524b_JaffaCakes118.exe 32 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language edf0a3c05c3d37ea794153d51022524b_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vbc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language NJK.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2180 NJK.exe 2180 NJK.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: 33 2180 NJK.exe Token: SeIncBasePriorityPrivilege 2180 NJK.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
pid Process 2180 NJK.exe 2180 NJK.exe 2180 NJK.exe 2180 NJK.exe -
Suspicious use of WriteProcessMemory 19 IoCs
description pid Process procid_target PID 2236 wrote to memory of 2084 2236 edf0a3c05c3d37ea794153d51022524b_JaffaCakes118.exe 31 PID 2236 wrote to memory of 2084 2236 edf0a3c05c3d37ea794153d51022524b_JaffaCakes118.exe 31 PID 2236 wrote to memory of 2084 2236 edf0a3c05c3d37ea794153d51022524b_JaffaCakes118.exe 31 PID 2236 wrote to memory of 2084 2236 edf0a3c05c3d37ea794153d51022524b_JaffaCakes118.exe 31 PID 2236 wrote to memory of 2172 2236 edf0a3c05c3d37ea794153d51022524b_JaffaCakes118.exe 32 PID 2236 wrote to memory of 2172 2236 edf0a3c05c3d37ea794153d51022524b_JaffaCakes118.exe 32 PID 2236 wrote to memory of 2172 2236 edf0a3c05c3d37ea794153d51022524b_JaffaCakes118.exe 32 PID 2236 wrote to memory of 2172 2236 edf0a3c05c3d37ea794153d51022524b_JaffaCakes118.exe 32 PID 2236 wrote to memory of 2172 2236 edf0a3c05c3d37ea794153d51022524b_JaffaCakes118.exe 32 PID 2236 wrote to memory of 2172 2236 edf0a3c05c3d37ea794153d51022524b_JaffaCakes118.exe 32 PID 2236 wrote to memory of 2172 2236 edf0a3c05c3d37ea794153d51022524b_JaffaCakes118.exe 32 PID 2236 wrote to memory of 2172 2236 edf0a3c05c3d37ea794153d51022524b_JaffaCakes118.exe 32 PID 2236 wrote to memory of 2172 2236 edf0a3c05c3d37ea794153d51022524b_JaffaCakes118.exe 32 PID 2236 wrote to memory of 2172 2236 edf0a3c05c3d37ea794153d51022524b_JaffaCakes118.exe 32 PID 2236 wrote to memory of 2172 2236 edf0a3c05c3d37ea794153d51022524b_JaffaCakes118.exe 32 PID 2172 wrote to memory of 2180 2172 vbc.exe 33 PID 2172 wrote to memory of 2180 2172 vbc.exe 33 PID 2172 wrote to memory of 2180 2172 vbc.exe 33 PID 2172 wrote to memory of 2180 2172 vbc.exe 33
Processes
-
C:\Users\Admin\AppData\Local\Temp\edf0a3c05c3d37ea794153d51022524b_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\edf0a3c05c3d37ea794153d51022524b_JaffaCakes118.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2236 -
C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exeC:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe2⤵PID:2084
-
-
C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exeC:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe2⤵
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2172 -
C:\Windows\SysWOW64\OTNHBA\NJK.exe"C:\Windows\system32\OTNHBA\NJK.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:2180
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
490KB
MD521f362e0d289ba822e526fced424c1f2
SHA121118c5c57264eb48a0fde577ec06d4cb07a404c
SHA2567c561dea779006b50d5befeef48a965dbef1c3b807983bb6411adf27a8c87779
SHA512349459969f00fc06e5cc9479d1e0860b371170ac787bcab03c46e27d3bec7f909d22c8ee76d3e6f75e43a8f73a074a8cf3021a87a86fedcc7af611ea41346399
-
Filesize
61KB
MD593c2eac6b4d476a04730266ec1523f8a
SHA1d53544650a95769d90c89fa90039399cb8d7e054
SHA256898d4ed4dc6b52db670bf57bd859ae6e1c25230b28a69e7d0e548bae6941cba8
SHA5129dc516552c08af9600ebabb025bfed1b9a8f16aafbf1cb7530af7254847264399a118a3bbf980e54ad01542fb4c0df55699d207ac44d85bd0eb94067b1a0bae0
-
Filesize
44KB
MD592fc2d978e3dcc66dbbe6ddde516dd75
SHA12e31d1a209193872fc7f494274b17f582bb137c0
SHA256a89bebf2e88c1055b1d38bb715a7efeef93c18d5ec1d32a171ae354ccba4087c
SHA51250d859f3abaf2d2bcf563a0bf0f47b3be0d1ea0f345fc69f5c9a3635d359798c068e4516803c7b8bd0a61b01b3bb1ece0a4703a278144acfa877311317a959ba
-
Filesize
1KB
MD50a569dca13d49af293f0fdbfaf53b81c
SHA118debfdcdfdff2f42b2bf33cd2726735715acfd6
SHA256b92fb65db884007fc3e8e09bb7a3f78357068c96ef2b2b53e6a82a8c20936b05
SHA5127579f9c87ac636cdd8e31d5a6cd6a0f0d5163c87c211acd5bac8383be58ad4f9352a5837150ee96499f7f0c15bb547bc7beef384a11b29496dd72049e3aa5f10
-
Filesize
1.7MB
MD5851f20b20b52b01ee3e1000c89b47c93
SHA1f46b94a834d6ba980b096747d725bd975d5d0dbc
SHA25610b92386e4d23ae4fecbe8f5114bf494cf6012d379a1dd694b5130d5900e7651
SHA5120eedbd7be28f504c87308552c780b9597d19b9cf220e3995f0d6f351ce21cf2a16f9969d4ed22170151373b5e0c8b9fa62b5b3feb7ecf335606d5d0e7ca6761e