Analysis
-
max time kernel
122s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
21-09-2024 21:21
Static task
static1
Behavioral task
behavioral1
Sample
f0a2e8a793e51910361edd2bdc8666c8_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
f0a2e8a793e51910361edd2bdc8666c8_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
f0a2e8a793e51910361edd2bdc8666c8_JaffaCakes118.exe
-
Size
1.0MB
-
MD5
f0a2e8a793e51910361edd2bdc8666c8
-
SHA1
014e4d34c67c35e9a82dff9aa828b865082ff5a9
-
SHA256
c59bab8d7c52d89ad8f1f7c9f427977f47b6777e8ec78de1633c19dcedb55a08
-
SHA512
7eb549bbd6698557e76656c25a55e553441661d08adc7395f738dd78af152ee061bc0a5d6af92685e0ccc2ec1f1d67e32b33628c346bb9fe6e59d79d153b1d50
-
SSDEEP
24576:+bPTdiJTqTI0LBK10z8h9k+iolFZq4kBwlqpYmHfFxG8I6cS:+7TGTqThlK10Se+HTZu+lq2mHj7/
Malware Config
Signatures
-
Ardamax main executable 1 IoCs
resource yara_rule behavioral1/files/0x0007000000016c36-7.dat family_ardamax -
Executes dropped EXE 1 IoCs
pid Process 2356 NDP.exe -
Loads dropped DLL 2 IoCs
pid Process 2512 f0a2e8a793e51910361edd2bdc8666c8_JaffaCakes118.exe 2356 NDP.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\NDP Start = "C:\\Windows\\SysWOW64\\NJMTCR\\NDP.exe" NDP.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Indicator Removal: File Deletion 1 TTPs
Adversaries may delete files left behind by the actions of their intrusion activity.
-
Drops file in System32 directory 6 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\NJMTCR\ NDP.exe File created C:\Windows\SysWOW64\NJMTCR\NDP.004 f0a2e8a793e51910361edd2bdc8666c8_JaffaCakes118.exe File created C:\Windows\SysWOW64\NJMTCR\NDP.001 f0a2e8a793e51910361edd2bdc8666c8_JaffaCakes118.exe File created C:\Windows\SysWOW64\NJMTCR\NDP.002 f0a2e8a793e51910361edd2bdc8666c8_JaffaCakes118.exe File created C:\Windows\SysWOW64\NJMTCR\AKV.exe f0a2e8a793e51910361edd2bdc8666c8_JaffaCakes118.exe File created C:\Windows\SysWOW64\NJMTCR\NDP.exe f0a2e8a793e51910361edd2bdc8666c8_JaffaCakes118.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language f0a2e8a793e51910361edd2bdc8666c8_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language NDP.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: 33 2356 NDP.exe Token: SeIncBasePriorityPrivilege 2356 NDP.exe Token: SeIncBasePriorityPrivilege 2356 NDP.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
pid Process 2356 NDP.exe 2356 NDP.exe 2356 NDP.exe 2356 NDP.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2512 wrote to memory of 2356 2512 f0a2e8a793e51910361edd2bdc8666c8_JaffaCakes118.exe 31 PID 2512 wrote to memory of 2356 2512 f0a2e8a793e51910361edd2bdc8666c8_JaffaCakes118.exe 31 PID 2512 wrote to memory of 2356 2512 f0a2e8a793e51910361edd2bdc8666c8_JaffaCakes118.exe 31 PID 2512 wrote to memory of 2356 2512 f0a2e8a793e51910361edd2bdc8666c8_JaffaCakes118.exe 31 PID 2356 wrote to memory of 2508 2356 NDP.exe 32 PID 2356 wrote to memory of 2508 2356 NDP.exe 32 PID 2356 wrote to memory of 2508 2356 NDP.exe 32 PID 2356 wrote to memory of 2508 2356 NDP.exe 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\f0a2e8a793e51910361edd2bdc8666c8_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\f0a2e8a793e51910361edd2bdc8666c8_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2512 -
C:\Windows\SysWOW64\NJMTCR\NDP.exe"C:\Windows\system32\NJMTCR\NDP.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2356 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c del C:\Windows\SysWOW64\NJMTCR\NDP.exe > nul3⤵
- System Location Discovery: System Language Discovery
PID:2508
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
449KB
MD583fec9657eb13e74504a6efb3f1aad0e
SHA1cb2f84288a5435bab248716c0855601ee66a5983
SHA2568ca4fb9f3830165b3e03b6797ba5f1147fa884e4c4a5f16f6d64620ba670d50d
SHA512ea7cce2c602497c8c6da31a00f90fb08a4b27d3593ca330dc16937dff518fbb22c89fbd47396a5c8cc740dd2589d2db577b570aaf898bb44c57999512a6f05b7
-
Filesize
61KB
MD51d6f0b3843d17046be7669262085fb67
SHA1703b2d00731920b77041908ee4ec44ed10d6f8f9
SHA25688c91de925b84024367fd2a0a2597ef884c16f424771ca1a17780fb4cff7c591
SHA51223c6e8c94908bce7400527c7ad4bdd030074d45c48421140eeee6a9e156571d5a31c4ad7bb0f2042b2dfceab14f36044c433c0b2d4cdee4dfed1dccb9b28188a
-
Filesize
43KB
MD54207e94e5371e60c5a1c8a3a1bf7169a
SHA1469d55baaed9f93dd74bdf41383a760fd8690342
SHA2560caf0bcee50026d048e8c02345be9d6aa387db5245d99c2dcc255c75eccbcec5
SHA512c85ed60aefd0bc7105760df5d969ab606e1d6775de20b11ef14b454fc27f1308e91111786895e42c38b019f286425f980ac113086809ed3c6babc778af5deec1
-
Filesize
376B
MD5bc96c84ef436210c9d666b631c36807b
SHA1f917724ec8449113584870f0e63cde72fc184960
SHA256ba2403c3af9d82e9f8a4949f3e9c9cf061c57b8a7bffb1ed2c87a1b04fd32f3e
SHA5126825eee924960f7fe1cd954ed92137915ff48d6701b4ee0f78d29759fb15d0a821704ad46013f5114230c4c51bd2ce29aa303060035cc2c7b2fe3222f908c428
-
Filesize
1.4MB
MD53c0034d74caf9846686a2d93fd3079ac
SHA1949adf7912c74ca8517d70f30b823264a5a7e067
SHA25655750ec7e5c987dbe2585f0e4b1728999b3bb94d5efd458f4aed75efa960855b
SHA5125c25cfbbdb2f794a484a2a1d9a454d9b13ab90cba0313ce995330e97516b422524cd388a357d211addfdfcec06d681edf131a3b98839a3f6d3d9863d97ad1399