General
-
Target
f2f29d15f7808b8f7abfe135f2ab201c_JaffaCakes118
-
Size
670KB
-
Sample
240923-xyxrta1hqe
-
MD5
f2f29d15f7808b8f7abfe135f2ab201c
-
SHA1
b33e398af7acaf52a4af6fc7117f40f46489f0e5
-
SHA256
cb2cd5a74a3ac0a52521e417e021bbdde60d71002203da5ff1e7e69d1775a7d4
-
SHA512
62240594d83d17aaef91d22932ee023aed98566ad6fc12c2b1328ab0f4ff583cd2a60e13104b60e0dab8294db65cd43fff36435d9444b82fa45181bf0847d8d3
-
SSDEEP
12288:trY7ESE9jFOpGcNHe+0bK+c9Qqvf+iSOAhFzgSm23+GIc0s90OsQj:lY7EScIphH1KKTFv5SDhKSmYVIc0s90u
Static task
static1
Behavioral task
behavioral1
Sample
f2f29d15f7808b8f7abfe135f2ab201c_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
f2f29d15f7808b8f7abfe135f2ab201c_JaffaCakes118.exe
Resource
win10v2004-20240802-en
Malware Config
Targets
-
-
Target
f2f29d15f7808b8f7abfe135f2ab201c_JaffaCakes118
-
Size
670KB
-
MD5
f2f29d15f7808b8f7abfe135f2ab201c
-
SHA1
b33e398af7acaf52a4af6fc7117f40f46489f0e5
-
SHA256
cb2cd5a74a3ac0a52521e417e021bbdde60d71002203da5ff1e7e69d1775a7d4
-
SHA512
62240594d83d17aaef91d22932ee023aed98566ad6fc12c2b1328ab0f4ff583cd2a60e13104b60e0dab8294db65cd43fff36435d9444b82fa45181bf0847d8d3
-
SSDEEP
12288:trY7ESE9jFOpGcNHe+0bK+c9Qqvf+iSOAhFzgSm23+GIc0s90OsQj:lY7EScIphH1KKTFv5SDhKSmYVIc0s90u
-
Ardamax main executable
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Indicator Removal: File Deletion
Adversaries may delete files left behind by the actions of their intrusion activity.
-
Maps connected drives based on registry
Disk information is often read in order to detect sandboxing environments.
-
Drops file in System32 directory
-