Analysis
-
max time kernel
120s -
max time network
126s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
25-09-2024 09:01
Behavioral task
behavioral1
Sample
f5a80619f99b2bbe81ee25835b3f71fc_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
f5a80619f99b2bbe81ee25835b3f71fc_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
f5a80619f99b2bbe81ee25835b3f71fc_JaffaCakes118.exe
-
Size
1.7MB
-
MD5
f5a80619f99b2bbe81ee25835b3f71fc
-
SHA1
0e5b887dac29b5f931e4c3a577280f10eba46b38
-
SHA256
b7a16cb08484d1e58057ca2dd7666d315cde459b2b26ecf86855469a8f5a30a6
-
SHA512
5031abd527db133cb7e0e0877d397fa4054f5b2e1d3ad28e483edc409d79440495802cb74e6095dc497577bc57eb1ee9c72235e6f8d89ac804242ce0fa1c7cf9
-
SSDEEP
49152:bJoH3PXPrie5vQmbMB+GovrLTFbVURiOrbmaHUrv:bJo/XPD1b/FLT7aHmv
Malware Config
Signatures
-
Ardamax main executable 1 IoCs
resource yara_rule behavioral1/files/0x0005000000018710-27.dat family_ardamax -
Executes dropped EXE 2 IoCs
pid Process 2688 chargea.exe 2140 PXRY.exe -
Loads dropped DLL 10 IoCs
pid Process 1348 f5a80619f99b2bbe81ee25835b3f71fc_JaffaCakes118.exe 1348 f5a80619f99b2bbe81ee25835b3f71fc_JaffaCakes118.exe 2688 chargea.exe 2688 chargea.exe 2688 chargea.exe 2140 PXRY.exe 2140 PXRY.exe 2572 DllHost.exe 2688 chargea.exe 2572 DllHost.exe -
resource yara_rule behavioral1/memory/1348-5-0x0000000000400000-0x000000000065D000-memory.dmp themida behavioral1/memory/1348-7-0x0000000000400000-0x000000000065D000-memory.dmp themida behavioral1/memory/1348-47-0x0000000000400000-0x000000000065D000-memory.dmp themida -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\PXRY Agent = "C:\\Windows\\SysWOW64\\28463\\PXRY.exe" PXRY.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Drops file in System32 directory 6 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\28463 PXRY.exe File created C:\Windows\SysWOW64\28463\PXRY.001 chargea.exe File created C:\Windows\SysWOW64\28463\PXRY.006 chargea.exe File created C:\Windows\SysWOW64\28463\PXRY.007 chargea.exe File created C:\Windows\SysWOW64\28463\PXRY.exe chargea.exe File created C:\Windows\SysWOW64\28463\AKV.exe chargea.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language f5a80619f99b2bbe81ee25835b3f71fc_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language chargea.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language DllHost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language PXRY.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 1348 f5a80619f99b2bbe81ee25835b3f71fc_JaffaCakes118.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: 33 2140 PXRY.exe Token: SeIncBasePriorityPrivilege 2140 PXRY.exe -
Suspicious use of FindShellTrayWindow 2 IoCs
pid Process 2572 DllHost.exe 2572 DllHost.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1348 f5a80619f99b2bbe81ee25835b3f71fc_JaffaCakes118.exe 2140 PXRY.exe 2140 PXRY.exe 2140 PXRY.exe 2140 PXRY.exe 2140 PXRY.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 1348 wrote to memory of 2688 1348 f5a80619f99b2bbe81ee25835b3f71fc_JaffaCakes118.exe 30 PID 1348 wrote to memory of 2688 1348 f5a80619f99b2bbe81ee25835b3f71fc_JaffaCakes118.exe 30 PID 1348 wrote to memory of 2688 1348 f5a80619f99b2bbe81ee25835b3f71fc_JaffaCakes118.exe 30 PID 1348 wrote to memory of 2688 1348 f5a80619f99b2bbe81ee25835b3f71fc_JaffaCakes118.exe 30 PID 2688 wrote to memory of 2140 2688 chargea.exe 32 PID 2688 wrote to memory of 2140 2688 chargea.exe 32 PID 2688 wrote to memory of 2140 2688 chargea.exe 32 PID 2688 wrote to memory of 2140 2688 chargea.exe 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\f5a80619f99b2bbe81ee25835b3f71fc_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\f5a80619f99b2bbe81ee25835b3f71fc_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1348 -
C:\Users\Admin\AppData\Local\Temp\chargea.exe"C:\Users\Admin\AppData\Local\Temp\chargea.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2688 -
C:\Windows\SysWOW64\28463\PXRY.exe"C:\Windows\system32\28463\PXRY.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:2140
-
-
-
C:\Windows\SysWOW64\DllHost.exeC:\Windows\SysWOW64\DllHost.exe /Processid:{76D0CB12-7604-4048-B83C-1005C7DDC503}1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of FindShellTrayWindow
PID:2572
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\ATgAAAB9s-yu3hw3ph1ucnuMx9Uw9Xl6c4ADkn0_Fr4kQAH--GWK882PFWSu7y-pDIBjJqOWyONUFTrsA4W2hkttfpTHAJtU9VDEszLssP9rIwgF9KjnNcLlYXlo2g.jpg
Filesize33KB
MD5dc4f47613faa386b20396d842f297abc
SHA1af659cb4652aba0f8e87e8466c7fa65516a7d01a
SHA256f505b849065b4513bcd434b4641d3097402ae9437b7ef283db3abb36414566e2
SHA51245ee2cc4d8ec3b33ad0b4ae06b215b33a5602324b758811de66b44d9e18c9ee716910d08fcc6f37de2c4aff4560af78a737cc97ed2762f9aa3c317d2fd52d2ce
-
Filesize
533KB
MD54bd3f76dfb5f862db168072bf151683f
SHA1787e9b11d94205f22006b0474aca48c7912c2b12
SHA25651821fef2c7a636ea4bae3867949436b3713819d5401bc24043de085bc7d84d7
SHA512dab6a6fdcb6b5cbaac25bbc84d9d2eeab47bcabaecd57d1fa3ec3ee38fc6563f682473e3400a32ca6fe468602b2f356c7529fe1c7849a6f734a38e7875995046
-
Filesize
8KB
MD52b7027b6044715e98d73ef9a13b93d65
SHA1cb60a02d83b30599fa836dfc303a9542fc946c3e
SHA25649cb1dfc9e0656c382102bbdcddf9e186a97d01de77a85e9d12902bba3494d02
SHA5128e6dbbebb3b6913019e29f89d6d5f14c4619d09eb954ad0b99907976dcbc188e025253f29f9158877526dd50ba5505402d8f27c303f1b04827c94c68ace142b3
-
Filesize
395KB
MD5adabb1cc5c00784846c6f082f7e95f21
SHA10d1bf1674cd5b077e7e601874f3f438d2bcbc690
SHA2569797854eb963309d21e33e4edb092c01859d00465d7da76aa26d28da54a5f0ed
SHA51229ca5369514f53721099fd94d4cc50cd02b2815f255026611358c75e9161826fa17ba1043db6aae886adcd45be9616c19e706e405a14a11b24522e5278ca6f5f
-
Filesize
518B
MD5a88a80ae152542476d05d2cbc15e16c0
SHA1ae46d60c018a4a0941db906bd75fcee882b7a868
SHA2567a26f73955996270a66380ddfa7b746ad95cb6d3e09c33abe663bb9f63d6d203
SHA51260452b6fea855c91c75384eaa04e2a565738397085e0eb8e4c4b1243eec404ecdc7526c793359b917323a792373d0b0bb55195f19f8e5b907c43779f46cd7f93
-
Filesize
8KB
MD520efb1eb38ad96b4b5e85ed073e21883
SHA1b2680fe3698d768d1b72eab5afdd2d8b50a89c69
SHA256dd8045ef5d36c1b053806cef96c77dd2a9ebe4d9e3dcd6c480ef3ec16ff1894f
SHA5120f5fbe07a3a79f904456d3c112a8508cc2f37a328938b6fd2cef29c5183a404563a8fe21906d48318b5fef4f7326e48afe3d1213a4c913306070e5ebf263ad98
-
Filesize
5KB
MD584dd6324b3dce57f35d7c1d2d1a80492
SHA1d332d0076613ef7c15f74a3a105b2249654855d3
SHA256036a3db0118139b5e3767cb3a3714af80e508264ad97fbdeac7f4edf8c9561a9
SHA512659bb8ed05760b159bef3f587b5c4bcd37dd5e492225a3e7199456381889bf30d0659c36deb4f49fa19347769e3ad9ef75331f300724d39df8fd2ef98c24d6cc
-
Filesize
4KB
MD58ec77ec0a37da46ea4cfe747c450babd
SHA1cbcdb4fae0aca8a33dae7c4639e1bdfe8480353d
SHA256366e2c9fc249f38d5f0dda163488dc7c165def62421b34dfbe1c7a39d6bf0453
SHA51214e7946d352baa8fe8cbacefb267d1de9d0c00af7361d712923bb67c66acc6ac28d4c1be30871676a9a7b1750f17db6ee4df203370b413ab4551faa7a8cc1eeb
-
Filesize
473KB
MD54d1b16621c0698cc15407296046c5f13
SHA1895ad41339a41718bd8a7b49fe5f9df5861a5f62
SHA2562e17c5b2ee80ea87344c586a2049fd96a5a69ef53d9211399f503c62743c181c
SHA5125c2e431be346dd72e53b37817320f9c2df69823741e3b53313ffbe686266d4903633155f63812e81f605511320ec3b12b87b586bc930393716382af0be474ff8