Analysis
-
max time kernel
122s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
25-09-2024 18:36
Static task
static1
Behavioral task
behavioral1
Sample
f69f1640e8b31b05990e6940c38a9c92_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
f69f1640e8b31b05990e6940c38a9c92_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
f69f1640e8b31b05990e6940c38a9c92_JaffaCakes118.exe
-
Size
1.1MB
-
MD5
f69f1640e8b31b05990e6940c38a9c92
-
SHA1
8c783f9aaf00453892b98b29fbc8e7705719a6c4
-
SHA256
bc6a91bf685fc28ee79f3f983a7a0d5457a414fe329b427de920a07bbbd6f49d
-
SHA512
e16dcfb5ce2d48fb3c102fbeb12573d55df68d51b35c34658b2cb6d1ca990fd18c952cc27414bd7a75990d0a1c8788a1b7563af39bd6ea5be0fe9136cbf9f590
-
SSDEEP
24576:yHvZT0U1eGwNqdkrvYXz4klAiNIpjA6z0QOTdGg5X/5INo:SBTHFwNqdkrgXzPW2WGQOxpXR4
Malware Config
Signatures
-
Ardamax main executable 1 IoCs
resource yara_rule behavioral1/files/0x00060000000193a4-10.dat family_ardamax -
Executes dropped EXE 1 IoCs
pid Process 2552 LYJ.exe -
Loads dropped DLL 3 IoCs
pid Process 2348 f69f1640e8b31b05990e6940c38a9c92_JaffaCakes118.exe 2552 LYJ.exe 2496 POWERPNT.EXE -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\LYJ Start = "C:\\Windows\\SysWOW64\\ATUHFQ\\LYJ.exe" LYJ.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Drops file in System32 directory 6 IoCs
description ioc Process File created C:\Windows\SysWOW64\ATUHFQ\LYJ.004 f69f1640e8b31b05990e6940c38a9c92_JaffaCakes118.exe File created C:\Windows\SysWOW64\ATUHFQ\LYJ.001 f69f1640e8b31b05990e6940c38a9c92_JaffaCakes118.exe File created C:\Windows\SysWOW64\ATUHFQ\LYJ.002 f69f1640e8b31b05990e6940c38a9c92_JaffaCakes118.exe File created C:\Windows\SysWOW64\ATUHFQ\AKV.exe f69f1640e8b31b05990e6940c38a9c92_JaffaCakes118.exe File created C:\Windows\SysWOW64\ATUHFQ\LYJ.exe f69f1640e8b31b05990e6940c38a9c92_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\ATUHFQ\ LYJ.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language f69f1640e8b31b05990e6940c38a9c92_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language LYJ.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language POWERPNT.EXE -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 2496 POWERPNT.EXE -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: 33 2552 LYJ.exe Token: SeIncBasePriorityPrivilege 2552 LYJ.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
pid Process 2552 LYJ.exe 2552 LYJ.exe 2552 LYJ.exe 2552 LYJ.exe -
Suspicious use of WriteProcessMemory 17 IoCs
description pid Process procid_target PID 2348 wrote to memory of 2552 2348 f69f1640e8b31b05990e6940c38a9c92_JaffaCakes118.exe 30 PID 2348 wrote to memory of 2552 2348 f69f1640e8b31b05990e6940c38a9c92_JaffaCakes118.exe 30 PID 2348 wrote to memory of 2552 2348 f69f1640e8b31b05990e6940c38a9c92_JaffaCakes118.exe 30 PID 2348 wrote to memory of 2552 2348 f69f1640e8b31b05990e6940c38a9c92_JaffaCakes118.exe 30 PID 2348 wrote to memory of 2496 2348 f69f1640e8b31b05990e6940c38a9c92_JaffaCakes118.exe 31 PID 2348 wrote to memory of 2496 2348 f69f1640e8b31b05990e6940c38a9c92_JaffaCakes118.exe 31 PID 2348 wrote to memory of 2496 2348 f69f1640e8b31b05990e6940c38a9c92_JaffaCakes118.exe 31 PID 2348 wrote to memory of 2496 2348 f69f1640e8b31b05990e6940c38a9c92_JaffaCakes118.exe 31 PID 2348 wrote to memory of 2496 2348 f69f1640e8b31b05990e6940c38a9c92_JaffaCakes118.exe 31 PID 2348 wrote to memory of 2496 2348 f69f1640e8b31b05990e6940c38a9c92_JaffaCakes118.exe 31 PID 2348 wrote to memory of 2496 2348 f69f1640e8b31b05990e6940c38a9c92_JaffaCakes118.exe 31 PID 2348 wrote to memory of 2496 2348 f69f1640e8b31b05990e6940c38a9c92_JaffaCakes118.exe 31 PID 2348 wrote to memory of 2496 2348 f69f1640e8b31b05990e6940c38a9c92_JaffaCakes118.exe 31 PID 2496 wrote to memory of 1856 2496 POWERPNT.EXE 32 PID 2496 wrote to memory of 1856 2496 POWERPNT.EXE 32 PID 2496 wrote to memory of 1856 2496 POWERPNT.EXE 32 PID 2496 wrote to memory of 1856 2496 POWERPNT.EXE 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\f69f1640e8b31b05990e6940c38a9c92_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\f69f1640e8b31b05990e6940c38a9c92_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2348 -
C:\Windows\SysWOW64\ATUHFQ\LYJ.exe"C:\Windows\system32\ATUHFQ\LYJ.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:2552
-
-
C:\Program Files (x86)\Microsoft Office\Office14\POWERPNT.EXE"C:\Program Files (x86)\Microsoft Office\Office14\POWERPNT.EXE" /s "C:\Users\Admin\AppData\Local\Temp\arriesgate.pps"2⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of WriteProcessMemory
PID:2496 -
C:\Windows\splwow64.exeC:\Windows\splwow64.exe 122883⤵PID:1856
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
84KB
MD5cf23edb3a9119bbe6fd1ad01244f3a00
SHA17f316eceb5ec656b2535f4d60c30cee5fe7267cd
SHA256c6f7a992e1cd53c9bd0cfbecbfbcee7a1e81728634bd9a294ed70f2046760202
SHA51268fc44ebe13a79782082b482143c82dcc604818087a4c42ac43d3e02de1fd2a60e898fc72b15703544d966309593d20e4c68af11953e155e8f8b8239b87c28ba
-
Filesize
461KB
MD57e335c1258740a5798c2b3eea5a97229
SHA16ce1e98ddc05a4b9e772901c9bc6caae4103267f
SHA256667ab5d791b89216a46f7dd3a1bcb9b7e5f235415a74a9678ca41cec051c462f
SHA5128c190dd139f5459a91c81871f53fc080a81c6397c68cb5b0ee195571012cc8af923b10cd77301da1816f935d36a0587d1c75126f5553005a0f50eb22d3441cb4
-
Filesize
61KB
MD59fca42b7fa3132ded471b886c4bf8a51
SHA186109ac13f8b63bd3467bbf05e39c5cf9bd11d26
SHA256c519bcfc50245700b30cb417478b46810443b03a6447387dd1d0a13966ff00dd
SHA512bbdd590e1bd2971fbc6a462f6501341c0808d658ba3407b051f9d299d9babf0632af092d64c6ad290d4ae5d9db8c367898a064bbea916c516c0a54066ad698ab
-
Filesize
43KB
MD54c30b3e90b3da5619bc0d5f53c025135
SHA1829f487b7c26f6cb8b7f211b2331abbc5229aa61
SHA256b632cedab7ce3d19eebc0d31864dc8c38cd249dcbde299cda818f7026ec294cf
SHA512fd0b36fb43c6b62f6d47455b392276d4e3710b204ef11c70cefed417740a4b5d9357ba37f612f3f87d539175af312ead05bc7a4360fe3e26fd43c56e856e6313
-
Filesize
1KB
MD508cd81bfb032afca0de47eba2065963c
SHA1edea4349eb6946c145133945025b05ab1e1170d9
SHA256d869cfa840b3f3f5b7a3794b2967388eb594783539a79a99b0ca6ec359b3caa0
SHA5129c4603d6f260613660cc898b693dc036ca180fc290172f4355e35b4f77f79b58a44a8e9af88601ef9d45bfee8aef8b9aa9d89c41d87d61aa41c807f2b872d3cf
-
Filesize
1.5MB
MD59c28244f2dbe3a4758b532838b0040c9
SHA14b58bb4033d43ae64af6c18db48d5d25e23f6121
SHA256cb770745d547a27a4b99fdbe27a672135f812b29d94fd2b843d06bb5aa1748aa
SHA51224ed3d4c6aae307a0f1bb1f063b211152644b06d7425a5fe24b09f5f747dd63011451cef3f47cc4985b3316cf1213c056d38768ccb7f44cb2fab28cf4e30e969