Analysis
-
max time kernel
122s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
03-10-2024 20:08
Static task
static1
Behavioral task
behavioral1
Sample
105a4c3d657448b936e4791379fda682_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
105a4c3d657448b936e4791379fda682_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
105a4c3d657448b936e4791379fda682_JaffaCakes118.exe
-
Size
528KB
-
MD5
105a4c3d657448b936e4791379fda682
-
SHA1
c1cc85d8b115f9815c3ed69d95bb53891cdc7fd8
-
SHA256
dc0b0f4d3081ac3fcce1405383afc2ab450b1396ff9ae5e2875887e4d2f1be6f
-
SHA512
74107752b05b6f2f2eb93e4fac30ffd6d366206ef82d01e0111f2f93566b61ac08a4ab0a7f86ad23510406ea439e77945d49d8604227c72a55f502f5472ce129
-
SSDEEP
12288:cl7ZjNHasczx1gab+c9sMvkIluNJmbt3Kzrxe+m7MoS:UZjN6sczfgq+ovkIsNMKzrxkMoS
Malware Config
Signatures
-
Ardamax main executable 1 IoCs
resource yara_rule behavioral1/files/0x000500000001934d-22.dat family_ardamax -
Executes dropped EXE 2 IoCs
pid Process 2728 2.exe 2212 CPVN.exe -
Loads dropped DLL 5 IoCs
pid Process 2728 2.exe 2728 2.exe 2728 2.exe 2212 CPVN.exe 2212 CPVN.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\CPVN Agent = "C:\\Windows\\SysWOW64\\28463\\CPVN.exe" CPVN.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Drops file in System32 directory 8 IoCs
description ioc Process File created C:\Windows\SysWOW64\28463\AKV.exe 2.exe File created C:\Windows\SysWOW64\28463\CPVN.004 2.exe File created C:\Windows\SysWOW64\28463\CPVN.003 2.exe File opened for modification C:\Windows\SysWOW64\28463 CPVN.exe File created C:\Windows\SysWOW64\28463\CPVN.001 2.exe File created C:\Windows\SysWOW64\28463\CPVN.006 2.exe File created C:\Windows\SysWOW64\28463\CPVN.007 2.exe File created C:\Windows\SysWOW64\28463\CPVN.exe 2.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language CPVN.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: 33 2212 CPVN.exe Token: SeIncBasePriorityPrivilege 2212 CPVN.exe -
Suspicious use of SetWindowsHookEx 5 IoCs
pid Process 2212 CPVN.exe 2212 CPVN.exe 2212 CPVN.exe 2212 CPVN.exe 2212 CPVN.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 1648 wrote to memory of 2728 1648 105a4c3d657448b936e4791379fda682_JaffaCakes118.exe 33 PID 1648 wrote to memory of 2728 1648 105a4c3d657448b936e4791379fda682_JaffaCakes118.exe 33 PID 1648 wrote to memory of 2728 1648 105a4c3d657448b936e4791379fda682_JaffaCakes118.exe 33 PID 1648 wrote to memory of 2728 1648 105a4c3d657448b936e4791379fda682_JaffaCakes118.exe 33 PID 2728 wrote to memory of 2212 2728 2.exe 34 PID 2728 wrote to memory of 2212 2728 2.exe 34 PID 2728 wrote to memory of 2212 2728 2.exe 34 PID 2728 wrote to memory of 2212 2728 2.exe 34
Processes
-
C:\Users\Admin\AppData\Local\Temp\105a4c3d657448b936e4791379fda682_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\105a4c3d657448b936e4791379fda682_JaffaCakes118.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:1648 -
C:\Users\Admin\AppData\Local\Temp\2.exe"C:\Users\Admin\AppData\Local\Temp\2.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2728 -
C:\Windows\SysWOW64\28463\CPVN.exe"C:\Windows\system32\28463\CPVN.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:2212
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
490KB
MD56d85767d24b252652245db44424c41de
SHA1cdc99eb21587b892ec505265206097d4f907e95d
SHA25661ac1588207d84df19311c2d50d1c13b36b60f6df95ba8a3c740366431f15e0f
SHA51252a3498f95bd25ea90399093cf0c49ca2b15f8167943857de800787bbca4a60bc0801f1535473bb71714366b228b69199120c4b63b6098fc39ee5518e5f0f06b
-
Filesize
394KB
MD5b87e2e56dbf34fb12705317f4d361c12
SHA13b4a6c2fddaab9f71747437c60dc7ad85661b4fa
SHA2561ed5873542484a3f4c898de6684fc04bc0929e4fc795cd09b4b86f17e817d85a
SHA5129d1bf05a200efda561f3141d3a4c70a347ba2a64fbfb5fb9b432956660b4aabc492f93fa50ba1928a3c408ec048c357a50cb79d12ba6200b28b1aeb98dbc39a0
-
Filesize
400B
MD56eca657d6389fc25fe426924e1e67a96
SHA1509ba297930db1f3e90a53fc161f7f06262be361
SHA256f251af1ba2be40eef201d3cfebc53c22702feaa116ab092e393472c2fbd4075a
SHA5123acabcad2201955309f126ac7265999d9beab76c23f3803beb7d0f2426ed41668e21d34c461a6a9420a718c99ae66f5041509b8b29b21df0a008996c4df66892
-
Filesize
14KB
MD5a0ce5cac85b0d667ce2a7c6fa23bfb3f
SHA19b40f537f10e77a37d33ab580d1dda16a87c1715
SHA2569e9bf0727756fc07aa01fa08e204fb293fd2e16afd57b7b4ae6e7c258ff9af21
SHA512daee767df015e0dd9c0e56708fae6c0e339f6b8654d62c1e75aaa0c1d86a40ad028055b7f70385e7cb8d1ad65272a7c8ed8d62435ddcf3c75234c35a79898046
-
Filesize
8KB
MD5aae8ccee5d5eed5748d13f474123efea
SHA16da78da4de3b99a55fad00be2ec53a3ad3bd06ae
SHA25610c464d1675774e0282171555d59fb8975ed6c0e6a781182490f48e66823a5b8
SHA512d370e1ffeeb81b3f07b83a9cf1e3b44635fde7aa6ac999bccafece8091dbf96f0a78257bb0e03b3689dc47fb4e96ec7deac7848a43ddef62afc9b8cc665ee8bd
-
Filesize
5KB
MD540685d22d05d92462a2cfc1bba9a81b7
SHA1f0e19012d0ed000148898b1e1264736bed438da8
SHA256cdca1e5bc4c5129caa8eeddf637c820b6241c8790ce1a341e38e8324ae95afa0
SHA51221961d2dd118b45bde4cf00b4570712791a22769d05afb5b6c54355b0aaee9b7f7de00b357845349ef957807452365134d51e11181d2d45f98ed0cc9402de90b
-
Filesize
4KB
MD527092ec75c1839f36bfe900a38acc484
SHA1fe14b750a0ed653246c5f358891f8c1241913bb2
SHA256e6e29699840ae26c452227f9a1c9fd0e3cda0c2413c4255df9fc066c47af0e07
SHA512815477e8681e38dd3110171adbaf06738eb9d63839671a959a296ec1a1fb17d788682dde5e6a1f0bffa3b4deda4577292ffa37ce10b95ad14276ffcd0795ac0b
-
Filesize
473KB
MD5339ae4ce820cda75bbb363b2ed1c06fd
SHA162399c6102cc98ed66cbcd88a63ff870cf7b2100
SHA2561e4a463ac0d463cee1f52f9529474484157c85d671aea1ab5f4173df12de01b6
SHA5125da8b333a839c4b169c6f4c9a1929918f166a895af7818c8223df7ed22279aac3b6ef88f89ee083a4f475f82ec6078f8e9800a9afc9547712245d090636a284a