Analysis
-
max time kernel
121s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
05-10-2024 02:38
Static task
static1
Behavioral task
behavioral1
Sample
15d4b6cdcce30869cc8ce0cb9caca109_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
15d4b6cdcce30869cc8ce0cb9caca109_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
15d4b6cdcce30869cc8ce0cb9caca109_JaffaCakes118.exe
-
Size
283KB
-
MD5
15d4b6cdcce30869cc8ce0cb9caca109
-
SHA1
632e88335412cc4136e02305b8933450b751d09e
-
SHA256
fc34e5c76b2084cd3949829793d8c5a9f9df0e79b6250de79303c466b07691fc
-
SHA512
8e1d599edd4b755b1d86c0b59dca446bd0adf24cf02fc2a8cca880bbdcaf9f357f73935798738fd5040f714027fc5ecec6b4b7698bf81ec35e1bbf1fbd689745
-
SSDEEP
6144:YG6obMrhul4MrL/HouV+KuRM7dMvSZe1eWnJPNYt6ZVnKYp:YSbMduiYF+tGM8KnTRn/
Malware Config
Signatures
-
Ardamax main executable 1 IoCs
resource yara_rule behavioral1/files/0x0007000000015d59-9.dat family_ardamax -
Executes dropped EXE 1 IoCs
pid Process 2844 PBKN.exe -
Loads dropped DLL 5 IoCs
pid Process 1608 15d4b6cdcce30869cc8ce0cb9caca109_JaffaCakes118.exe 1608 15d4b6cdcce30869cc8ce0cb9caca109_JaffaCakes118.exe 1608 15d4b6cdcce30869cc8ce0cb9caca109_JaffaCakes118.exe 2844 PBKN.exe 2844 PBKN.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\PBKN Agent = "C:\\Windows\\SysWOW64\\28463\\PBKN.exe" PBKN.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Drops file in System32 directory 5 IoCs
description ioc Process File created C:\Windows\SysWOW64\28463\PBKN.exe 15d4b6cdcce30869cc8ce0cb9caca109_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\28463 PBKN.exe File created C:\Windows\SysWOW64\28463\PBKN.001 15d4b6cdcce30869cc8ce0cb9caca109_JaffaCakes118.exe File created C:\Windows\SysWOW64\28463\PBKN.006 15d4b6cdcce30869cc8ce0cb9caca109_JaffaCakes118.exe File created C:\Windows\SysWOW64\28463\PBKN.007 15d4b6cdcce30869cc8ce0cb9caca109_JaffaCakes118.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language PBKN.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 15d4b6cdcce30869cc8ce0cb9caca109_JaffaCakes118.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: 33 2844 PBKN.exe Token: SeIncBasePriorityPrivilege 2844 PBKN.exe -
Suspicious use of SetWindowsHookEx 5 IoCs
pid Process 2844 PBKN.exe 2844 PBKN.exe 2844 PBKN.exe 2844 PBKN.exe 2844 PBKN.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1608 wrote to memory of 2844 1608 15d4b6cdcce30869cc8ce0cb9caca109_JaffaCakes118.exe 28 PID 1608 wrote to memory of 2844 1608 15d4b6cdcce30869cc8ce0cb9caca109_JaffaCakes118.exe 28 PID 1608 wrote to memory of 2844 1608 15d4b6cdcce30869cc8ce0cb9caca109_JaffaCakes118.exe 28 PID 1608 wrote to memory of 2844 1608 15d4b6cdcce30869cc8ce0cb9caca109_JaffaCakes118.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\15d4b6cdcce30869cc8ce0cb9caca109_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\15d4b6cdcce30869cc8ce0cb9caca109_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1608 -
C:\Windows\SysWOW64\28463\PBKN.exe"C:\Windows\system32\28463\PBKN.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:2844
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
432B
MD556ed3c4a6dc79e2fa164dc7283b25939
SHA12dc80c64d514e717227e8974de95a9de0c3ecb3d
SHA256bb80bfb02272bad8f2662ebf620c2bb3a5d2e9e02fd746df9edae8c785c10890
SHA51295dfd28ce7069087f3e31318602ae1cdc5b3a67bf7a11d6684e29d1160d185a610b9e9706f7cc52d6d048e41ceb82c319c39e9fa5a9627479a50f4afcd5fbb81
-
Filesize
8KB
MD55cf4da269bc6e9a340c9d6f6f9958ef6
SHA1236a1cf80f7bdc4da0396e865ad817ab0c87216c
SHA2561b2bcca1e79c10cf32e816d435feacf12997aa5aeb8ed040068b82d28e6509bc
SHA512cb84d5d848d19286ed14fb0273cddbf95781b5531117584a69c3afeba119f00dda37f9899a1af6ef900cabe1648c49643b97bd1f0d07944ffef19890d24ea258
-
Filesize
5KB
MD5da590fabc3a6aaee518db39de8d73fb5
SHA1a89ae670988af95714840aa463e5aeb649eb009b
SHA256e57ffb72fdd0367510e0e9ea62b4c34a58d90a452ed4451eef50610bc27d7bd2
SHA5125653a8d8d19b70cf094456978e3520fb80f6b56047860b53a95cd2d2fbf6fd947ff09c69090e3b956f0ed7d616237e5b6b59f899da7764c52ca1b444381159b4
-
Filesize
4KB
MD57741621eab37d5237984566a87e022b7
SHA1ecba0f2ff82abd940266b80eb12ccce900c05787
SHA256d77ae70c89844988980f043d2dd99f819ca3770b4a2cd951f9db46c6ad97b0e1
SHA512b4c57bb22a5f6b996ba799edca026f2a6ebfff942561cfe22010961f6ee231e9dc9b957aabf80943122ef6b607e91585bd8c3524ddbd3df711b0e66a4f13e624
-
Filesize
513KB
MD5d6f4bfc4e4ed7157506eab4740a55c30
SHA114d1b95c66de54c23ef4dcaf3e6e001455fb2048
SHA256115484f3468e91accd0352039a3ba0530eb5e102d9115f73d86ff521abb78f12
SHA512bae882ddc779227316d186583de259c0adfbba9d0354ae944f67e661d08a505be86035d1bf5021e06c1e92ee07bb93ed5e691bcf98073fd8da0d89535a2c2d0c