Analysis
-
max time kernel
19s -
max time network
21s -
platform
windows7_x64 -
resource
win7-20240729-en -
resource tags
arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system -
submitted
06-10-2024 17:03
Static task
static1
Behavioral task
behavioral1
Sample
18f18eaef6414526d2930736bd312a03_JaffaCakes118.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
18f18eaef6414526d2930736bd312a03_JaffaCakes118.exe
Resource
win10v2004-20240910-en
General
-
Target
18f18eaef6414526d2930736bd312a03_JaffaCakes118.exe
-
Size
398KB
-
MD5
18f18eaef6414526d2930736bd312a03
-
SHA1
49e8a64057c722d85de07e7f294ef462cf3b2e42
-
SHA256
cf47b9dd42fb33fcbaf81254bd5b15147ba9d2056d0247c3f4ddcf1c8e482344
-
SHA512
b6989ad187532cf5820a16fc5b8930ba6b9d3cc3a03431427f576899aa9abc6531b6aa354c4d9d1f73d6ac45c646ad93194d63c95b164383f9a1a7ceb7b5d838
-
SSDEEP
6144:b1dlZro5yPHqhT9SBf3dBbiMEX7YKS8pchNHE77hpcEhCW6nX53e0Vji9PdI:b1dlZo5yPmSl3bKionhl6nXoyePdI
Malware Config
Signatures
-
Ardamax main executable 1 IoCs
resource yara_rule behavioral1/files/0x000500000001a48b-41.dat family_ardamax -
Executes dropped EXE 2 IoCs
pid Process 2596 Install.exe 2276 TOHP.exe -
Loads dropped DLL 14 IoCs
pid Process 2524 18f18eaef6414526d2930736bd312a03_JaffaCakes118.exe 2596 Install.exe 2596 Install.exe 2596 Install.exe 2596 Install.exe 2596 Install.exe 2596 Install.exe 2276 TOHP.exe 2276 TOHP.exe 2276 TOHP.exe 2276 TOHP.exe 2276 TOHP.exe 2728 DllHost.exe 2728 DllHost.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\TOHP Agent = "C:\\Windows\\SysWOW64\\28463\\TOHP.exe" TOHP.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Drops file in System32 directory 5 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\28463 TOHP.exe File created C:\Windows\SysWOW64\28463\TOHP.001 Install.exe File created C:\Windows\SysWOW64\28463\TOHP.006 Install.exe File created C:\Windows\SysWOW64\28463\TOHP.007 Install.exe File created C:\Windows\SysWOW64\28463\TOHP.exe Install.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 18f18eaef6414526d2930736bd312a03_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language DllHost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Install.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language TOHP.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: 33 2276 TOHP.exe Token: SeIncBasePriorityPrivilege 2276 TOHP.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2728 DllHost.exe -
Suspicious use of SetWindowsHookEx 7 IoCs
pid Process 2728 DllHost.exe 2728 DllHost.exe 2276 TOHP.exe 2276 TOHP.exe 2276 TOHP.exe 2276 TOHP.exe 2276 TOHP.exe -
Suspicious use of WriteProcessMemory 14 IoCs
description pid Process procid_target PID 2524 wrote to memory of 2596 2524 18f18eaef6414526d2930736bd312a03_JaffaCakes118.exe 30 PID 2524 wrote to memory of 2596 2524 18f18eaef6414526d2930736bd312a03_JaffaCakes118.exe 30 PID 2524 wrote to memory of 2596 2524 18f18eaef6414526d2930736bd312a03_JaffaCakes118.exe 30 PID 2524 wrote to memory of 2596 2524 18f18eaef6414526d2930736bd312a03_JaffaCakes118.exe 30 PID 2524 wrote to memory of 2596 2524 18f18eaef6414526d2930736bd312a03_JaffaCakes118.exe 30 PID 2524 wrote to memory of 2596 2524 18f18eaef6414526d2930736bd312a03_JaffaCakes118.exe 30 PID 2524 wrote to memory of 2596 2524 18f18eaef6414526d2930736bd312a03_JaffaCakes118.exe 30 PID 2596 wrote to memory of 2276 2596 Install.exe 31 PID 2596 wrote to memory of 2276 2596 Install.exe 31 PID 2596 wrote to memory of 2276 2596 Install.exe 31 PID 2596 wrote to memory of 2276 2596 Install.exe 31 PID 2596 wrote to memory of 2276 2596 Install.exe 31 PID 2596 wrote to memory of 2276 2596 Install.exe 31 PID 2596 wrote to memory of 2276 2596 Install.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\18f18eaef6414526d2930736bd312a03_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\18f18eaef6414526d2930736bd312a03_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2524 -
C:\Extracted\Install.exe"C:\Extracted\Install.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2596 -
C:\Windows\SysWOW64\28463\TOHP.exe"C:\Windows\system32\28463\TOHP.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:2276
-
-
-
C:\Windows\SysWOW64\DllHost.exeC:\Windows\SysWOW64\DllHost.exe /Processid:{76D0CB12-7604-4048-B83C-1005C7DDC503}1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
PID:2728
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
29KB
MD5c8bcf64057afbcba86f6d456ad2bc310
SHA1c35ab4eb28df6f98543af68cda2a4e7cd64186eb
SHA25642fd2f61b54172168ab0efebd4c02738d77c717374931d30f31ca21ab7f2649a
SHA5120663b63ca62f33f18d4d0f28e1a395ffd0b2426b299b04b3b7e8e99ab7e00aa45682f48b0a633003e7224e1cd4f81a6fa798aab1d2167bd27ebaad438dc616e0
-
Filesize
239B
MD5332a9f4bda3d52de0d03b9f4b82bf803
SHA19e794b5d0ea4e722723423414bdd2162fb04de69
SHA2562e886bd4bfa014e416c7bd3c2f1a2c2b71b1ffb57793779283e6c915c713bb7e
SHA51253829c662c5336aa8573ae9c71514ee7fce72a4be12c6b169743984873043a15d41e6298726081a323740ecdfc426b30482c3ba4b806ccad688110352adbf836
-
Filesize
410B
MD533fb352c37e00d59baa50af8fc45f257
SHA12a8bb9490a0ea7bb2ecf0993f2eac258290c0a8d
SHA256826df67464b3c30c19e32a2cd47f286acbdb47bf06956b242776575c18455b30
SHA51212608accb4e3cef1947bcc64a2b28f23d52df9aefa064a6dd1647afe497e79897ad03131bcf14dfc3c2ae36f460758ff4d9988f5c49cad85f05bf80a34cbaf45
-
Filesize
5KB
MD5da590fabc3a6aaee518db39de8d73fb5
SHA1a89ae670988af95714840aa463e5aeb649eb009b
SHA256e57ffb72fdd0367510e0e9ea62b4c34a58d90a452ed4451eef50610bc27d7bd2
SHA5125653a8d8d19b70cf094456978e3520fb80f6b56047860b53a95cd2d2fbf6fd947ff09c69090e3b956f0ed7d616237e5b6b59f899da7764c52ca1b444381159b4
-
Filesize
282KB
MD59ac4caff8b8328b504d009a3b8562024
SHA1ec1b53fbdcd9c58ff91059dec68c040189422b25
SHA256f0846f026924ba9cd9ecbec1e1d5dad46af4b372af10b2a64269eefc9b67dbe6
SHA5129f4c5f79e48ffdb73e19b41c78316efa47ee8072628309e2cff5d35a7ecebd57ab53fd80368e3ab550cb9096940aed530b7e40d43c5664cc6ca09d394f56a706
-
Filesize
4KB
MD57741621eab37d5237984566a87e022b7
SHA1ecba0f2ff82abd940266b80eb12ccce900c05787
SHA256d77ae70c89844988980f043d2dd99f819ca3770b4a2cd951f9db46c6ad97b0e1
SHA512b4c57bb22a5f6b996ba799edca026f2a6ebfff942561cfe22010961f6ee231e9dc9b957aabf80943122ef6b607e91585bd8c3524ddbd3df711b0e66a4f13e624
-
Filesize
8KB
MD55cf4da269bc6e9a340c9d6f6f9958ef6
SHA1236a1cf80f7bdc4da0396e865ad817ab0c87216c
SHA2561b2bcca1e79c10cf32e816d435feacf12997aa5aeb8ed040068b82d28e6509bc
SHA512cb84d5d848d19286ed14fb0273cddbf95781b5531117584a69c3afeba119f00dda37f9899a1af6ef900cabe1648c49643b97bd1f0d07944ffef19890d24ea258
-
Filesize
513KB
MD5d6f4bfc4e4ed7157506eab4740a55c30
SHA114d1b95c66de54c23ef4dcaf3e6e001455fb2048
SHA256115484f3468e91accd0352039a3ba0530eb5e102d9115f73d86ff521abb78f12
SHA512bae882ddc779227316d186583de259c0adfbba9d0354ae944f67e661d08a505be86035d1bf5021e06c1e92ee07bb93ed5e691bcf98073fd8da0d89535a2c2d0c