Analysis
-
max time kernel
120s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
06-10-2024 18:54
Static task
static1
Behavioral task
behavioral1
Sample
19471f98e68f19bce203dfc964eaaadb_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
19471f98e68f19bce203dfc964eaaadb_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
19471f98e68f19bce203dfc964eaaadb_JaffaCakes118.exe
-
Size
1.2MB
-
MD5
19471f98e68f19bce203dfc964eaaadb
-
SHA1
c2f4eeb37a05f4e43b6ea825df5afb96bb0dbf5b
-
SHA256
73a92df3abe0565f65eb72f7d82999007741bb1eff7ca081dd6e784b346bb976
-
SHA512
d96396ccfd4002d46106b769883f7dba4a1a3a09a6c489b1ee703c73137817bfd5c1361e1a1afdc55de99b42f4727f4b9568f2da0af899da5a3c8959730dad3c
-
SSDEEP
24576:euIIABU/pT/luS5EEdbb40C82oX3PWcy/4PMn7S+06/FDJU5ve:euINuRT/ltHZbV2oWcy/97SH2DQe
Malware Config
Signatures
-
Ardamax main executable 1 IoCs
resource yara_rule behavioral1/files/0x00080000000175ed-18.dat family_ardamax -
Modifies WinLogon for persistence 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Userinit = "C:\\WINDOWS\\system32\\userinit.exe,iexpIore.exe" 19471f98e68f19bce203dfc964eaaadb_JaffaCakes118.exe -
Executes dropped EXE 2 IoCs
pid Process 1720 iexpIore.exe 2160 HSA.exe -
Loads dropped DLL 4 IoCs
pid Process 2372 19471f98e68f19bce203dfc964eaaadb_JaffaCakes118.exe 1720 iexpIore.exe 2160 HSA.exe 1420 WINWORD.EXE -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\HSA Start = "C:\\Windows\\SysWOW64\\CTOGAA\\HSA.exe" HSA.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Drops file in System32 directory 7 IoCs
description ioc Process File created C:\Windows\SysWOW64\CTOGAA\HSA.002 iexpIore.exe File created C:\Windows\SysWOW64\CTOGAA\HSA.exe iexpIore.exe File opened for modification C:\Windows\SysWOW64\CTOGAA\ HSA.exe File created C:\Windows\SysWOW64\iexpIore.exe 19471f98e68f19bce203dfc964eaaadb_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\iexpIore.exe 19471f98e68f19bce203dfc964eaaadb_JaffaCakes118.exe File created C:\Windows\SysWOW64\CTOGAA\HSA.004 iexpIore.exe File created C:\Windows\SysWOW64\CTOGAA\HSA.001 iexpIore.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File opened for modification C:\Windows\Debug\WIA\wiatrace.log WINWORD.EXE -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 19471f98e68f19bce203dfc964eaaadb_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language iexpIore.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WINWORD.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language HSA.exe -
Office loads VBA resources, possible macro or embedded object present
-
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 1420 WINWORD.EXE -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: 33 2160 HSA.exe Token: SeIncBasePriorityPrivilege 2160 HSA.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1420 WINWORD.EXE 1420 WINWORD.EXE 2160 HSA.exe 2160 HSA.exe 2160 HSA.exe 2160 HSA.exe -
Suspicious use of WriteProcessMemory 16 IoCs
description pid Process procid_target PID 2372 wrote to memory of 1720 2372 19471f98e68f19bce203dfc964eaaadb_JaffaCakes118.exe 30 PID 2372 wrote to memory of 1720 2372 19471f98e68f19bce203dfc964eaaadb_JaffaCakes118.exe 30 PID 2372 wrote to memory of 1720 2372 19471f98e68f19bce203dfc964eaaadb_JaffaCakes118.exe 30 PID 2372 wrote to memory of 1720 2372 19471f98e68f19bce203dfc964eaaadb_JaffaCakes118.exe 30 PID 2372 wrote to memory of 1420 2372 19471f98e68f19bce203dfc964eaaadb_JaffaCakes118.exe 31 PID 2372 wrote to memory of 1420 2372 19471f98e68f19bce203dfc964eaaadb_JaffaCakes118.exe 31 PID 2372 wrote to memory of 1420 2372 19471f98e68f19bce203dfc964eaaadb_JaffaCakes118.exe 31 PID 2372 wrote to memory of 1420 2372 19471f98e68f19bce203dfc964eaaadb_JaffaCakes118.exe 31 PID 1720 wrote to memory of 2160 1720 iexpIore.exe 32 PID 1720 wrote to memory of 2160 1720 iexpIore.exe 32 PID 1720 wrote to memory of 2160 1720 iexpIore.exe 32 PID 1720 wrote to memory of 2160 1720 iexpIore.exe 32 PID 1420 wrote to memory of 1528 1420 WINWORD.EXE 36 PID 1420 wrote to memory of 1528 1420 WINWORD.EXE 36 PID 1420 wrote to memory of 1528 1420 WINWORD.EXE 36 PID 1420 wrote to memory of 1528 1420 WINWORD.EXE 36
Processes
-
C:\Users\Admin\AppData\Local\Temp\19471f98e68f19bce203dfc964eaaadb_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\19471f98e68f19bce203dfc964eaaadb_JaffaCakes118.exe"1⤵
- Modifies WinLogon for persistence
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2372 -
C:\Windows\SysWOW64\iexpIore.exe"C:\Windows\system32\iexpIore.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1720 -
C:\Windows\SysWOW64\CTOGAA\HSA.exe"C:\Windows\system32\CTOGAA\HSA.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:2160
-
-
-
C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE"C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\event 30-04.doc"2⤵
- Loads dropped DLL
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1420 -
C:\Windows\splwow64.exeC:\Windows\splwow64.exe 122883⤵PID:1528
-
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Privilege Escalation
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
154KB
MD50401d564ef74d730cffbaaca249dce70
SHA14287c7f00ef70b4acd8d05f808cdadc8786fbf21
SHA256b71f365fef94334e7893288c3a5fbc3bf2510eb6f549d62679f370fccafcd55b
SHA5121e0613829bc121d18917d7f261f3d0b9b465149c27a4d7432087b5af2ee7eb63ebb2ce2079f41542d58ff50c7f9aebef0a524a9f1bbc53dcde49497df705febf
-
Filesize
61KB
MD54eb04b9187bbf3e3c33bf95e74eb6262
SHA1ca5dcaea5ef4ba48c0bb06635c0b5abed4f0f342
SHA256cf84d5704b350beaf1f2b46dc44bd372141d7554a8958ce22c0a84a3f21f2fe7
SHA512aeaa608cd4f66ba817a7e8698d17f9801c9cedf99875decff39bc18cebdec3947f02566bdf21d9096e5a6a6b740717ab06d46a2a9605bf8e8fa0fee12fe17e81
-
Filesize
43KB
MD51aed6fee0870288cdb607393fc2f33a1
SHA1584fd8d5ffbced19dd09b8b71cee9026c0ac65c6
SHA25602c4eef7045896258d00077e123719aa256c606f4e38c417965ba5f64d48e180
SHA51215e5b7843b07bcb4a638057b05712c66b285d70ace24ab3a4c125d24d538ace20cfac179accefa417d7790f7a095327affd3cd73d9eacaa632356f95a9fde3b8
-
Filesize
1KB
MD5779ff99404e8b8d81c658a4e22e677c2
SHA133482d87aff5e13f8d03994cc7b75111fdc4ef48
SHA2565b9e83a776ae17d5c5feeb695aa7d73e9cf50ef44edb7803e2ef0caf7303366d
SHA5122f1526f051d8094610af780cfd93b1b9868bc7bc7a7e68f0ee73131c9e656cdab5d30bea0329277a59e5a51cdd6314591ea28508fbad9e6ff4b6de64e1861df0
-
Filesize
1.5MB
MD5865b02aa4fb68ac150953986e6f63f1c
SHA1214190642d67f02c349e68f3f3c6ef0e9c2212d7
SHA256fac58547e80a1b9598261b6d2aa5175653831e507c57b6860bc5d04d2e754dff
SHA512473dc55a8a8f11d8445cef9cd8cabf8a9b227a6e47994ecfe9c86d41062641668d858e61b7ade1ad2801c5daa13d0630159b7ad241379e111c83564030c0a40e
-
Filesize
900KB
MD51fa7d6fb2e718e5e86ae5779270652da
SHA1d04d45dec75b82464959221ef7fa090e06983b84
SHA2569078e7e373e46910c806e2783504e3bf423dc3b71252e72c16487388ff804342
SHA512ca4ca291ebf63f3dd1a73f8c2d3b6144ef056a3d8a4489d3d56151828912f51db306273b04ceccedcb21a51a286980199b98da83c2c88944d26f930de57ed545