Analysis
-
max time kernel
141s -
max time network
126s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
09-10-2024 04:22
Static task
static1
Behavioral task
behavioral1
Sample
2abbe2435b80358655c93cb5a388b790_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
2abbe2435b80358655c93cb5a388b790_JaffaCakes118.exe
Resource
win10v2004-20241007-en
General
-
Target
2abbe2435b80358655c93cb5a388b790_JaffaCakes118.exe
-
Size
652KB
-
MD5
2abbe2435b80358655c93cb5a388b790
-
SHA1
5002eca05b476d2e38f75a6ae19e88e4cc11c7d8
-
SHA256
9bacf2080d71c340c34b0865b33795925da1d52f96786160cd56e64e5503ab6c
-
SHA512
f7aadb2aa71eaf7a63501131a54db264ab8f7d87cfd98a6e04ecd21a26cb7189f134b297a9b02da27f8cff9fa205c1d7d774f6317f7df7cb8947404c31340d4e
-
SSDEEP
12288:cyKlsEr9jVYSBPcZFwcomlgz4cJdiXG5akRXYcFTI5vjCXK4COYO93W:cfjVYSheomqz/5PRIcFTyvtfO8
Malware Config
Signatures
-
Ardamax main executable 1 IoCs
resource yara_rule behavioral1/files/0x0006000000017472-31.dat family_ardamax -
Executes dropped EXE 2 IoCs
pid Process 2288 Install.exe 2788 HSSA.exe -
Loads dropped DLL 9 IoCs
pid Process 2288 Install.exe 2288 Install.exe 2288 Install.exe 2288 Install.exe 2288 Install.exe 2788 HSSA.exe 2788 HSSA.exe 2788 HSSA.exe 2788 HSSA.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\HSSA Agent = "C:\\Windows\\SysWOW64\\28463\\HSSA.exe" HSSA.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Drops file in System32 directory 6 IoCs
description ioc Process File created C:\Windows\SysWOW64\28463\HSSA.001 Install.exe File created C:\Windows\SysWOW64\28463\HSSA.006 Install.exe File created C:\Windows\SysWOW64\28463\HSSA.007 Install.exe File created C:\Windows\SysWOW64\28463\HSSA.exe Install.exe File created C:\Windows\SysWOW64\28463\key.bin Install.exe File opened for modification C:\Windows\SysWOW64\28463 HSSA.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Install.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language HSSA.exe -
Modifies registry class 36 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{175B4AD7-8989-4BD3-FB9B-87BB41734CB7}\TypeLib\ HSSA.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{175B4AD7-8989-4BD3-FB9B-87BB41734CB7}\VersionIndependentProgID HSSA.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{8FE1FCAC-3A08-C639-AF3D-9D9DCC8381D3}\1.0 HSSA.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{8FE1FCAC-3A08-C639-AF3D-9D9DCC8381D3}\1.0\HELPDIR\ HSSA.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{175B4AD7-8989-4BD3-FB9B-87BB41734CB7}\Version\ HSSA.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{175B4AD7-8989-4BD3-FB9B-87BB41734CB7}\VersionIndependentProgID\ HSSA.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{175B4AD7-8989-4BD3-FB9B-87BB41734CB7}\VersionIndependentProgID\ = "PLA.LegacyDataCollectorSetCollection" HSSA.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{8FE1FCAC-3A08-C639-AF3D-9D9DCC8381D3}\1.0\0 HSSA.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{175B4AD7-8989-4BD3-FB9B-87BB41734CB7}\TypeLib HSSA.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{175B4AD7-8989-4BD3-FB9B-87BB41734CB7}\ProgID\ HSSA.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{8FE1FCAC-3A08-C639-AF3D-9D9DCC8381D3}\1.0\0\win32\ HSSA.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{8FE1FCAC-3A08-C639-AF3D-9D9DCC8381D3}\1.0\HELPDIR\ = "C:\\Program Files (x86)\\Microsoft Office\\Office14\\" HSSA.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{175B4AD7-8989-4BD3-FB9B-87BB41734CB7}\TypeLib\ = "{8FE1FCAC-3A08-C639-AF3D-9D9DCC8381D3}" HSSA.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{175B4AD7-8989-4BD3-FB9B-87BB41734CB7}\InprocServer32\ HSSA.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{175B4AD7-8989-4BD3-FB9B-87BB41734CB7}\LocalServer32 HSSA.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{175B4AD7-8989-4BD3-FB9B-87BB41734CB7}\ProgID HSSA.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{8FE1FCAC-3A08-C639-AF3D-9D9DCC8381D3}\ HSSA.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{8FE1FCAC-3A08-C639-AF3D-9D9DCC8381D3}\1.0\ = "GrooveMiscServicesAlpha" HSSA.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{8FE1FCAC-3A08-C639-AF3D-9D9DCC8381D3}\1.0\FLAGS\ HSSA.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{8FE1FCAC-3A08-C639-AF3D-9D9DCC8381D3}\1.0\FLAGS\ = "4" HSSA.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{175B4AD7-8989-4BD3-FB9B-87BB41734CB7}\InprocServer32 HSSA.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{175B4AD7-8989-4BD3-FB9B-87BB41734CB7}\InprocServer32\ = "%SystemRoot%\\SysWow64\\pla.dll" HSSA.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{175B4AD7-8989-4BD3-FB9B-87BB41734CB7}\Version\ = "1.0" HSSA.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{175B4AD7-8989-4BD3-FB9B-87BB41734CB7}\ = "Acaxa Ozizapo Venizfaw class" HSSA.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{8FE1FCAC-3A08-C639-AF3D-9D9DCC8381D3}\1.0\0\ HSSA.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{8FE1FCAC-3A08-C639-AF3D-9D9DCC8381D3}\1.0\ HSSA.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{8FE1FCAC-3A08-C639-AF3D-9D9DCC8381D3}\1.0\0\win32 HSSA.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{8FE1FCAC-3A08-C639-AF3D-9D9DCC8381D3}\1.0\HELPDIR HSSA.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{175B4AD7-8989-4BD3-FB9B-87BB41734CB7}\Version HSSA.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{175B4AD7-8989-4BD3-FB9B-87BB41734CB7} HSSA.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{175B4AD7-8989-4BD3-FB9B-87BB41734CB7}\LocalServer32\ = "%SystemRoot%\\SysWow64\\plasrv.exe" HSSA.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{8FE1FCAC-3A08-C639-AF3D-9D9DCC8381D3} HSSA.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{8FE1FCAC-3A08-C639-AF3D-9D9DCC8381D3}\1.0\0\win32\ = "C:\\PROGRA~2\\MICROS~1\\Office14\\GROOVE.EXE\\55" HSSA.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{8FE1FCAC-3A08-C639-AF3D-9D9DCC8381D3}\1.0\FLAGS HSSA.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{175B4AD7-8989-4BD3-FB9B-87BB41734CB7}\LocalServer32\ HSSA.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{175B4AD7-8989-4BD3-FB9B-87BB41734CB7}\ProgID\ = "PLA.LegacyDataCollectorSetCollection.1" HSSA.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: 33 2788 HSSA.exe Token: SeIncBasePriorityPrivilege 2788 HSSA.exe -
Suspicious use of SetWindowsHookEx 5 IoCs
pid Process 2788 HSSA.exe 2788 HSSA.exe 2788 HSSA.exe 2788 HSSA.exe 2788 HSSA.exe -
Suspicious use of WriteProcessMemory 17 IoCs
description pid Process procid_target PID 2916 wrote to memory of 2288 2916 2abbe2435b80358655c93cb5a388b790_JaffaCakes118.exe 31 PID 2916 wrote to memory of 2288 2916 2abbe2435b80358655c93cb5a388b790_JaffaCakes118.exe 31 PID 2916 wrote to memory of 2288 2916 2abbe2435b80358655c93cb5a388b790_JaffaCakes118.exe 31 PID 2916 wrote to memory of 2288 2916 2abbe2435b80358655c93cb5a388b790_JaffaCakes118.exe 31 PID 2916 wrote to memory of 2288 2916 2abbe2435b80358655c93cb5a388b790_JaffaCakes118.exe 31 PID 2916 wrote to memory of 2288 2916 2abbe2435b80358655c93cb5a388b790_JaffaCakes118.exe 31 PID 2916 wrote to memory of 2288 2916 2abbe2435b80358655c93cb5a388b790_JaffaCakes118.exe 31 PID 2916 wrote to memory of 540 2916 2abbe2435b80358655c93cb5a388b790_JaffaCakes118.exe 32 PID 2916 wrote to memory of 540 2916 2abbe2435b80358655c93cb5a388b790_JaffaCakes118.exe 32 PID 2916 wrote to memory of 540 2916 2abbe2435b80358655c93cb5a388b790_JaffaCakes118.exe 32 PID 2288 wrote to memory of 2788 2288 Install.exe 33 PID 2288 wrote to memory of 2788 2288 Install.exe 33 PID 2288 wrote to memory of 2788 2288 Install.exe 33 PID 2288 wrote to memory of 2788 2288 Install.exe 33 PID 2288 wrote to memory of 2788 2288 Install.exe 33 PID 2288 wrote to memory of 2788 2288 Install.exe 33 PID 2288 wrote to memory of 2788 2288 Install.exe 33
Processes
-
C:\Users\Admin\AppData\Local\Temp\2abbe2435b80358655c93cb5a388b790_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\2abbe2435b80358655c93cb5a388b790_JaffaCakes118.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2916 -
C:\Users\Admin\AppData\Local\Temp\Install.exe"C:\Users\Admin\AppData\Local\Temp\Install.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2288 -
C:\Windows\SysWOW64\28463\HSSA.exe"C:\Windows\system32\28463\HSSA.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:2788
-
-
-
C:\Windows\Microsoft.NET\Framework64\v2.0.50727\dw20.exedw20.exe -x -s 8202⤵PID:540
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
566KB
MD5b997c994107d7baf8a7d8fbb3f1ef7dd
SHA145142ece4bd25e6ac168b887e93a1db24806e38c
SHA256f4668858f4903a233df2cb99b2a0361ffb8af050c5f123f7416e2fb385c7fdfe
SHA51234f3a36a1a8cc6b4753847f1cd27dcc400ace0a5c886c3f8bf172c21fc09e6972a143b6132eb85ce1a15cbbe4e049657c7386a70d6e9c3a3a532558dafdfaf57
-
Filesize
392B
MD549b382a62195b68b25479db35af024ef
SHA10bec0529ae83d1588937d63ec26e36353eb89955
SHA256935a6a6d394347e7dfba4a19547fe94398a502af964ef741510f5dbedb01b625
SHA51270952ad186f4624569fc6d5e4e779ab085602e43463bef4b98128f9e651e7deb41888b1daa4de0d86e24880d4bd01512996d682ee471eb0efd387bdf4482225a
-
Filesize
8KB
MD531854a50b294dd312eb7fa9eb1c99537
SHA1e0b1682a001e15d0e0e1c1ca732cafb5c80b3160
SHA2562fe2d55aae2deef38a37c9679d74ecf05699d6919760794f69583b43b7fe308c
SHA5120482a4981ba242d4e931bd8b9eb5d606492cffb7609fb69fb349ed19c7a9e36a7e240e5ebe759505d253c5e72fb771612a76419c36fb035987a166569a5111c2
-
Filesize
5KB
MD5603451f504bedb28c3a7bae4c89abf24
SHA1cbfe12186b54663f60663c349739c7a49950c44e
SHA256e4d6577ea390274308877284b6d0cd6672aeb0e76c9c9847ac59c0964f050d13
SHA512136e28e288b3ce26b37c82b078a3440e3232c0f874d7d33e8e6fb6eadfd0024b9009448500c716523b81f142fa3bebf7d11f1dd3e8e6143867b06335eb5f9612
-
Filesize
105B
MD527c90d4d9b049f4cd00f32ed1d2e5baf
SHA1338a3ea8f1e929d8916ece9b6e91e697eb562550
SHA256172d6f21165fb3ca925e5b000451fd8946920206f7438018c28b158b90cf5ffb
SHA512d73dadb3cf74c647ce5bad5b87d3fb42a212defcba8afb8cf962020b61a0369c0a2b1005797583daf1f1ae88b29b7288bc544a53d643f3519cf604aa0ffd6dae
-
Filesize
4KB
MD5f1cf9fcbddeadabb738de497ffefdced
SHA17385a7c87e245da89cc5ef8f9295678c1566f25d
SHA256086083bc73b14286f9c3c29df8b8dc6f014d8b084267fbaeee0af56344d1f779
SHA5123a3b9d279b4c131ef3f358e0163f60ec9e60160a2cc45488adb915fea6642f3df5d35da2ccb6983d790401d237fbc808829f42c42ef958e7a0eac98fc33bb3f6
-
Filesize
648KB
MD5ce568bcaf7285124f764aff92f5079d4
SHA1886f698e2239cf615f12b503853a5fa28c53aefc
SHA25659d7d6de8a9e2d5535703d22c36888889530fd011d7f71cf034e93e36e7527af
SHA5129f6e3496930cb5dd9c9403acc865bc94f63f64af49a27ffeedbc9d9082d50bff4a7a772bb98d4a2719f0ecae144393de9cc273ba83ae00abe347b0be0d7c9866