Analysis
-
max time kernel
118s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
09-10-2024 10:56
Static task
static1
Behavioral task
behavioral1
Sample
2fe36b6bc2a85e06460b81f8d2836d14_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
2fe36b6bc2a85e06460b81f8d2836d14_JaffaCakes118.exe
Resource
win10v2004-20241007-en
General
-
Target
2fe36b6bc2a85e06460b81f8d2836d14_JaffaCakes118.exe
-
Size
488KB
-
MD5
2fe36b6bc2a85e06460b81f8d2836d14
-
SHA1
ea82186b515f125788e080ef1a462c007f0b50de
-
SHA256
e9d02b836669ebded8fc0cd985e7a80b8e0a3bc1565e8ab9d4c033733074bd80
-
SHA512
eb0bd6371f3c401222c02ce779b2ec80fe6f08f7bce73087effcae6481ad8a524606efd9ca8aeec51330d5750639d10e97e3fb7b1a59650e0b287c606ce72514
-
SSDEEP
12288:Nde9Rj0wDbQEFRIm6aK7E1ZlQ9Vo3l5P36by7J:SDDhCGK7CiA3/ym7J
Malware Config
Signatures
-
Ardamax main executable 1 IoCs
resource yara_rule behavioral1/files/0x000700000001946b-17.dat family_ardamax -
Executes dropped EXE 1 IoCs
pid Process 2812 MGXK.exe -
Loads dropped DLL 5 IoCs
pid Process 1388 2fe36b6bc2a85e06460b81f8d2836d14_JaffaCakes118.exe 1388 2fe36b6bc2a85e06460b81f8d2836d14_JaffaCakes118.exe 1388 2fe36b6bc2a85e06460b81f8d2836d14_JaffaCakes118.exe 2812 MGXK.exe 2812 MGXK.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\MGXK Agent = "C:\\Windows\\SysWOW64\\Sys32\\MGXK.exe" MGXK.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Indicator Removal: File Deletion 1 TTPs
Adversaries may delete files left behind by the actions of their intrusion activity.
-
Drops file in System32 directory 6 IoCs
description ioc Process File created C:\Windows\SysWOW64\Sys32\AKV.exe 2fe36b6bc2a85e06460b81f8d2836d14_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\Sys32 MGXK.exe File created C:\Windows\SysWOW64\Sys32\MGXK.001 2fe36b6bc2a85e06460b81f8d2836d14_JaffaCakes118.exe File created C:\Windows\SysWOW64\Sys32\MGXK.006 2fe36b6bc2a85e06460b81f8d2836d14_JaffaCakes118.exe File created C:\Windows\SysWOW64\Sys32\MGXK.007 2fe36b6bc2a85e06460b81f8d2836d14_JaffaCakes118.exe File created C:\Windows\SysWOW64\Sys32\MGXK.exe 2fe36b6bc2a85e06460b81f8d2836d14_JaffaCakes118.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2fe36b6bc2a85e06460b81f8d2836d14_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MGXK.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: 33 2812 MGXK.exe Token: SeIncBasePriorityPrivilege 2812 MGXK.exe Token: SeIncBasePriorityPrivilege 2812 MGXK.exe -
Suspicious use of SetWindowsHookEx 5 IoCs
pid Process 2812 MGXK.exe 2812 MGXK.exe 2812 MGXK.exe 2812 MGXK.exe 2812 MGXK.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 1388 wrote to memory of 2812 1388 2fe36b6bc2a85e06460b81f8d2836d14_JaffaCakes118.exe 31 PID 1388 wrote to memory of 2812 1388 2fe36b6bc2a85e06460b81f8d2836d14_JaffaCakes118.exe 31 PID 1388 wrote to memory of 2812 1388 2fe36b6bc2a85e06460b81f8d2836d14_JaffaCakes118.exe 31 PID 1388 wrote to memory of 2812 1388 2fe36b6bc2a85e06460b81f8d2836d14_JaffaCakes118.exe 31 PID 2812 wrote to memory of 2192 2812 MGXK.exe 32 PID 2812 wrote to memory of 2192 2812 MGXK.exe 32 PID 2812 wrote to memory of 2192 2812 MGXK.exe 32 PID 2812 wrote to memory of 2192 2812 MGXK.exe 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\2fe36b6bc2a85e06460b81f8d2836d14_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\2fe36b6bc2a85e06460b81f8d2836d14_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1388 -
C:\Windows\SysWOW64\Sys32\MGXK.exe"C:\Windows\system32\Sys32\MGXK.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2812 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c del C:\Windows\SysWOW64\Sys32\MGXK.exe > nul3⤵
- System Location Discovery: System Language Discovery
PID:2192
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
389KB
MD5f567d932480c03ab1de08b1b72aada97
SHA192c60c8971cf6aa88baf945c61c3a40709c03e02
SHA256565e67c1959c0dec7be32b308681ec7106cde58b1b409cc21cbc642b7a6d627f
SHA5122c9bac11470c2ff211054df00f252c312d6d2e0aea4349b03072934f8ce2623fb365c64c0eb56a08440e4daabd11799e03b158733a9922fc05ebc7782c67b3fe
-
Filesize
354B
MD564c3ae68c3b79571d31fa2ebeea167bb
SHA16eb1e1559d9fb331ff2336c13d26935cfe8e8ee9
SHA256ca37a9f4391466a76b2c809a7f8da2da9fe2232b68a3372b963ff87802535153
SHA5120f0ca8112ddfea2b55d44219b464946edb7f1fd3dfc13cfb0574a222816f715a1c6a0b9c79ab37a6defa42a5bf1973e01bdd2e371d4d3df4e46d0caceb452508
-
Filesize
7KB
MD502d9f210aac7049c13f026ba9898a9bd
SHA1b6aae5e7fae29934042af5f6a6d51a52b51265a1
SHA25643b9f2d721ec6e419b865639dead7ba29202839f967ba172f479977db8ea4e9b
SHA512dda86da60ab27f2c05ebd8e7d4b709771da0edb22ba406336898e4e7e5c2febbfe9d81fb946d6440f6393e0f8c25ae61125e4ff3e8aa168c1e36a63e89999466
-
Filesize
5KB
MD55b9bf404722eac0ff29f1609f4e938ac
SHA14a0dc9cf5f7cb6855b4f2745646c4a3dcf995ba2
SHA25645e39c6673b2e580e6cc01f2213dcc4d93da2eb561c94066506d90ceea8c3522
SHA51250b6689db1e052d39ee1abf3ddab19b64f99ba48460fa75abf5e467d79d99958aa0a9524f3ad0d91d48cfd429ed09cfca068446287d8373974b7583eafc0fd29
-
Filesize
475KB
MD5d0c5feb812ca765b00a3ca0e974fabd2
SHA1c5a4b5aee6b92019552f811d3ceb4fdcee0105fa
SHA256cd2de8b54a5de630e03177a736a35f85a1f8d8367a392ed833fb6fee29c96440
SHA512fb4e5bda23453484f0d0c4cc3bdc1f29a36be56281f558f356b579996bde15290a9dfbbc018ffe86e2304832a2898710f0331b7f3cd181d16930e2abbdfaafe8
-
Filesize
3KB
MD5e6d3a1562e0a2d9230e4bfd7e477dffd
SHA1ef5d510e60caef4924eced60c092a63e9233b375
SHA25649ee7df841542ff4fc5232bd8244f06683cc70f8af5f861b94497b504208b3ab
SHA512e6d866daf96ad912d4ad69324d9f89820d15dd2a8d34aba5b3392aa5f6a67931f988080a25fa09067f81024180a3a4c0e211a80405b56e6663481fce7ffa1177