General
-
Target
3f9af1e01e6fc8370fe2b98e85de0b4c_JaffaCakes118
-
Size
734KB
-
Sample
241013-nnptsaygmp
-
MD5
3f9af1e01e6fc8370fe2b98e85de0b4c
-
SHA1
83cb08fe076c9d9309ac243f69724db883235c0b
-
SHA256
74e92817b67f8e09365615a79bdbfd10f02fa1ccdcbdfecd080f7b2549f2abc3
-
SHA512
e4a5f882c0290509c94b1d943915f10dc2303ebcceae2a5dc2da6627934882e3aecf4d93f6e69f8c658e06bce12bf255ffc7d33f81a474680f283e50e31fc4cd
-
SSDEEP
12288:E3TdtLW5WIj1YSSdFxsBSXyMzBUWb9lx/9AgHLo8OW+rB:ODsj1dEcBcJ9nPx/igrp+
Behavioral task
behavioral1
Sample
3f9af1e01e6fc8370fe2b98e85de0b4c_JaffaCakes118.exe
Resource
win7-20240903-en
Malware Config
Targets
-
-
Target
3f9af1e01e6fc8370fe2b98e85de0b4c_JaffaCakes118
-
Size
734KB
-
MD5
3f9af1e01e6fc8370fe2b98e85de0b4c
-
SHA1
83cb08fe076c9d9309ac243f69724db883235c0b
-
SHA256
74e92817b67f8e09365615a79bdbfd10f02fa1ccdcbdfecd080f7b2549f2abc3
-
SHA512
e4a5f882c0290509c94b1d943915f10dc2303ebcceae2a5dc2da6627934882e3aecf4d93f6e69f8c658e06bce12bf255ffc7d33f81a474680f283e50e31fc4cd
-
SSDEEP
12288:E3TdtLW5WIj1YSSdFxsBSXyMzBUWb9lx/9AgHLo8OW+rB:ODsj1dEcBcJ9nPx/igrp+
-
Ardamax main executable
-
Modifies WinLogon for persistence
-
Disables RegEdit via registry modification
-
Disables Task Manager via registry modification
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
AutoIT Executable
AutoIT scripts compiled to PE executables.
-
Drops file in System32 directory
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Privilege Escalation
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Defense Evasion
Modify Registry
3Subvert Trust Controls
1Install Root Certificate
1