Analysis
-
max time kernel
118s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
14-10-2024 18:23
Static task
static1
Behavioral task
behavioral1
Sample
43936d2c54f69b300e33d0b97143eae9_JaffaCakes118.exe
Resource
win7-20240708-en
General
-
Target
43936d2c54f69b300e33d0b97143eae9_JaffaCakes118.exe
-
Size
464KB
-
MD5
43936d2c54f69b300e33d0b97143eae9
-
SHA1
c00c89731061463ae09fda77372a1f45e33c4d92
-
SHA256
09b38fa968b81d88adb26785878e7db9e363bfe8c40222eb29444e87cbdb3e5a
-
SHA512
036d9f18584edd6807d75341412acbaafc92b0b1e0409d9e6b53e857644d36deaf4cf8eaff4161386ca2b74b5b4c7b36fa708ecc43914bb9bc6dc984897a9812
-
SSDEEP
12288:+0Ps1xthKdR6Ho7G+DmdCqhK1vDuQkMTa:v8T2R6Y9DUMGMTa
Malware Config
Signatures
-
Ardamax main executable 1 IoCs
resource yara_rule behavioral1/files/0x00070000000173a3-9.dat family_ardamax -
Executes dropped EXE 2 IoCs
pid Process 2760 Exe.exe 2844 Nudge_Madness.exe -
Loads dropped DLL 8 IoCs
pid Process 2168 43936d2c54f69b300e33d0b97143eae9_JaffaCakes118.exe 2168 43936d2c54f69b300e33d0b97143eae9_JaffaCakes118.exe 2168 43936d2c54f69b300e33d0b97143eae9_JaffaCakes118.exe 2168 43936d2c54f69b300e33d0b97143eae9_JaffaCakes118.exe 2168 43936d2c54f69b300e33d0b97143eae9_JaffaCakes118.exe 2760 Exe.exe 2844 Nudge_Madness.exe 2760 Exe.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Drops file in Windows directory 5 IoCs
description ioc Process File created C:\Windows\Sys\Exe.001 43936d2c54f69b300e33d0b97143eae9_JaffaCakes118.exe File created C:\Windows\Sys\Exe.006 43936d2c54f69b300e33d0b97143eae9_JaffaCakes118.exe File created C:\Windows\Sys\Exe.007 43936d2c54f69b300e33d0b97143eae9_JaffaCakes118.exe File created C:\Windows\Sys\Exe.exe 43936d2c54f69b300e33d0b97143eae9_JaffaCakes118.exe File opened for modification C:\Windows\Sys Exe.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Nudge_Madness.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 43936d2c54f69b300e33d0b97143eae9_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Exe.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: 33 2760 Exe.exe Token: SeIncBasePriorityPrivilege 2760 Exe.exe -
Suspicious use of SetWindowsHookEx 5 IoCs
pid Process 2844 Nudge_Madness.exe 2760 Exe.exe 2760 Exe.exe 2760 Exe.exe 2760 Exe.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2168 wrote to memory of 2760 2168 43936d2c54f69b300e33d0b97143eae9_JaffaCakes118.exe 30 PID 2168 wrote to memory of 2760 2168 43936d2c54f69b300e33d0b97143eae9_JaffaCakes118.exe 30 PID 2168 wrote to memory of 2760 2168 43936d2c54f69b300e33d0b97143eae9_JaffaCakes118.exe 30 PID 2168 wrote to memory of 2760 2168 43936d2c54f69b300e33d0b97143eae9_JaffaCakes118.exe 30 PID 2168 wrote to memory of 2844 2168 43936d2c54f69b300e33d0b97143eae9_JaffaCakes118.exe 31 PID 2168 wrote to memory of 2844 2168 43936d2c54f69b300e33d0b97143eae9_JaffaCakes118.exe 31 PID 2168 wrote to memory of 2844 2168 43936d2c54f69b300e33d0b97143eae9_JaffaCakes118.exe 31 PID 2168 wrote to memory of 2844 2168 43936d2c54f69b300e33d0b97143eae9_JaffaCakes118.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\43936d2c54f69b300e33d0b97143eae9_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\43936d2c54f69b300e33d0b97143eae9_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2168 -
C:\Windows\Sys\Exe.exe"C:\Windows\Sys\Exe.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:2760
-
-
C:\Users\Admin\AppData\Local\Temp\Nudge_Madness.exe"C:\Users\Admin\AppData\Local\Temp\Nudge_Madness.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2844
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
220KB
MD5fa2872e1a28b31fb2ccd92746397448d
SHA11b63649caaa88562f257c183c86acb983eb93b25
SHA256b2db7a4401fb56d23770290bb9a10fdca6e40daa24f54fca339bc5cdf49fa8ec
SHA51220ca0bc8c5d0122dac5b844a3174b8ef7fb12c134af89bf1d1806b67aa84e218af786fdec27afc1f9b1d77589776ca686f101455797c575d01d0579015c9b513
-
Filesize
3KB
MD5654a9e6b0dcd630ac38f96b31805829b
SHA1f1c31cd85c13a8ac9456c20b12e7306f5fcf9114
SHA256da5203b44ec966ef3a0c1875ed7d288085a34201c91cc368747a113833b6ceae
SHA512634cecad87d797be3df7b3403c820d7484322b57704eb6204107a80ac46bd027a786318254274447606a22a0681c921e24040480790ae756f2a828416b365f27
-
Filesize
5KB
MD581684ae4865ec5f66d24e892b03cdb28
SHA171e0129317001cbf9fc0876a6ea15886c0caa987
SHA256b036f867ef31023198260a6610a57cc9148a547103b17de934e607aca580eb23
SHA512adac78672fa35ad5aef8afac26c6360f06f98783fc3527c558b6fcadfd6d22b06ef4a8c0f6c076da3b270f83265eb4d20d58fc514932ad3d16554c3fd33f4fec
-
Filesize
4KB
MD5ac152720163090f4c0fb7f5c7e1638dc
SHA14fec3f24e3f9221c7c7cf918d7507586bf0cf48a
SHA256fdc0467059610b4055818e2e499c1ed17705397383a61245917bb93ba0f8e3ef
SHA512d62d827530d421735e95620f57230b1d7376a1055ddfb32d00db8df7764618f442a5166bdb765babf85695b7138ac7c4c71c231e5c745ed7d8113e6394acd301
-
Filesize
4KB
MD5fec74da36beb4457716675804f74221c
SHA11c02ce33852f00dd896b4bb1d93fbba663dd329d
SHA256e47ac7649f18595fbd2281a8cdff82a2b488b8dd56bc1ae88930b521f24b1c89
SHA51264b1d6912b2d6336f2ec7abd240215c842970eece0007afb4c939cf40becb437d6d6708d840035c935d96742918de07b52a96708388cbcda438e8c56d49ede06
-
Filesize
459KB
MD5b7a532f4b00925d636882e80f49305a8
SHA1ae88858ea8c3a7ba2ed373cb104ef2152fb44b54
SHA256f417f9088e6c39c418ecf8efbf0038362945788838bd7e67efd89199ada15ccd
SHA512551fe3425b17f29b1c8157b2fdf6c6c0ed15c655bc14e9b73ec38209c55191444762eeef61ae933047079243b9487f92b649f5852b3f22d4bac5d070f523b706