General
-
Target
4bd0b15ec0bac832da84ec3b2f6cfc50_JaffaCakes118
-
Size
820KB
-
Sample
241016-hm325axgqh
-
MD5
4bd0b15ec0bac832da84ec3b2f6cfc50
-
SHA1
7eaab2da4a96c8864e7ee370cc092784f2e1488d
-
SHA256
e40164daac3a83dcd81d43c95389cbbff7c2a0b7c02f955ce44e455974a0c1e2
-
SHA512
2fc12e7fb1d4d1ffe2ae2bab13aa62c740d7327e8134e134acdb7364165e2692d00dcaa635655b5ff31b49b6e6a955f0502351e1afbb8d1e4d472780f5c72707
-
SSDEEP
12288:g3TdtLW5WIj1YSSdFxUsl8uJ/vBSXyMzBUWb9lx/9AgHLo8OW+rBaPaG:aDsj1dEtauJHBcJ9nPx/igrp+YPaG
Static task
static1
Behavioral task
behavioral1
Sample
4bd0b15ec0bac832da84ec3b2f6cfc50_JaffaCakes118.exe
Resource
win7-20240729-en
Malware Config
Extracted
sality
http://89.119.67.154/testo5/
http://kukutrustnet777.info/home.gif
http://kukutrustnet888.info/home.gif
http://kukutrustnet987.info/home.gif
Targets
-
-
Target
4bd0b15ec0bac832da84ec3b2f6cfc50_JaffaCakes118
-
Size
820KB
-
MD5
4bd0b15ec0bac832da84ec3b2f6cfc50
-
SHA1
7eaab2da4a96c8864e7ee370cc092784f2e1488d
-
SHA256
e40164daac3a83dcd81d43c95389cbbff7c2a0b7c02f955ce44e455974a0c1e2
-
SHA512
2fc12e7fb1d4d1ffe2ae2bab13aa62c740d7327e8134e134acdb7364165e2692d00dcaa635655b5ff31b49b6e6a955f0502351e1afbb8d1e4d472780f5c72707
-
SSDEEP
12288:g3TdtLW5WIj1YSSdFxUsl8uJ/vBSXyMzBUWb9lx/9AgHLo8OW+rBaPaG:aDsj1dEtauJHBcJ9nPx/igrp+YPaG
-
Ardamax main executable
-
Modifies WinLogon for persistence
-
Disables RegEdit via registry modification
-
Disables Task Manager via registry modification
-
Modifies Windows Firewall
-
Executes dropped EXE
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
AutoIT Executable
AutoIT scripts compiled to PE executables.
-
Drops file in System32 directory
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Create or Modify System Process
1Windows Service
1Event Triggered Execution
1Netsh Helper DLL
1Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Create or Modify System Process
1Windows Service
1Event Triggered Execution
1Netsh Helper DLL
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
4Disable or Modify System Firewall
1Disable or Modify Tools
3Modify Registry
6