Analysis
-
max time kernel
140s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
28-10-2024 02:53
Static task
static1
Behavioral task
behavioral1
Sample
774e06db0c880a85059f50f6d566386b_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
774e06db0c880a85059f50f6d566386b_JaffaCakes118.exe
Resource
win10v2004-20241007-en
General
-
Target
774e06db0c880a85059f50f6d566386b_JaffaCakes118.exe
-
Size
566KB
-
MD5
774e06db0c880a85059f50f6d566386b
-
SHA1
ef246badd7e5590c5b0ef33a711e36c7794b7790
-
SHA256
c9478d5c941e82c3979d3b8a9ddfa253db268f24daf5534b9ee243600d8be5fe
-
SHA512
e049a5bcfa627ff293ae7647b8a3a6a6b8e27679530b657b98cb6e09a1bf2341c87f5d0e4858ce0f9f6a7fff4844b003bed83ec77130b1b78c9f60282efc7f57
-
SSDEEP
12288:FtU8E3hZrKJBipU5yrQyGtEqTK78ap1sprEETQDtonarE3LusCDoEm4:PUL3hZWrfyr78rTMOaYzJS
Malware Config
Signatures
-
Ardamax family
-
Ardamax main executable 1 IoCs
resource yara_rule behavioral1/files/0x0005000000019408-9.dat family_ardamax -
Executes dropped EXE 2 IoCs
pid Process 2748 TND.exe 2900 Launcher.exe -
Loads dropped DLL 9 IoCs
pid Process 2932 774e06db0c880a85059f50f6d566386b_JaffaCakes118.exe 2932 774e06db0c880a85059f50f6d566386b_JaffaCakes118.exe 2932 774e06db0c880a85059f50f6d566386b_JaffaCakes118.exe 2748 TND.exe 2932 774e06db0c880a85059f50f6d566386b_JaffaCakes118.exe 2748 TND.exe 2932 774e06db0c880a85059f50f6d566386b_JaffaCakes118.exe 2932 774e06db0c880a85059f50f6d566386b_JaffaCakes118.exe 2900 Launcher.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\TND = "C:\\Windows\\SysWOW64\\Sys\\TND.exe" TND.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Drops file in System32 directory 5 IoCs
description ioc Process File created C:\Windows\SysWOW64\Sys\TND.001 774e06db0c880a85059f50f6d566386b_JaffaCakes118.exe File created C:\Windows\SysWOW64\Sys\TND.006 774e06db0c880a85059f50f6d566386b_JaffaCakes118.exe File created C:\Windows\SysWOW64\Sys\TND.007 774e06db0c880a85059f50f6d566386b_JaffaCakes118.exe File created C:\Windows\SysWOW64\Sys\TND.exe 774e06db0c880a85059f50f6d566386b_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\Sys TND.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 774e06db0c880a85059f50f6d566386b_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language TND.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Launcher.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: 33 2748 TND.exe Token: SeIncBasePriorityPrivilege 2748 TND.exe -
Suspicious use of SetWindowsHookEx 5 IoCs
pid Process 2748 TND.exe 2748 TND.exe 2748 TND.exe 2900 Launcher.exe 2900 Launcher.exe -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 2932 wrote to memory of 2748 2932 774e06db0c880a85059f50f6d566386b_JaffaCakes118.exe 30 PID 2932 wrote to memory of 2748 2932 774e06db0c880a85059f50f6d566386b_JaffaCakes118.exe 30 PID 2932 wrote to memory of 2748 2932 774e06db0c880a85059f50f6d566386b_JaffaCakes118.exe 30 PID 2932 wrote to memory of 2748 2932 774e06db0c880a85059f50f6d566386b_JaffaCakes118.exe 30 PID 2932 wrote to memory of 2900 2932 774e06db0c880a85059f50f6d566386b_JaffaCakes118.exe 31 PID 2932 wrote to memory of 2900 2932 774e06db0c880a85059f50f6d566386b_JaffaCakes118.exe 31 PID 2932 wrote to memory of 2900 2932 774e06db0c880a85059f50f6d566386b_JaffaCakes118.exe 31 PID 2932 wrote to memory of 2900 2932 774e06db0c880a85059f50f6d566386b_JaffaCakes118.exe 31 PID 2932 wrote to memory of 2900 2932 774e06db0c880a85059f50f6d566386b_JaffaCakes118.exe 31 PID 2932 wrote to memory of 2900 2932 774e06db0c880a85059f50f6d566386b_JaffaCakes118.exe 31 PID 2932 wrote to memory of 2900 2932 774e06db0c880a85059f50f6d566386b_JaffaCakes118.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\774e06db0c880a85059f50f6d566386b_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\774e06db0c880a85059f50f6d566386b_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2932 -
C:\Windows\SysWOW64\Sys\TND.exe"C:\Windows\system32\Sys\TND.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:2748
-
-
C:\Users\Admin\AppData\Local\Temp\Launcher.exe"C:\Users\Admin\AppData\Local\Temp\Launcher.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2900
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3KB
MD5e08177d4e7338f421e318f381d832a2c
SHA19ee6fe8be4b540bc9486d1cdd326bacf3ea8ff0c
SHA256231b47eea9dc0a29860a9f82afad0671a968803db5239955cf4a1021f3cb22aa
SHA5125de8ffdcc482c744fa09be5925cb7169b3c9ddd389cb1a4818efc1bffa9e2056bf2a4da57fa9437f43ffc018c3c209d90bc891b0d510589df681f9b7be1defc4
-
Filesize
5KB
MD55030abad48124a2602b6c92f16b5af0e
SHA10bdb4bc9341d00ed035c3814d9872d254af160b8
SHA256399b2f9759183393df584af3bc75739224e7e05c77e9f5830782fccb01974d48
SHA512ed087615100900e6886b3f204e17f723b631f09caa4aa645247bd268606857d81799a82306e242ac3977523b6d9d4a0cb0d1cbd94279e6647cc258a976606148
-
Filesize
4KB
MD5de928b5da2aa61f79788fb52f9fc764d
SHA1eafe870c5208335fa3a6480d70aa3ab2373d324c
SHA256c6edef1f4ce1b891443798a522a64d30b2843f9e74a5f97664b4e467c8f19273
SHA512b2eee3e5c74dfeef522c0823922f7f6ad837646bf7954d7de68a6976ac55bee1af921687d7af2f657f248c88b54603c465277b34258ec510c85bf8b51c1fe8d7
-
Filesize
4KB
MD53f7d2f5330a268d87032e7485cf5863f
SHA1b2b5270be96137acfd5be89785e11349fbe3c9b9
SHA25664fdf2bb9073999fa36a3f7c4aeb42ef0cfbb989aaa18069a1a69d8075409138
SHA5123a0a065c8f79d24f1fbb46e952a696a98a8d05ce06685dc67a8e81cd0c14990c0a9b8ef82870b3e4e38ad5abdc3669434d1844cca837de410d4c0abe982315a0
-
Filesize
312KB
MD5423f0f6845e49b1b00fcf5ba9345217c
SHA1eb54a8d0478858e2cf61b1e2d3e5d00c4f74a518
SHA2569701f6351a40fdd887689913deb968f521b29e5e50b1d9862aed97ea4fc4d356
SHA5126179716b5d07fec99172d47ded8078ba5842bdf0c9c40b33f4fb3bba0590c5b4e54c938b7f64ad5ccae28ac44b3353a9004139f1cdabeb001cefc4f4b76cb338
-
Filesize
460KB
MD55d6ab450b17f4b783f11958ea941008e
SHA1cdbd0a69fa73d9e0ad5704517dab1c96f018f729
SHA256e3bf498b7353baa701363d216ca1b8766f82ff6e851d0585958476e36bf1143d
SHA512b34ad4d6182923d75b3e42e08b40bea18ae8c9b05c70bd4bae490cb9a44335b57d206a2b620d74d033b38eca5cb16123fca1015585c00944f7f2500bc02224e5