Analysis
-
max time kernel
148s -
max time network
148s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
30-10-2024 01:39
Static task
static1
Behavioral task
behavioral1
Sample
7d7715a391c5dd4718048bbadffda620_JaffaCakes118.exe
Resource
win7-20240903-en
General
-
Target
7d7715a391c5dd4718048bbadffda620_JaffaCakes118.exe
-
Size
2.2MB
-
MD5
7d7715a391c5dd4718048bbadffda620
-
SHA1
e01cf1c5aa1592ede3dfca9e613d2d01c5564d5e
-
SHA256
71b031d1bff5d1394daf263de1117f5a01e26a5fa394575b57db2f6a1aefc077
-
SHA512
f6be5139cf2f3556f4a9aad68a31713b642e14b42599fc37c6fb6a325c0ae461f5979583d0449360e4ed0a60e524c493f74ccbd331a8e7ab66276192f494fe2e
-
SSDEEP
49152:HGrTXhr4Ks3yUy2eBt4z2pFRWMv65dg1mUTG1RH26D6ABgGxv:HCUKrUyvUcFRRnIyG1NEAv
Malware Config
Signatures
-
Ardamax family
-
Ardamax main executable 1 IoCs
Processes:
resource yara_rule \Windows\SysWOW64\VKEERT\OXM.exe family_ardamax -
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 1 IoCs
Processes:
u1008.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ u1008.exe -
Executes dropped EXE 2 IoCs
Processes:
OXM.exeu1008.exepid process 2804 OXM.exe 2756 u1008.exe -
Identifies Wine through registry keys 2 TTPs 1 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
Processes:
u1008.exedescription ioc process Key opened \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Wine u1008.exe -
Loads dropped DLL 6 IoCs
Processes:
7d7715a391c5dd4718048bbadffda620_JaffaCakes118.exeOXM.exeu1008.exepid process 2068 7d7715a391c5dd4718048bbadffda620_JaffaCakes118.exe 2804 OXM.exe 2068 7d7715a391c5dd4718048bbadffda620_JaffaCakes118.exe 2068 7d7715a391c5dd4718048bbadffda620_JaffaCakes118.exe 2068 7d7715a391c5dd4718048bbadffda620_JaffaCakes118.exe 2756 u1008.exe -
Unexpected DNS network traffic destination 12 IoCs
Network traffic to other servers than the configured DNS servers was detected on the DNS port.
Processes:
description ioc Destination IP 193.242.90.198 Destination IP 198.188.2.5 Destination IP 168.215.165.186 Destination IP 63.146.191.180 Destination IP 129.171.32.1 Destination IP 66.238.94.253 Destination IP 157.160.32.12 Destination IP 64.16.213.6 Destination IP 141.211.125.15 Destination IP 134.48.1.32 Destination IP 216.2.192.31 Destination IP 198.153.162.5 -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
OXM.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\OXM Start = "C:\\Windows\\SysWOW64\\VKEERT\\OXM.exe" OXM.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Writes to the Master Boot Record (MBR) 1 TTPs 1 IoCs
Bootkits write to the MBR to gain persistence at a level below the operating system.
Processes:
u1008.exedescription ioc process File opened for modification \??\PhysicalDrive0 u1008.exe -
Drops file in System32 directory 6 IoCs
Processes:
7d7715a391c5dd4718048bbadffda620_JaffaCakes118.exeOXM.exedescription ioc process File created C:\Windows\SysWOW64\VKEERT\OXM.004 7d7715a391c5dd4718048bbadffda620_JaffaCakes118.exe File created C:\Windows\SysWOW64\VKEERT\OXM.001 7d7715a391c5dd4718048bbadffda620_JaffaCakes118.exe File created C:\Windows\SysWOW64\VKEERT\OXM.002 7d7715a391c5dd4718048bbadffda620_JaffaCakes118.exe File created C:\Windows\SysWOW64\VKEERT\AKV.exe 7d7715a391c5dd4718048bbadffda620_JaffaCakes118.exe File created C:\Windows\SysWOW64\VKEERT\OXM.exe 7d7715a391c5dd4718048bbadffda620_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\VKEERT\ OXM.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
Processes:
u1008.exepid process 2756 u1008.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
7d7715a391c5dd4718048bbadffda620_JaffaCakes118.exeOXM.exeu1008.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 7d7715a391c5dd4718048bbadffda620_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language OXM.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language u1008.exe -
Processes:
u1008.exedescription ioc process Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\AD7E1C28B064EF8F6003402014C3D0E3370EB58A\Blob = 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 u1008.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\AD7E1C28B064EF8F6003402014C3D0E3370EB58A\Blob = 040000000100000010000000324a4bbbc863699bbe749ac6dd1d4624030000000100000014000000ad7e1c28b064ef8f6003402014c3d0e3370eb58a1d000000010000001000000090c4f4233b006b7bfaa6adcd8f577d77140000000100000014000000bf5fb7d1cedd1f86f45b55acdcd710c20ea988e709000000010000002a000000302806082b0601050507030106082b0601050507030206082b0601050507030406082b0601050507030353000000010000004800000030463021060b6086480186fd6d0107170330123010060a2b0601040182373c0101030200c03021060b6086480186fd6e0107170330123010060a2b0601040182373c0101030200c00b000000010000005400000053007400610072006600690065006c006400200043006c00610073007300200032002000430065007200740069006600690063006100740069006f006e00200041007500740068006f00720069007400790000000f00000001000000140000000f6aad4c3fe04619cdc8b2bd655aa1a26042e6502000000001000000130400003082040f308202f7a003020102020100300d06092a864886f70d01010505003068310b300906035504061302555331253023060355040a131c537461726669656c6420546563686e6f6c6f676965732c20496e632e31323030060355040b1329537461726669656c6420436c61737320322043657274696669636174696f6e20417574686f72697479301e170d3034303632393137333931365a170d3334303632393137333931365a3068310b300906035504061302555331253023060355040a131c537461726669656c6420546563686e6f6c6f676965732c20496e632e31323030060355040b1329537461726669656c6420436c61737320322043657274696669636174696f6e20417574686f7269747930820120300d06092a864886f70d01010105000382010d00308201080282010100b732c8fee971a60485ad0c1164dfce4defc80318873fa1abfb3ca69ff0c3a1dad4d86e2b5390fb24a43e84f09ee85fece52744f528a63f7bdee02af0c8af532f9eca0501931e8f661c39a74dfa5ab673042566eb777fe759c64a99251454eb26c7f37f19d530708fafb0462affadeb29edd79faa0487a3d4f989a5345fdb43918236d9663cb1b8b982fd9c3a3e10c83bef0665667a9b19183dff71513c302e5fbe3d7773b25d066cc323569a2b8526921ca702b3e43f0daf087982b8363dea9cd335b3bc69caf5cc9de8fd648d1780336e5e4a5d99c91e87b49d1ac0d56e1335235edf9b5f3defd6f776c2ea3ebb780d1c42676b04d8f8d6da6f8bf244a001ab020103a381c53081c2301d0603551d0e04160414bf5fb7d1cedd1f86f45b55acdcd710c20ea988e73081920603551d2304818a3081878014bf5fb7d1cedd1f86f45b55acdcd710c20ea988e7a16ca46a3068310b300906035504061302555331253023060355040a131c537461726669656c6420546563686e6f6c6f676965732c20496e632e31323030060355040b1329537461726669656c6420436c61737320322043657274696669636174696f6e20417574686f72697479820100300c0603551d13040530030101ff300d06092a864886f70d01010505000382010100059d3f889dd1c91a55a1ac69f3f359da9b01871a4f57a9a179092adbf72fb21eccc75e6ad88387a197ef49353e7706415862bf8e58b80a673fecb3dd21661fc954fa72cc3d4c40d881af779e837abba2c7f534178ed91140f4fc2c2a4d157fa7625d2e25d3000b201a1d68f917b8f4bd8bed2859dd4d168b1783c8b265c72d7aa5aabc53866ddd57a4caf820410b68f0f4fb74be565d7a79f5f91d85e32d95bef5719043cc8d1f9a000a8729e95522580023eae31243295b4708dd8c416a6506a8e521aa41b4952195b97dd134ab13d6adbcdce23d39cdbd3e7570a1185903c922b48f9cd55e2ad7a5b6d40a6df8b74011469a1f790e62bf0f97ece02f1f1794 u1008.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\AD7E1C28B064EF8F6003402014C3D0E3370EB58A\Blob = 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 u1008.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\AD7E1C28B064EF8F6003402014C3D0E3370EB58A u1008.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
Processes:
u1008.exepid process 2756 u1008.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
OXM.exedescription pid process Token: 33 2804 OXM.exe Token: SeIncBasePriorityPrivilege 2804 OXM.exe -
Suspicious use of SetWindowsHookEx 48 IoCs
Processes:
OXM.exeu1008.exepid process 2804 OXM.exe 2804 OXM.exe 2804 OXM.exe 2804 OXM.exe 2756 u1008.exe 2756 u1008.exe 2756 u1008.exe 2756 u1008.exe 2756 u1008.exe 2756 u1008.exe 2756 u1008.exe 2756 u1008.exe 2756 u1008.exe 2756 u1008.exe 2756 u1008.exe 2756 u1008.exe 2756 u1008.exe 2756 u1008.exe 2756 u1008.exe 2756 u1008.exe 2756 u1008.exe 2756 u1008.exe 2756 u1008.exe 2756 u1008.exe 2756 u1008.exe 2756 u1008.exe 2756 u1008.exe 2756 u1008.exe 2756 u1008.exe 2756 u1008.exe 2756 u1008.exe 2756 u1008.exe 2756 u1008.exe 2756 u1008.exe 2756 u1008.exe 2756 u1008.exe 2756 u1008.exe 2756 u1008.exe 2756 u1008.exe 2756 u1008.exe 2756 u1008.exe 2756 u1008.exe 2756 u1008.exe 2756 u1008.exe 2756 u1008.exe 2756 u1008.exe 2756 u1008.exe 2756 u1008.exe -
Suspicious use of WriteProcessMemory 8 IoCs
Processes:
7d7715a391c5dd4718048bbadffda620_JaffaCakes118.exedescription pid process target process PID 2068 wrote to memory of 2804 2068 7d7715a391c5dd4718048bbadffda620_JaffaCakes118.exe OXM.exe PID 2068 wrote to memory of 2804 2068 7d7715a391c5dd4718048bbadffda620_JaffaCakes118.exe OXM.exe PID 2068 wrote to memory of 2804 2068 7d7715a391c5dd4718048bbadffda620_JaffaCakes118.exe OXM.exe PID 2068 wrote to memory of 2804 2068 7d7715a391c5dd4718048bbadffda620_JaffaCakes118.exe OXM.exe PID 2068 wrote to memory of 2756 2068 7d7715a391c5dd4718048bbadffda620_JaffaCakes118.exe u1008.exe PID 2068 wrote to memory of 2756 2068 7d7715a391c5dd4718048bbadffda620_JaffaCakes118.exe u1008.exe PID 2068 wrote to memory of 2756 2068 7d7715a391c5dd4718048bbadffda620_JaffaCakes118.exe u1008.exe PID 2068 wrote to memory of 2756 2068 7d7715a391c5dd4718048bbadffda620_JaffaCakes118.exe u1008.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\7d7715a391c5dd4718048bbadffda620_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\7d7715a391c5dd4718048bbadffda620_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2068 -
C:\Windows\SysWOW64\VKEERT\OXM.exe"C:\Windows\system32\VKEERT\OXM.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:2804
-
-
C:\Users\Admin\AppData\Local\Temp\u1008.exe"C:\Users\Admin\AppData\Local\Temp\u1008.exe"2⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Executes dropped EXE
- Identifies Wine through registry keys
- Loads dropped DLL
- Writes to the Master Boot Record (MBR)
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Modifies system certificate store
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:2756
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Pre-OS Boot
1Bootkit
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Defense Evasion
Modify Registry
2Pre-OS Boot
1Bootkit
1Subvert Trust Controls
1Install Root Certificate
1Virtualization/Sandbox Evasion
2Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a40cbdb1d4092d730721780c97f3e801
SHA17407ac29532cd1873a165fe9d3f53f7cb7d8a3d6
SHA2565fd448c4156f9f435c4604f368564269e77bac8edff84e019c30e7b42200eeef
SHA5121249ce2e91af3f77b397c16c4ee6be8dc87483165199ec5f740c810d4b7f90e203ce6bfd1a60e881ce3a5136524dc4d1a4fe5abaa7f91dca318b7f2660ca2a11
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b
-
Filesize
456KB
MD545a56a60fc710085ef72a86ae4de2a44
SHA191133410b770cfc8433b976aa44fc34346e614e6
SHA25682d3a18d8121ad32e61d0c1fc1dabb2073d21ce82431c9d1259e2589aad373e2
SHA512c4322b3b668efd8858ce71e1d80e25f21f75b39d4331d8c88050a8f484e524eac58226dfdbeb89fe569e89a6e93fcbb3300d537666126eb3fbf4fe54136aabbf
-
Filesize
60KB
MD55b79ad0d1d30119158b5ab4147edbd96
SHA16f802d57d49d7063e40b7bebafa8fb1051e0a907
SHA2564ccebd38ac000cbc33a6cfc2e87e900ef64ba4b978f3facfdb5870e217ac3ff7
SHA512497e3eff3c7356cf12efd153b651d1a1ef2cb07302eb5b71dcff0d6732e5273bcff5f82897dff85cdaae0bc159fa9c4588e3bc90ab12521532675bf116757c6b
-
Filesize
43KB
MD5af3efaa90f29f6506693136ae1674fc7
SHA1897aea8f6df7e29d43954512fc390b97c0eb4550
SHA2564658d92f74df5ee142c08157985e25e41f74aaaa4256df9dfc9a011b7c3f0f44
SHA5121a87ce2d0767204b1d636ce70c083c71f5cfa064680218906ff86c233968baca7ef605f2b1d9bfaf8326a8cbff7074ace766604b283c1a2b50d5788038dc9863
-
Filesize
1KB
MD5025af52aa3c7e64bf1acc045a4dfab6e
SHA1f9e7fd1e3cff2ec34497cd4cf929452eff5f6dce
SHA256bdb25abcd63860479fd62c0494e8a7cae48be91d365efc208941cdcb3fa25db4
SHA51213f57511f72c1769c326478e52d033506e1865c7c27100b5143ec8d28152010ffc14e44e0f3478b2d1dc556e4862b5d9113e21a3516fd39c5af1cf4e06ac8ccc
-
Filesize
1.1MB
MD5b2d30ed05e7a230b1d6254666234d51f
SHA13efa10b5724887b0dee11b7f9948232517050d6d
SHA256977ad551cf91339042406eccbed808a0ebe0f693f82e0dd90ea266430d772198
SHA512f21f88b744def8244b4680236909d7ef051425c0bd18bc05951d8f16470e2103e4be140c5b4b264e41abaa51e519d3b426d4d7268453df0d731a86eea7b3d11b
-
Filesize
1.7MB
MD578dd492b06d03744d1954781d33775ca
SHA1ef9462193e6ba7be64458ea1be6afcaeadc574b1
SHA256c0664f94e9b2a7817f79b9457c31e524ef72ed7c073e79546d67e857b4637ede
SHA512f88734970018f46b8c4ce350cccf577ac056957e933deb493becbc30b7165834ca68db423850220f8944b364dc97e1423247192faf4f3e4db85cf25c4576eef9