Analysis
-
max time kernel
146s -
max time network
145s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
30-10-2024 01:39
Static task
static1
Behavioral task
behavioral1
Sample
7d7715a391c5dd4718048bbadffda620_JaffaCakes118.exe
Resource
win7-20240903-en
General
-
Target
7d7715a391c5dd4718048bbadffda620_JaffaCakes118.exe
-
Size
2.2MB
-
MD5
7d7715a391c5dd4718048bbadffda620
-
SHA1
e01cf1c5aa1592ede3dfca9e613d2d01c5564d5e
-
SHA256
71b031d1bff5d1394daf263de1117f5a01e26a5fa394575b57db2f6a1aefc077
-
SHA512
f6be5139cf2f3556f4a9aad68a31713b642e14b42599fc37c6fb6a325c0ae461f5979583d0449360e4ed0a60e524c493f74ccbd331a8e7ab66276192f494fe2e
-
SSDEEP
49152:HGrTXhr4Ks3yUy2eBt4z2pFRWMv65dg1mUTG1RH26D6ABgGxv:HCUKrUyvUcFRRnIyG1NEAv
Malware Config
Signatures
-
Ardamax family
-
Ardamax main executable 1 IoCs
resource yara_rule behavioral2/files/0x0008000000023bf1-8.dat family_ardamax -
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ u1008.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\Control Panel\International\Geo\Nation 7d7715a391c5dd4718048bbadffda620_JaffaCakes118.exe -
Executes dropped EXE 2 IoCs
pid Process 1040 OXM.exe 2612 u1008.exe -
Identifies Wine through registry keys 2 TTPs 1 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\Software\Wine u1008.exe -
Loads dropped DLL 3 IoCs
pid Process 1040 OXM.exe 556 7d7715a391c5dd4718048bbadffda620_JaffaCakes118.exe 2612 u1008.exe -
Unexpected DNS network traffic destination 12 IoCs
Network traffic to other servers than the configured DNS servers was detected on the DNS port.
description ioc Destination IP 193.67.242.1 Destination IP 144.142.3.20 Destination IP 165.129.13.21 Destination IP 134.48.1.32 Destination IP 128.107.241.182 Destination IP 216.109.85.133 Destination IP 128.143.22.119 Destination IP 159.153.197.89 Destination IP 209.135.37.204 Destination IP 216.54.204.186 Destination IP 63.148.114.90 Destination IP 137.65.1.1 -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\OXM Start = "C:\\Windows\\SysWOW64\\VKEERT\\OXM.exe" OXM.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Writes to the Master Boot Record (MBR) 1 TTPs 1 IoCs
Bootkits write to the MBR to gain persistence at a level below the operating system.
description ioc Process File opened for modification \??\PhysicalDrive0 u1008.exe -
Drops file in System32 directory 6 IoCs
description ioc Process File created C:\Windows\SysWOW64\VKEERT\OXM.001 7d7715a391c5dd4718048bbadffda620_JaffaCakes118.exe File created C:\Windows\SysWOW64\VKEERT\OXM.002 7d7715a391c5dd4718048bbadffda620_JaffaCakes118.exe File created C:\Windows\SysWOW64\VKEERT\AKV.exe 7d7715a391c5dd4718048bbadffda620_JaffaCakes118.exe File created C:\Windows\SysWOW64\VKEERT\OXM.exe 7d7715a391c5dd4718048bbadffda620_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\VKEERT\ OXM.exe File created C:\Windows\SysWOW64\VKEERT\OXM.004 7d7715a391c5dd4718048bbadffda620_JaffaCakes118.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
pid Process 2612 u1008.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 7d7715a391c5dd4718048bbadffda620_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language OXM.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language u1008.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2612 u1008.exe 2612 u1008.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: 33 1040 OXM.exe Token: SeIncBasePriorityPrivilege 1040 OXM.exe -
Suspicious use of SetWindowsHookEx 48 IoCs
pid Process 1040 OXM.exe 1040 OXM.exe 1040 OXM.exe 1040 OXM.exe 2612 u1008.exe 2612 u1008.exe 2612 u1008.exe 2612 u1008.exe 2612 u1008.exe 2612 u1008.exe 2612 u1008.exe 2612 u1008.exe 2612 u1008.exe 2612 u1008.exe 2612 u1008.exe 2612 u1008.exe 2612 u1008.exe 2612 u1008.exe 2612 u1008.exe 2612 u1008.exe 2612 u1008.exe 2612 u1008.exe 2612 u1008.exe 2612 u1008.exe 2612 u1008.exe 2612 u1008.exe 2612 u1008.exe 2612 u1008.exe 2612 u1008.exe 2612 u1008.exe 2612 u1008.exe 2612 u1008.exe 2612 u1008.exe 2612 u1008.exe 2612 u1008.exe 2612 u1008.exe 2612 u1008.exe 2612 u1008.exe 2612 u1008.exe 2612 u1008.exe 2612 u1008.exe 2612 u1008.exe 2612 u1008.exe 2612 u1008.exe 2612 u1008.exe 2612 u1008.exe 2612 u1008.exe 2612 u1008.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 556 wrote to memory of 1040 556 7d7715a391c5dd4718048bbadffda620_JaffaCakes118.exe 84 PID 556 wrote to memory of 1040 556 7d7715a391c5dd4718048bbadffda620_JaffaCakes118.exe 84 PID 556 wrote to memory of 1040 556 7d7715a391c5dd4718048bbadffda620_JaffaCakes118.exe 84 PID 556 wrote to memory of 2612 556 7d7715a391c5dd4718048bbadffda620_JaffaCakes118.exe 85 PID 556 wrote to memory of 2612 556 7d7715a391c5dd4718048bbadffda620_JaffaCakes118.exe 85 PID 556 wrote to memory of 2612 556 7d7715a391c5dd4718048bbadffda620_JaffaCakes118.exe 85
Processes
-
C:\Users\Admin\AppData\Local\Temp\7d7715a391c5dd4718048bbadffda620_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\7d7715a391c5dd4718048bbadffda620_JaffaCakes118.exe"1⤵
- Checks computer location settings
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:556 -
C:\Windows\SysWOW64\VKEERT\OXM.exe"C:\Windows\system32\VKEERT\OXM.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:1040
-
-
C:\Users\Admin\AppData\Local\Temp\u1008.exe"C:\Users\Admin\AppData\Local\Temp\u1008.exe"2⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Executes dropped EXE
- Identifies Wine through registry keys
- Loads dropped DLL
- Writes to the Master Boot Record (MBR)
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:2612
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Pre-OS Boot
1Bootkit
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Defense Evasion
Modify Registry
1Pre-OS Boot
1Bootkit
1Virtualization/Sandbox Evasion
2Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.1MB
MD5b2d30ed05e7a230b1d6254666234d51f
SHA13efa10b5724887b0dee11b7f9948232517050d6d
SHA256977ad551cf91339042406eccbed808a0ebe0f693f82e0dd90ea266430d772198
SHA512f21f88b744def8244b4680236909d7ef051425c0bd18bc05951d8f16470e2103e4be140c5b4b264e41abaa51e519d3b426d4d7268453df0d731a86eea7b3d11b
-
Filesize
456KB
MD545a56a60fc710085ef72a86ae4de2a44
SHA191133410b770cfc8433b976aa44fc34346e614e6
SHA25682d3a18d8121ad32e61d0c1fc1dabb2073d21ce82431c9d1259e2589aad373e2
SHA512c4322b3b668efd8858ce71e1d80e25f21f75b39d4331d8c88050a8f484e524eac58226dfdbeb89fe569e89a6e93fcbb3300d537666126eb3fbf4fe54136aabbf
-
Filesize
60KB
MD55b79ad0d1d30119158b5ab4147edbd96
SHA16f802d57d49d7063e40b7bebafa8fb1051e0a907
SHA2564ccebd38ac000cbc33a6cfc2e87e900ef64ba4b978f3facfdb5870e217ac3ff7
SHA512497e3eff3c7356cf12efd153b651d1a1ef2cb07302eb5b71dcff0d6732e5273bcff5f82897dff85cdaae0bc159fa9c4588e3bc90ab12521532675bf116757c6b
-
Filesize
43KB
MD5af3efaa90f29f6506693136ae1674fc7
SHA1897aea8f6df7e29d43954512fc390b97c0eb4550
SHA2564658d92f74df5ee142c08157985e25e41f74aaaa4256df9dfc9a011b7c3f0f44
SHA5121a87ce2d0767204b1d636ce70c083c71f5cfa064680218906ff86c233968baca7ef605f2b1d9bfaf8326a8cbff7074ace766604b283c1a2b50d5788038dc9863
-
Filesize
1KB
MD5025af52aa3c7e64bf1acc045a4dfab6e
SHA1f9e7fd1e3cff2ec34497cd4cf929452eff5f6dce
SHA256bdb25abcd63860479fd62c0494e8a7cae48be91d365efc208941cdcb3fa25db4
SHA51213f57511f72c1769c326478e52d033506e1865c7c27100b5143ec8d28152010ffc14e44e0f3478b2d1dc556e4862b5d9113e21a3516fd39c5af1cf4e06ac8ccc
-
Filesize
1.7MB
MD578dd492b06d03744d1954781d33775ca
SHA1ef9462193e6ba7be64458ea1be6afcaeadc574b1
SHA256c0664f94e9b2a7817f79b9457c31e524ef72ed7c073e79546d67e857b4637ede
SHA512f88734970018f46b8c4ce350cccf577ac056957e933deb493becbc30b7165834ca68db423850220f8944b364dc97e1423247192faf4f3e4db85cf25c4576eef9