Analysis
-
max time kernel
141s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20241023-en -
resource tags
arch:x64arch:x86image:win7-20241023-enlocale:en-usos:windows7-x64system -
submitted
30-10-2024 05:38
Static task
static1
Behavioral task
behavioral1
Sample
7e1248e1bf6e55db50994e9db2068e33_JaffaCakes118.exe
Resource
win7-20241023-en
General
-
Target
7e1248e1bf6e55db50994e9db2068e33_JaffaCakes118.exe
-
Size
2.5MB
-
MD5
7e1248e1bf6e55db50994e9db2068e33
-
SHA1
4165df8ddcccf6f44c758757e8f0bf9f8bba3544
-
SHA256
78f0ece4ea65947d76d9035ec0a8fd7089fce7cb41f50e33e085eacfdd5c001a
-
SHA512
119f21e73416564c4a59046799215d210170b79c02bcb01504d25d04fcbd4b989bd09d55a0396eccd0d1027fdcd60e0eb2087e5bb5854730b02f8699c289e503
-
SSDEEP
49152:TwtJ0i/cgvnpUlLif3hAmaL5ZtQV803MJAoYvT94g6pvA3G7k:8tN/cCnpUlufGtQ3MJAoET0pvA3G7k
Malware Config
Signatures
-
Ardamax family
-
Ardamax main executable 1 IoCs
Processes:
resource yara_rule \Windows\SysWOW64\28463\NSEQ.exe family_ardamax -
Executes dropped EXE 2 IoCs
Processes:
rootZyn.exeNSEQ.exepid process 2496 rootZyn.exe 2844 NSEQ.exe -
Identifies Wine through registry keys 2 TTPs 1 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
Processes:
7e1248e1bf6e55db50994e9db2068e33_JaffaCakes118.exedescription ioc process Key opened \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Wine 7e1248e1bf6e55db50994e9db2068e33_JaffaCakes118.exe -
Loads dropped DLL 8 IoCs
Processes:
7e1248e1bf6e55db50994e9db2068e33_JaffaCakes118.exerootZyn.exeNSEQ.exepid process 2140 7e1248e1bf6e55db50994e9db2068e33_JaffaCakes118.exe 2140 7e1248e1bf6e55db50994e9db2068e33_JaffaCakes118.exe 2496 rootZyn.exe 2496 rootZyn.exe 2844 NSEQ.exe 2844 NSEQ.exe 2140 7e1248e1bf6e55db50994e9db2068e33_JaffaCakes118.exe 2140 7e1248e1bf6e55db50994e9db2068e33_JaffaCakes118.exe -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
NSEQ.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\NSEQ Agent = "C:\\Windows\\SysWOW64\\28463\\NSEQ.exe" NSEQ.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Drops file in System32 directory 9 IoCs
Processes:
rootZyn.exeNSEQ.exedescription ioc process File created C:\Windows\SysWOW64\28463\NSEQ.007 rootZyn.exe File opened for modification C:\Windows\SysWOW64\28463 NSEQ.exe File created C:\Windows\SysWOW64\28463\NSEQ.001 rootZyn.exe File created C:\Windows\SysWOW64\28463\NSEQ.006 rootZyn.exe File created C:\Windows\SysWOW64\28463\NSEQ.exe rootZyn.exe File created C:\Windows\SysWOW64\28463\key.bin rootZyn.exe File created C:\Windows\SysWOW64\28463\AKV.exe rootZyn.exe File created C:\Windows\SysWOW64\28463\NSEQ.009 NSEQ.exe File opened for modification C:\Windows\SysWOW64\28463\NSEQ.009 NSEQ.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
Processes:
7e1248e1bf6e55db50994e9db2068e33_JaffaCakes118.exepid process 2140 7e1248e1bf6e55db50994e9db2068e33_JaffaCakes118.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
rootZyn.exeNSEQ.exe7e1248e1bf6e55db50994e9db2068e33_JaffaCakes118.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rootZyn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language NSEQ.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 7e1248e1bf6e55db50994e9db2068e33_JaffaCakes118.exe -
Modifies registry class 34 IoCs
Processes:
NSEQ.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{D6688363-FE70-4D34-AF9D-E801384BF455}\Version\ = "1.0" NSEQ.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{D6688363-FE70-4D34-AF9D-E801384BF455}\VersionIndependentProgID NSEQ.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{D6688363-FE70-4D34-AF9D-E801384BF455}\VersionIndependentProgID\ = "MSVidCtl.MSVidFeatures" NSEQ.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{6F8A8BA4-4544-678B-6C62-4D622C87EB6C}\1.0\0\win32\ NSEQ.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{D6688363-FE70-4D34-AF9D-E801384BF455}\Version\ NSEQ.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{6F8A8BA4-4544-678B-6C62-4D622C87EB6C}\1.0\ NSEQ.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{6F8A8BA4-4544-678B-6C62-4D622C87EB6C}\1.0\ = "Microsoft IMAPI2 File System Image Creator" NSEQ.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{6F8A8BA4-4544-678B-6C62-4D622C87EB6C}\1.0\0\win32 NSEQ.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{6F8A8BA4-4544-678B-6C62-4D622C87EB6C}\1.0\0\win32\ = "C:\\Windows\\SysWow64\\imapi2fs.dll" NSEQ.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{6F8A8BA4-4544-678B-6C62-4D622C87EB6C}\1.0\FLAGS\ NSEQ.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{D6688363-FE70-4D34-AF9D-E801384BF455}\ProgID\ NSEQ.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{6F8A8BA4-4544-678B-6C62-4D622C87EB6C}\1.0\0\ NSEQ.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{D6688363-FE70-4D34-AF9D-E801384BF455}\TypeLib NSEQ.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{D6688363-FE70-4D34-AF9D-E801384BF455}\TypeLib\ NSEQ.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{D6688363-FE70-4D34-AF9D-E801384BF455}\Implemented Categories\ NSEQ.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{6F8A8BA4-4544-678B-6C62-4D622C87EB6C}\1.0\FLAGS NSEQ.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{6F8A8BA4-4544-678B-6C62-4D622C87EB6C}\1.0\FLAGS\ = "0" NSEQ.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{6F8A8BA4-4544-678B-6C62-4D622C87EB6C} NSEQ.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{6F8A8BA4-4544-678B-6C62-4D622C87EB6C}\1.0 NSEQ.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{D6688363-FE70-4D34-AF9D-E801384BF455}\Implemented Categories NSEQ.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{D6688363-FE70-4D34-AF9D-E801384BF455}\Programmable\ NSEQ.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{D6688363-FE70-4D34-AF9D-E801384BF455}\InprocServer32 NSEQ.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{D6688363-FE70-4D34-AF9D-E801384BF455}\InprocServer32\ = "C:\\Windows\\SysWOW64\\msvidctl.dll" NSEQ.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{D6688363-FE70-4D34-AF9D-E801384BF455}\ProgID\ = "MSVidCtl.MSVidFeatures.1" NSEQ.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{D6688363-FE70-4D34-AF9D-E801384BF455}\Programmable NSEQ.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{D6688363-FE70-4D34-AF9D-E801384BF455}\VersionIndependentProgID\ NSEQ.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{D6688363-FE70-4D34-AF9D-E801384BF455} NSEQ.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{D6688363-FE70-4D34-AF9D-E801384BF455}\ = "Ececoxof.Acejineb.Qilezavba" NSEQ.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{6F8A8BA4-4544-678B-6C62-4D622C87EB6C}\ NSEQ.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{6F8A8BA4-4544-678B-6C62-4D622C87EB6C}\1.0\0 NSEQ.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{D6688363-FE70-4D34-AF9D-E801384BF455}\TypeLib\ = "{6F8A8BA4-4544-678B-6C62-4D622C87EB6C}" NSEQ.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{D6688363-FE70-4D34-AF9D-E801384BF455}\Version NSEQ.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{D6688363-FE70-4D34-AF9D-E801384BF455}\InprocServer32\ NSEQ.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{D6688363-FE70-4D34-AF9D-E801384BF455}\ProgID NSEQ.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
Processes:
7e1248e1bf6e55db50994e9db2068e33_JaffaCakes118.exepid process 2140 7e1248e1bf6e55db50994e9db2068e33_JaffaCakes118.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
NSEQ.exedescription pid process Token: 33 2844 NSEQ.exe Token: SeIncBasePriorityPrivilege 2844 NSEQ.exe -
Suspicious use of SetWindowsHookEx 5 IoCs
Processes:
NSEQ.exepid process 2844 NSEQ.exe 2844 NSEQ.exe 2844 NSEQ.exe 2844 NSEQ.exe 2844 NSEQ.exe -
Suspicious use of WriteProcessMemory 8 IoCs
Processes:
7e1248e1bf6e55db50994e9db2068e33_JaffaCakes118.exerootZyn.exedescription pid process target process PID 2140 wrote to memory of 2496 2140 7e1248e1bf6e55db50994e9db2068e33_JaffaCakes118.exe rootZyn.exe PID 2140 wrote to memory of 2496 2140 7e1248e1bf6e55db50994e9db2068e33_JaffaCakes118.exe rootZyn.exe PID 2140 wrote to memory of 2496 2140 7e1248e1bf6e55db50994e9db2068e33_JaffaCakes118.exe rootZyn.exe PID 2140 wrote to memory of 2496 2140 7e1248e1bf6e55db50994e9db2068e33_JaffaCakes118.exe rootZyn.exe PID 2496 wrote to memory of 2844 2496 rootZyn.exe NSEQ.exe PID 2496 wrote to memory of 2844 2496 rootZyn.exe NSEQ.exe PID 2496 wrote to memory of 2844 2496 rootZyn.exe NSEQ.exe PID 2496 wrote to memory of 2844 2496 rootZyn.exe NSEQ.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\7e1248e1bf6e55db50994e9db2068e33_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\7e1248e1bf6e55db50994e9db2068e33_JaffaCakes118.exe"1⤵
- Identifies Wine through registry keys
- Loads dropped DLL
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2140 -
C:\Users\Admin\AppData\Local\Temp\rootZyn.exe"C:\Users\Admin\AppData\Local\Temp\rootZyn.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2496 -
C:\Windows\SysWOW64\28463\NSEQ.exe"C:\Windows\system32\28463\NSEQ.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:2844
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
457KB
MD546ccfd974518e5849738449034a05a17
SHA1d391108816aed7ba8f7beb205ad7171c74eae6b2
SHA256571aae1f8a260909dbc45c67b4c547fc573c07097b36d4e18db0e36d91deccfe
SHA512773a40a37ebc54cbde7c40ca98001150e78da43726e475f1ee25ef869a39682c0fcd46fb57cf6130151cd8115aa6f2c196e57414affe464fd3b137eb5b317a7a
-
Filesize
466B
MD50186a4e42c9940669b6cd3d4f5aabb33
SHA1816763aeb1cfd0d6d38237f9cb28847a48ec3625
SHA256579b94a827e502795880bfcfe36b6220556faca110c83f7ffd3b87becfc2b9aa
SHA5126d399e4d9c5410181a1cc4540a5c646454095e7d72aec481a21d4916f44fa49521d5ddf2c8fced79032e82dcaa380891ff5afe315a6be9cb74111537db0d3a3d
-
Filesize
8KB
MD5395bbef326fa5ad1216b23f5debf167b
SHA1aa4a7334b5a693b3f0d6f47b568e0d13a593d782
SHA2567c1c4ba8978d3ec53bc6da4d8f9e5e1ca52edf5ccf5ec19ef06b02055ff3b3d1
SHA512dc3f3d7501feb10623807e89f28a0e38bdbbd4a7e2ad964c8ab33c392bde61896fe40bb7773f6309cd59ad9a686decbd81c15b588ac8d311fd2a273ac9410679
-
Filesize
5KB
MD51b5e72f0ebd49cf146f9ae68d792ffe5
SHA11e90a69c12b9a849fbbac0670296b07331c1cf87
SHA2568f4485675fe35b14276f5c8af8a6b42f03cf1b5de638355e4c4b28397385e87e
SHA5126364f5581de5aaec09b5d1c4e5745193f981ff93cf91e20c6c9ff56566b5d182ccbdacf9aeed1d7a01460eb21619e14ac4ab31b083a951b45b3b7f9d93a62ffc
-
Filesize
106B
MD5639d75ab6799987dff4f0cf79fa70c76
SHA1be2678476d07f78bb81e8813c9ee2bfff7cc7efb
SHA256fc42ab050ffdfed8c8c7aac6d7e4a7cad4696218433f7ca327bcfdf9f318ac98
SHA5124b511d0330d7204af948ce7b15615d745e8d4ea0a73bbece4e00fb23ba2635dd99e4fa54a76236d6f74bdbcdba57d32fd4c36b608d52628e72d11d5ed6f8cde2
-
Filesize
4KB
MD5f4523b5a3e4add9f35a2b2313db6117c
SHA1cf63375a6c554829b548e125fb1458216d8b7c37
SHA256b962debb1389f8eddcd8cecaf7f847c2c60ac1f5d9bd8870aa9dc0023702ba53
SHA5126450e683a2eedc944084b73587810e987e0e8bc105b8036f630fa3d12f4caac4d1ddb42dff9436f9eb4a441d0d034f4fda0e8bb0bb9f1d59ab520ddcd2081dac
-
Filesize
1.2MB
MD5130dc6d4daf2b252aad2af3b4141e180
SHA11071ec7a45c8cd1f3e06f80851d6ff470ca50000
SHA256ac26ffec5a93399c41695a66e2dd04ee23d0a73ec36ed366bfcfb1abc1268c34
SHA51234d5a9740e8d235089a5a2794e971ac557b8f82a70ea6d8f4a29f4ed86b07ba5fa12fd04f0570092cb5bdc0e67c92cee1d2d5ecf192bbd735a843db642a0b283
-
Filesize
649KB
MD52bff0c75a04401dada0adfab933e46a7
SHA1364d97f90b137f8e359d998164fb15d474be7bbb
SHA2562aa53bc5da3294817f95d8806effdf28e5af49661a955256c46db2b67cb6e6da
SHA51288b82973d3c042bceb75e12297111fa7b8bd4e2a7a37d26b698c595d8d75ec670cc7aebfa2572206c1b2a4ecbbfa3103affb8bee6d7ef47428a225e2cd1bea3f