Analysis
-
max time kernel
141s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
31-10-2024 01:47
Static task
static1
Behavioral task
behavioral1
Sample
8115d635e5ef8e2c48bf177682d244d3_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
8115d635e5ef8e2c48bf177682d244d3_JaffaCakes118.exe
Resource
win10v2004-20241007-en
General
-
Target
8115d635e5ef8e2c48bf177682d244d3_JaffaCakes118.exe
-
Size
798KB
-
MD5
8115d635e5ef8e2c48bf177682d244d3
-
SHA1
3386b2fa374064e0049aa2f4514c89212437a402
-
SHA256
df7d9c821e7286e3fabecffdd380e925d04255bb1a9dbdbe63968d3a544eb5b9
-
SHA512
82b0d1129706c53f009c077a0384855c86f251a82fec294c439b650c1c13bcb7b1fad5553e1d1d2c59593b220d84783a5b81ad74cd7bbd30cac0d58bd02ddb11
-
SSDEEP
24576:CbuVT8Op/5+wF5O6nS8AtQjzMyGm+dCKC:Kqn/JTnFH39qdCKC
Malware Config
Signatures
-
Ardamax family
-
Ardamax main executable 1 IoCs
resource yara_rule behavioral1/files/0x0007000000015f2a-9.dat family_ardamax -
Executes dropped EXE 1 IoCs
pid Process 2608 PXWC.exe -
Loads dropped DLL 4 IoCs
pid Process 2728 8115d635e5ef8e2c48bf177682d244d3_JaffaCakes118.exe 2728 8115d635e5ef8e2c48bf177682d244d3_JaffaCakes118.exe 2608 PXWC.exe 2608 PXWC.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\PXWC Agent = "C:\\Windows\\SysWOW64\\28463\\PXWC.exe" PXWC.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Drops file in System32 directory 7 IoCs
description ioc Process File created C:\Windows\SysWOW64\28463\key.bin 8115d635e5ef8e2c48bf177682d244d3_JaffaCakes118.exe File created C:\Windows\SysWOW64\28463\AKV.exe 8115d635e5ef8e2c48bf177682d244d3_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\28463 PXWC.exe File created C:\Windows\SysWOW64\28463\PXWC.001 8115d635e5ef8e2c48bf177682d244d3_JaffaCakes118.exe File created C:\Windows\SysWOW64\28463\PXWC.006 8115d635e5ef8e2c48bf177682d244d3_JaffaCakes118.exe File created C:\Windows\SysWOW64\28463\PXWC.007 8115d635e5ef8e2c48bf177682d244d3_JaffaCakes118.exe File created C:\Windows\SysWOW64\28463\PXWC.exe 8115d635e5ef8e2c48bf177682d244d3_JaffaCakes118.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language PXWC.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 8115d635e5ef8e2c48bf177682d244d3_JaffaCakes118.exe -
Modifies registry class 29 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{575E554D-C39C-42D1-6FBC-4DFBC43E0BE2}\ = "Etazeppes.Lakadi.Ojaglif Class" PXWC.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{8E6DF40B-C38E-E0DD-7612-8E74BB7F1BDD}\4.0 PXWC.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{575E554D-C39C-42D1-6FBC-4DFBC43E0BE2}\VersionIndependentProgID\ = "AcroAccess.AcrobatAccess" PXWC.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{575E554D-C39C-42D1-6FBC-4DFBC43E0BE2}\ProgID\ = "AcroAccess.AcrobatAccess.1" PXWC.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{575E554D-C39C-42D1-6FBC-4DFBC43E0BE2}\Programmable PXWC.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{575E554D-C39C-42D1-6FBC-4DFBC43E0BE2}\TypeLib PXWC.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{575E554D-C39C-42D1-6FBC-4DFBC43E0BE2}\VersionIndependentProgID\ PXWC.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{575E554D-C39C-42D1-6FBC-4DFBC43E0BE2}\InprocServer32\ PXWC.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{8E6DF40B-C38E-E0DD-7612-8E74BB7F1BDD} PXWC.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{8E6DF40B-C38E-E0DD-7612-8E74BB7F1BDD}\ PXWC.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{575E554D-C39C-42D1-6FBC-4DFBC43E0BE2}\TypeLib\ = "{8E6DF40B-C38E-E0DD-7612-8E74BB7F1BDD}" PXWC.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{8E6DF40B-C38E-E0DD-7612-8E74BB7F1BDD}\4.0\ = "HHCtrl 4.0 Type Library" PXWC.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{8E6DF40B-C38E-E0DD-7612-8E74BB7F1BDD}\4.0\0 PXWC.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{8E6DF40B-C38E-E0DD-7612-8E74BB7F1BDD}\4.0\0\win32 PXWC.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{575E554D-C39C-42D1-6FBC-4DFBC43E0BE2}\TypeLib\ PXWC.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{8E6DF40B-C38E-E0DD-7612-8E74BB7F1BDD}\4.0\0\ PXWC.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{575E554D-C39C-42D1-6FBC-4DFBC43E0BE2}\ProgID PXWC.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{8E6DF40B-C38E-E0DD-7612-8E74BB7F1BDD}\4.0\FLAGS\ PXWC.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{8E6DF40B-C38E-E0DD-7612-8E74BB7F1BDD}\4.0\0\win32\ PXWC.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{575E554D-C39C-42D1-6FBC-4DFBC43E0BE2}\VersionIndependentProgID PXWC.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{575E554D-C39C-42D1-6FBC-4DFBC43E0BE2}\InprocServer32 PXWC.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{575E554D-C39C-42D1-6FBC-4DFBC43E0BE2}\ProgID\ PXWC.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{575E554D-C39C-42D1-6FBC-4DFBC43E0BE2}\Programmable\ PXWC.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{8E6DF40B-C38E-E0DD-7612-8E74BB7F1BDD}\4.0\ PXWC.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{8E6DF40B-C38E-E0DD-7612-8E74BB7F1BDD}\4.0\FLAGS\ = "0" PXWC.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{575E554D-C39C-42D1-6FBC-4DFBC43E0BE2} PXWC.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{575E554D-C39C-42D1-6FBC-4DFBC43E0BE2}\InprocServer32\ = "C:\\Program Files (x86)\\Adobe\\Reader 9.0\\Reader\\plug_ins\\Accessibility.api" PXWC.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{8E6DF40B-C38E-E0DD-7612-8E74BB7F1BDD}\4.0\0\win32\ = "%SystemRoot%\\SysWow64\\hhctrl.ocx" PXWC.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{8E6DF40B-C38E-E0DD-7612-8E74BB7F1BDD}\4.0\FLAGS PXWC.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: 33 2608 PXWC.exe Token: SeIncBasePriorityPrivilege 2608 PXWC.exe -
Suspicious use of SetWindowsHookEx 5 IoCs
pid Process 2608 PXWC.exe 2608 PXWC.exe 2608 PXWC.exe 2608 PXWC.exe 2608 PXWC.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2728 wrote to memory of 2608 2728 8115d635e5ef8e2c48bf177682d244d3_JaffaCakes118.exe 30 PID 2728 wrote to memory of 2608 2728 8115d635e5ef8e2c48bf177682d244d3_JaffaCakes118.exe 30 PID 2728 wrote to memory of 2608 2728 8115d635e5ef8e2c48bf177682d244d3_JaffaCakes118.exe 30 PID 2728 wrote to memory of 2608 2728 8115d635e5ef8e2c48bf177682d244d3_JaffaCakes118.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\8115d635e5ef8e2c48bf177682d244d3_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\8115d635e5ef8e2c48bf177682d244d3_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2728 -
C:\Windows\SysWOW64\28463\PXWC.exe"C:\Windows\system32\28463\PXWC.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:2608
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
457KB
MD519794a23edc7494063603d316165c04f
SHA16b5050be2ffa32cc3dd0d1e53fa2cfe355c59b4e
SHA25620aa8a967c2982acf1afce320284de9b4749fd3326b63c08fad8921720764b3e
SHA5128f782e06cd32844a336548083eeb50d818ba8acbbba042719da7505dd2d239dc133eedcf244c19901bba7424d2eef60a977b6d6795de9baa6d56ad13c3828774
-
Filesize
492B
MD50240f818be25384027c6b26006a9ab25
SHA1c7219e9990869997944142f8d964224f2b027c40
SHA256ef2398e6cada1535a5e005d40c59331ccb765eacfbab380b3b90d4c24248201d
SHA51241d9181441e9e33d5336204de02918f3ce58c5e7fe4ef02b60031903e320dff1fdac2acb11111c78af7ec07d3a6fd933b953e5c7df2a07d89f1b6310ec8ab9f8
-
Filesize
8KB
MD5bc5fd352bfe50a09ffd84c95f697f9b4
SHA1847a869a2b789c2f5c9845340f133b8845976aaa
SHA2561c1bd72088d746302e15ed63f343bdbabae5ff39f1633e8f60ccd8e20dc0863f
SHA512b52e8a1507b037ec2c5704c495bb53f3275a60ea35f02928117cb9dfe4718a78f77077571cd75bbe70c2b8f993251350db832834c509d1af9a20d00cedb5a197
-
Filesize
5KB
MD5110bdf91b758328b3f33b4ab7d9fd480
SHA129d9ea9f08248307ef20c63cd1f02e8a5256d90b
SHA2569cd15a69297174a062f839ee86f2f583f09952475891683a042f56d04bd581b3
SHA51253efa1f722045a4f446e38bd780af1e5212de6052677596a7628eac2aa4a562c9752ae9859ee92530f5b3ac9ab2717777edbabdcb09f3f9ede2ba6063fe4bec7
-
Filesize
106B
MD5639d75ab6799987dff4f0cf79fa70c76
SHA1be2678476d07f78bb81e8813c9ee2bfff7cc7efb
SHA256fc42ab050ffdfed8c8c7aac6d7e4a7cad4696218433f7ca327bcfdf9f318ac98
SHA5124b511d0330d7204af948ce7b15615d745e8d4ea0a73bbece4e00fb23ba2635dd99e4fa54a76236d6f74bdbcdba57d32fd4c36b608d52628e72d11d5ed6f8cde2
-
Filesize
4KB
MD570c6ae41897fd3fbc90821be9f6dcafd
SHA1212294333e175cd4e647bd1738cf1e48de41fae2
SHA2566e8e43f1ef95d0dce19434dbeb9576fdbafcfcd8ff2a1d0ada36516b1c11d634
SHA5128822bc940cf1b64e2ec6b318a7f9702c056fcd45da025091609d9e1c455f6d00e2d9413433f827aad63c29212125d100027e43f4adcb235001b269ba0b6f54b3
-
Filesize
648KB
MD5ee07ce6e1da01ee9aa4a9cf523878dd7
SHA15d964e5919146fd2cd410909c03f3aab456cf062
SHA2564ab1e4414b3659a21a5a39b0edd80e967e73140a809f6a8407e46df963ed8f7b
SHA512487eade2e555e270536c1eeaf82ade3436cb8baef5476959a7de0b74df1082ce1b3917a66bc71965e1d4ba95e043706a543b29cfa485d65edc3102a98174e6b3